|By Paul A. Henry||
|September 23, 2007 08:15 PM EDT||
No, you did not miss the memo or a software upgrade notice. Yet you’ve already arrived at Web 2.0.The “upgrade” from Web 1.0 to the new Web 2.0 world has been an evolutionary process, continually driving the Web to be more interactive, useful, and interesting for consumers and the business community. The evolution from Web 1.0 to Web 2.0 has been about improvements in the Web “experience” – from that of simply browsing static content and graphic images that display upon request, to an all-new highly interactive, programmable, and much more useful Web. Oh, and also a much more dangerous place as well. Back in the early 1990s, our Web usage resembled that of a visit to a library in search of information or data. And as far we know, rarely has anyone ever been attacked by a book in a library. In the new Web 2.0 world, however, the library is so real that the page on which you’re reading about lions seems to come alive – so much so that the next step may be that they actually jump out and take a bite out of you. Worse, the thing that you reach for to take off the virtual shelf may look like a book, but may not be a book at all; instead, it may be something else altogether – something disguised to look like a book, possibly a bomb that explodes upon contact. The lesson? Beware. To quote an old phrase, you cannot judge a book by its cover in the new World Wide Web. The Web has evolved beyond simply serving up static content. It now incorporates a myriad of technology innovations such as highly interactive page content (things literally jump, spin, beep and entertain us), real-time updates from RSS feeds, Weblogs, social networking sites, podcasts, and mashups. We’ve also embraced asynchronous programming languages and Internet protocols (e.g.,
But the news isn’t all good: Today’s hackers don’t even have to compromise a Web site to inject malware for distribution; they are actually being invited to put anything on any Website they want to. Talk about letting the fox into the hen house! What risks do we now face? Here’s a prime example: in November of 2006, Top Tech News (an Internet news and information site) reported that malware writers had used a Wikipedia article to lead users to a linked booby-trapped page. The page contained malicious code designed to plant viruses on the computers of unsuspecting users. It was quite a creative ploy. The fraudulent Wikipedia page offered a bogus Windows security update for a version of the Lovesan/W32.Blaster worm, and included a link to an external site that was labeled with the name “wikipedia-download.org”. The malware writers reportedly used the archive storage function on Wikipedia to plant the malicious code on multiple pages. The attackers simply directed users to those archived pages through e-mails that used the Wikipedia logo, and claimed that the encyclopedia site had been asked by Microsoft to help with worm patches. When the users clicked to get the helpful patch for the Microsoft vulnerability, they got the Lovesan/W32.Blaster worm instead. The Journey to Web 2.0
Before we explore the additional benefits and risks associated with Web 2.0, it’s important to understand how Internet applications have evolved. Wikipedia actually provides a very good timeline representation (see Figure 1) of this evolution to Web 2.0.
Some would argue that the term Web 2.0 is nothing more than marketing hype being applied to technologies that have already been a part of the Internet for a long time, in some attempt to invigorate more interest in these technologies. Regardless, there’s a bigger picture to keep in mind. The significance of Web 2.0 is not any specific new technology like
The original Web 2.0 article written in 2005 by Tim O’Reilly provides his highly regarded definition of Web 2.0.
|Julian 09/19/07 07:23:21 PM EDT|
Awesome read - well done...
It talks about Web2.0 and sheds some light on whether we're really at Web2.0 or Web 16.0...
Julian Stone - ProWorkflow.com
Dec. 3, 2016 09:30 AM EST Reads: 3,918
Dec. 3, 2016 09:30 AM EST Reads: 821
Dec. 3, 2016 09:00 AM EST Reads: 443
Dec. 3, 2016 08:30 AM EST Reads: 483
Dec. 3, 2016 06:30 AM EST Reads: 6,003
Dec. 3, 2016 05:45 AM EST Reads: 6,920
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web ...
Dec. 3, 2016 05:30 AM EST Reads: 1,200
Dec. 3, 2016 04:15 AM EST Reads: 1,718
Dec. 3, 2016 02:30 AM EST Reads: 1,523
Dec. 3, 2016 02:15 AM EST Reads: 1,501
Dec. 3, 2016 01:45 AM EST Reads: 788
Dec. 3, 2016 12:30 AM EST Reads: 1,524
Dec. 2, 2016 11:15 PM EST Reads: 916
Dec. 2, 2016 08:30 PM EST Reads: 4,984
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Dec. 2, 2016 08:15 PM EST Reads: 1,574
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 2, 2016 06:45 PM EST Reads: 4,001
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Dec. 2, 2016 06:30 PM EST Reads: 1,489
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data professionals...
Dec. 2, 2016 05:00 PM EST Reads: 4,089
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Dec. 2, 2016 04:45 PM EST Reads: 2,119
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
Dec. 2, 2016 04:45 PM EST Reads: 1,985