Feeds

Google takes buzz saw to Buzz, other appendages

Management machete hacks off more chunks

Intelligent flash storage arrays

Google's first stab at social networking, the failed Google Buzz, is just one of a group of projects and programs that Mountain View has cast off in a "fall sweep", the sequal to its "fall spring-clean" of last month.

"Changing the world takes focus on the future, and honesty about the past," wrote Google VP for products Bradley Horowitz in a blog post on Friday. "We learned a lot from products like Buzz, and are putting that learning to work every day in our vision for products like Google+."

By "honesty", we can only assume that Horowitz means that Buzz – beset with a host of privacy problems from its inception – honestly never caught on.

"In a few weeks we'll shut down Google Buzz and the Buzz API, and focus instead on Google+," Horowitz wrote. "While people obviously won't be able to create new posts after that, they will be able to view their existing content on their Google Profile, and download it using Google Takeout."

Also scheduled for the chopping block are Code Search, which on January 15, 2012 will be shut down along with its API, and Jaiku, a Twitter-like service that Google acquired in late 2007.

The iGoogle personalization service will lose its social-networking component on January 15, 2012, as well, although its other features will remain. The reason for this change is simple: Horowitz chalked it up to "our new focus on Google+."

Horowitz didn't explain, however, why Mountain View is is shutting down its University Research Program for Google Search, which gave select university researchers direct access to Google's search results. Having announced its third-quarter net income on Thursday of $2.73bn, Google could certainly afford keeping it open.

And, as announced in July, Google Labs is shutting down – the site's last day is Friday.

So long, Buzz, Code Search, Jaiku, Google Labs, and the University Research Program for Google Search – and thanks for all the fish. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.