Messaging Pipeline | Google
Free Newsletter GlossaryContact UsAbout Us
One To One Collaboration Servers & Security Business

February 27, 2006

Review: Google Desktop 3

Courtesy of

Google Desktop began life as a desktop search product, offering the ability to find E-mail, files, and recently visited Web pages. Version 2, released last fall, introduced the Sidebar, the feature that put news and RSS feeds on your desktop computer--and revealed a Google transforming itself from a simple search vendor to a software developer and content provider. Version 3 Beta refocuses on desktop search, including Search Across Computers.

In some respects, SAC is similar to Internet-based data backup services such as EVault, InfoSure, and LiveVault InSync. The difference is they make users aware of security and encryption techniques, like using 256-bit AES encryption and transmission using Secure Sockets Layer. Google doesn't share those details. It's possible to encrypt the index Google Desktop creates, but here's what the Features Summary says: "Enabling this feature will reduce the performance of Google Desktop due to the extra work of doing the required encryption and decryption." It makes use of the Windows Encrypted File System feature. But Google doesn't provide enough information to be able to make a well-informed security decision.

Google Desktop does offer several checks to help keep your data safe and private. Search Across Computers is turned off by default. Also, the SAC index is a subset of the full Google Desktop index--it includes only Web history; Word, Excel, and PowerPoint documents; and text and PDF files in the My Documents folder. You can make documents and Web history searchable, or just one or the other. You can exclude folders from the search (though not E-mail folders, unlike rivals X1 and Copernic). You can password-protect the search feature. If you want out of SAC, there's a "Clear My Files From Google" button to remove the index from Google's server, though it could take as long as 60 days. And your document index also will be on any computers you've used to search across computers. There's also no mechanism for indicating when data is uploaded to a server, accessed by another computer, or deleted from Google's servers.

Google Desktop on its own is a worthy competitor in desktop search, thanks to the ability to search a range of media types not found in other desktop search programs. And it has added security features, like password protection. But if Google is going to play in the software market, it must take more responsibility for communicating what its software does and doesn't do.

Return to main story,

E-mail This Story
Print This Story

Get the latest Messaging news, product info, and trends every week.

Related Content

  Right-click and choose Copy to extract RSS Feed URL  Messaging Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Messaging Pipeline's Blog RSS Feed

Editorial and vendor perspectives

Editor's Picks
The Six Flavors Of Windows Vista
Microsoft plans to release a full six-pack of Vista versions, one for every taste. Which Vista will be right for you?

Hope is Not Enough When It Comes To Compliance

Three Ways To Authenticate E-Mail And Stop Spam

Wikis In The Workplace

Review: Google Desktop 3

Vendors are now talking about how collaboration can be improved by integrating video with messaging applications. They're even talking about adding live TV to mobile phones. How far do you go before it becomes a bandwidth and business productivity drain?
Video is a great idea
Video is fine but there needs to be size limits
It's never used for anything really productive
I draw the line at live TV

In search of messaging products? Check out our brand new Product Finder for a directory of groupware and collaboration tools, security products, archiving solutions, and more.


With business growth back on the agenda, the role of the CIO is changing from manager of technology to C-suite collaborator in enabling innovation that matters for the business. Read an executive summary and register to download the full IBM paper.

Learn how BMC's Identity Management Services can help secure your enterprise and give authorized users the access they need to critical information, so they can deliver more consistent services. Register now for 'The Black Book on Corporate Security'

Maximize your investment with one of the top custom Unicenterư education & implementation teams in the nation. Get the knowledge, integration & expertise you expect from your Unicenterư technologies to deliver a true integrated enterprise solution.

Increasing .NET and J2EE application complexity is making effective application management more vital for business success, and at the same time, more difficult to achieve. By automating problem resolution processes, businesses can benefit greatly.

Automatic Job Scheduling/Batch Processing Software for Windows platforms. Download 30 day Trial Version Today!

Sponsored Links:      
 |   |   |   |   |   | 
 |   |   |   | 
 |   |   |   |   | 
Messaging Pipeline  |   |   |   | 
 |   |   |   |   | 
© 2006 | MESSAGING PIPELINE All rights reserved. | |