Battle of the Document Cloud Apps: Google Docs, Apple iWorks…Which One Truly Reigns?

Battle of the Document Cloud Apps: Google Docs, Apple iWorks…Which One Truly Reigns?

Battle of the Document Cloud Apps: Google Docs, Apple iWorks…

Throughout the 1990s, 2000s, and today, Microsoft Word has served as the final word in applications designed to maximize the efficiency and output of both businesses and individual computer users regarding their documents.

Attempts to unseat its status as the number-one program of its kind have been largely futile. Many an erstwhile competitor has been outdone by the thorough richness and ease of use inherent to Word and the other members of the Microsoft Office family, such as Excel, Outlook, and PowerPoint. Both the computing industry and consumers have long registered unanimous agreement in the preeminence of Word.

Then came along cloud computing…

With the development of technologies and applications that made it easy for users to access, interact with, and share their documents via the Internet, a changing of the documents app guard has begun to take place. Microsoft is shaking in their boots at the threat of cloud computing, and the applications thereby launched, to Word — indisputably one of the company’s foremost cash cows.

First came along Google Docs. The allure of Google’s cloud offering is not in its array of features or quality — Microsoft Word clearly trumps Google Docs when it comes to cool and useful attributes. But Google Docs is free for most consumers, cheap for businesses. Folks involved in government or education, especially young people, have immediately latched onto Google Docs’ pragmatic assets and simplicity.

IBM has also released a document application, plainly titled IBM Docs. Yet the wimpy name belies a formidable foe to Microsoft Word: a cloud document application that is just as abundant in nifty features as Word, at a lesser price. Another advantage for IBM is the trust that the company has engendered among business and tech elite. The IBM label makes this document app particularly attractive for those high-end computing consumers and businesses who associate intelligent application design with the potential for greater revenue: a tacit yet key characteristic of IBM’s marketing plan.

Newest to the document cloud app race is Apple’s iWork. It consists of four primary components: spreadsheets, Keynote presentations, word processing, and email. IBM Docs, Google Docs, and Word definitely outrank iWork in terms of familiarity and features. Yet iWork has a teeny weeny benefit: its direct link to the Apple family of computing juggernauts, like the iPad and the Mac.

To counter these threats to its treasured Word and Office Suite, Microsoft released Office 365: essentially a carbon copy of the Office family of products souped up for the cloud. Office 365’s primary advantage is brand recognition, bolstered by an inventively simple and entertaining series of commercial spots, targeted at people who still look to blue skies for their cloud.

So who tops the list of document cloud apps in 2012? The victor is still unclear. Yet at least consumers will benefit as the applications jockey for leadership.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Comic
The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Cloud Computing Advancing Edtech In a new research study by ResearchMoz it’s predicted that the global cloud computing market in higher education will grow steadily at a CAGR of 24.57% over the period 2016 to 2020. Making use of computing resources connected by either public or private networks provides the benefits of scalable infrastructure, greater…

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Digital Healthcare Executives and Investors Addressed Opportunities and Challenges Facing the Industry New York City – September 21, 2016 – According to a survey of 122 founders, executives and investors in health-tech companies released today by Silicon Valley Bank, big data and artificial intelligence will have the greatest impact on the industry in the year ahead. Healthcare…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

15 Cloud Data Performance Monitoring Companies

15 Cloud Data Performance Monitoring Companies

Cloud Data Performance Monitoring Companies (Updated: Originally Published Feb 9th, 2015) We have decided to put together a small list of some of our favorite cloud performance monitoring services. In this day and age it is extremely important to stay on top of critical issues as they arise. These services will accompany you in monitoring…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…