Evite promises mobile upgrades this year, total site overhaul in 2008
Also looking to ally with social networking sites or publish API, says exec
Computerworld - How does a Web site attract more than 15 million users yet inspire near-total derision from what should be its biggest fans?
Simple: Emulate Evite, which remains the king of party-planning services despite failing so miserably to keep up with Web 2.0 technology advances that it makes America Online Inc. look cutting-edge by comparison, according to critics.
Evite "is not actually social" and has made "no progress in years," according to John Payne, CEO of CircleUp Inc., who proudly proclaims about his Newport Beach, Calif.-based messaging start-up: "We are the Un-Evite."
"I use Evite all the time to communicate with my mommy friends," confessed Charlene Li, an analyst at Forrester Research Inc. But "if I sent Evites to the TechCrunch crowd, they would just laugh at me."
Influential blogger Robert Scoble criticized the ad-supported Evite for forcing users to click back to its Web site and view an ad before giving out any event information. While columnist and venture capitalist Stewart Alsop called on "some youngster" to create an Evite knock-off "that's fully buzzword-compliant, AJAX-based ... replete with mashups" that Alsop said he "might even fund personally!"
Snarky Web publication Valleywag listed Evite as number one in its list of "Companies we all hate."
Even Time magazine got into the act, declaring Evite to be the second-worst Web site.
Evite's "fill-in-the-blanks approach feels clumsy and dated. The ads are intrusive, and navigation's a drag," wrote Time in June. It summarized: "We're only mad at Evite because we need it so much, and we know it could be so much better."
Makeover by popular demand
For all those who love to hate Evite, a reassessment may be in the offing. For one, the site will launch later this year a trio of mobile phone features that, according to Jessica Landy Raymond, vice president of product development at the IAC/InterActive Corp. subsidiary, would help it leapfrog the crowd of start-ups now sensing Evite's vulnerability and trying to steal its users.
In an interview last week, Raymond also said Evite is "actively working" on the first overhaul of its interface in four years due sometime in 2008. It will be the first major update to Evite since 2004, when it added social networking features in response to the then-popular Friendster site, features that Raymond acknowledged no longer exist in their original form.
And in the area where Evite is most heavily criticized by the Web 2.0 elite -- its lack of integration with social networks such as MySpace.com or Facebook -- Raymond promises "solutions" are in the works.
Evite is currently looking at whether to build applications that would integrate its service with the user bases of certain social media networks, Raymond said. Those include Facebook, Bebo and Hi5, which have all openly published their application programming interfaces (API). Evite is also considering signing alliances with those players, she said.
- How Network Connections Drive Web Application Performance Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Web Apps White Papers | Webcasts