Structured like Gmail, the developer and end-user software interoperates with other Web services, such as IM, forums, wikis, and blogs.
At its developer conference on Thursday, Google plans to offer attendees a chance to try Google Wave, the company's new real-time collaborative communication system.
Lars Rasmussen, who was lead engineer for Google Maps before co-founding the Wave team with his brother Jens, describes Wave as "what e-mail might look like if it were invented today."
But Wave encompasses more than e-mail. It matches or exceeds the functionality of several major application types, including instant messaging, discussion forum software, wikis, and blogs. Rather, it will eventually, as it moves toward commercial release later this year.
Google Wave is a product, a platform, and a protocol. It's a cross between conversation and document that allows users to do with one tool what they currently do with many. It works in a Web browser on the desktop or on mobile phones, like Apple's iPhone or Google Android devices.
Just as Ajax technology has blurred the identity of Web sites by allowing content to be embedded on any Web site, Wave blurs the distinctions between communications modes and between content creation applications.
Writing a Wave is a lot like typing text into Gmail, Google Docs, or a blog posting form in one's browser. To the left of the right-hand column featuring the discussion, there's an in-box with other Waves. And to the left of that, there's a navigation pane atop a list of contacts that looks very similar to Gmail's layout.
6 Tools to Protect Big DataMost IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.
Big Data Brings Big Security ProblemsWhy should big data be more difficult to secure? In a word, variety. But the business won’t wait to use it to predict customer behavior, find correlations across disparate data sources, predict fraud or financial risk, and more.