Introduction to Web 2.0 Technologies
description
Transcript of Introduction to Web 2.0 Technologies
![Page 1: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/1.jpg)
IBSG - 1Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 1Cisco Confidential
Web 2.0 trends& complexity
Bill BrennanCisco SystemData CenterOctober 2008
![Page 2: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/2.jpg)
IBSG - 2Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 2Cisco Confidential
Web 2.0 Defined
"Web 2.0 is a knowledge-oriented environment where human interactions generate content that is published, managed and used through network applications in a service-oriented architecture.“
-Dario de Judicibus IBM
![Page 3: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/3.jpg)
IBSG - 3Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 3Cisco Confidential © 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicPresentation_ID
Paradigm and Complexity Shift
Developer Centric
Today’s IT
Custom Code
Designed to Last
Stovepipe Applications
Monitoring Availability
Web 2.0 - SOAArchitecture
IT and Business Analysts
Assembly and Customization
Designed to Change
Services
Services Governance & SLA
Web2.0 IT
![Page 4: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/4.jpg)
IBSG - 4Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 4Cisco Confidential
Web 2.0 is a natural extension of a Services Oriented Architecture (SOA)
![Page 5: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/5.jpg)
IBSG - 5Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 5Cisco Confidential
Characteristics of Social Networking
![Page 6: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/6.jpg)
IBSG - 6Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 6Cisco Confidential
Online Youth Activities
![Page 7: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/7.jpg)
IBSG - 7Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 7Cisco Confidential
Market Transition
![Page 8: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/8.jpg)
IBSG - 8Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 8Cisco Confidential
Blogoshere 2006
http://technorati.com/weblog/2006/11/161.html
![Page 9: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/9.jpg)
IBSG - 9Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 9Cisco Confidential
What are the tools?
Tim Swan presentation
![Page 10: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/10.jpg)
IBSG - 11Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 11Cisco Confidential
Emerging Business Models
![Page 11: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/11.jpg)
IBSG - 12Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 12Cisco Confidential
Interconnected Business Models
http://blogs.zdnet.com/Hinchcliffe/?p=137
![Page 12: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/12.jpg)
IBSG - 15Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 15Cisco Confidential
Social Networks as Distribution Models
OpenSocial 350M users
Joint Development with Google, Yahoo and MySpace
4500 Applications Developed
Installed150M times
37000 Applications Developed
Installed 715M times
Example: RockYou’s Apps 124M times
![Page 13: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/13.jpg)
IBSG - 16Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 16Cisco Confidential
6 Degree of Separation
http://upload.wikimedia.org/wikipedia/commons/9/94/Six_degrees_of_separation.png
![Page 14: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/14.jpg)
IBSG - 17Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 17Cisco Confidential
3 Degrees of Separation
![Page 15: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/15.jpg)
IBSG - 18Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 18Cisco Confidential
Contact Management and Presentation
![Page 16: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/16.jpg)
IBSG - 19Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 19Cisco Confidential
Public Health - Movers and Shakers
http://www.fas-research.com/gallery/Case-Study-Gain-Lose-Influence.pdf
![Page 17: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/17.jpg)
IBSG - 20Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 20Cisco Confidential
Google’s Applications
Search • Alerts • Blog Search* • Book Search • Catalogs • Custom Search Engine* • Desktop* • Directory • Earth* • Finance* • Gears • Images • Language Tools • Maps • Personalized Search* • Product Search • Scholar • SketchUp • Toolbar* • Web Accelerator • Web Search Ads • AdSense • AdWords • Analytics Tools* • YouTube
Applications • Apps • Blogger* • Calendar* • Checkout • Code • Docs & Spreadsheets • Gmail* • Groups* • Labs • News* • Notebook* • orkut • Pack • Picasa* • Picasa Web Albums • Reader* • Talk* • Translate • Video* •Mobile Webmaster • Mobile* Android •Enterprise Dodgeball • Earth for Enterprise/Google Earth Pro • Maps for Enterprise • Mini • Search Appliance • SketchUp Pro
http://www.google.com/intl/en/press/descriptions.html
![Page 18: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/18.jpg)
IBSG - 21Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 21Cisco Confidential
Social Network Growth
![Page 19: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/19.jpg)
IBSG - 23Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 23Cisco Confidential
Open API adoption
Effect of Amazon’s data and software used for many apps
![Page 20: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/20.jpg)
IBSG - 27Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 27Cisco Confidential
Operational Tipping Point
O’Reilly spoke with Microsoft’s Debra Chrapaty, VP of operations for Windows Live about this, noting that:
Her belief is that there’s going to be a tipping point in Web 2.0 where the operational environment will be a key differentiator. I mentioned the idea that Web 2.0 has been summed up as "Fail Fast, Scale Fast," and she completely agreed. When it hit its growth inflection point, MySpace was adding a million users every four days — not at all an easy feat. As these massive apps become the norm, unless you can play in a game where services can be highly stable, geodistributed, etc., you won’t be in the game. And that’s where she came to the idea that being a developer "on someone’s platform" may ultimately mean running your app in their data center. http://blogs.zdnet.com/Hinchcliffe/?p=54
![Page 21: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/21.jpg)
IBSG - 29Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 29Cisco Confidential
Technology/Service Convergence
Application Architecture
Web 2.0
SOA
Organization Consolidation
Virtualization
Consolidation
Service Models
Cloud Computing
SAAS
Stream Computing
![Page 22: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/22.jpg)
IBSG - 30Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 30Cisco Confidential
Data Stream and Operational Complexity
XML Growth
Virtualization
VDI
Data Center
Cluster applications
Video
Sensor Networks
Web 2.0
![Page 23: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/23.jpg)
IBSG - 31Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 31Cisco Confidential
Conclusions Market is converging
Platforms
API’s
Virtualization
Service Models
Communication/Collaboration Internally is key to success
Identity
Application policy-security
Data Center complexity
Consolidate-Virtualizate-Orchestrate
Dynamic Provisioning Models
Compliance to SLA
![Page 24: Introduction to Web 2.0 Technologies](https://reader033.fdocuments.us/reader033/viewer/2022061206/5483455ab07959520c8b49fc/html5/thumbnails/24.jpg)
IBSG - 33Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 33Cisco Confidential