Group 7 – WEB 2.

0

1

Group 7 – WEB 2.0
Dheepak J

CONTENTS
1.0

Priyank Daga Satrajit Chakraborty Anup Kataria

INTRODUCTION Abhijit Pachorkar 5 WORLD WIDE WEB 5 1.0? 6 enabled? 6

2.0 EVOLUTION OF THE Manish Mahnot
Madhvi Gupta

2.1 What was Web Anukhya Buddharaju
Jim Kim

2.2 What Web 2.0 has Shreya Jain
Sharathchandra Kamath

2.3 Web 2.0 has enabled mashups data

8 3.0 KEY

TECHNOLOGIES OF WEB 2.0 Blogs 3.1.1 Business Insight of Blogs 3.1.2 Blog Mining 3.2 Wikis 10

9

3.1 10 11 12

2

Group 7 – WEB 2.0 3.2.1 Business Insights of Wikis 3.3 RSS 3.3.1 Business Insight of RSS 4.0 KEY ASPECTS OF WEB 2.0 5.0 BUSINESS IMPACTS OF WEB 2.0 5.1 Reducing the Cost of Customer Care 5.2 The Financial Impact of Web 2.0 5.3 Some Examples of Web 2.0 in Business 6.0 WEB 2.0 FACILITATING THE OVERALL BUSINESS EFFICIENCY 6.1 Better Customer and Supplier Relationships 6.2 Comparative Advantage to firms 6.3 New Avenues to Serve Customer Better 6.4 Innovations in Security 7.0 WEB 2.0 AND SECURITY 7.1 Preventive Measures 7.2 Security Implications in Social Networking Sites 7.3 Measures to Prevent Security/Privacy Attacks 8.0 LOOKING AHEAD – THE FUTURE OF WEB 2.0 8.1 The Emerging Field of Web Science 8.2 The Continued Development of the Web as Platform 8.3 Trust, Privacy, Security and Social Networks 8.4 Web 2.0 and SOA 9.0 WEB 3.0 9.1 Semantic Wikis 9.2 Semantic Blogging 9.3 Semantic Desktop 9.4 Web 2.0 VS Web 3.0 10.0 REFERENCES 11.0 GLOSSARY ANNEXURE – 1: Moving towards Web 2.0 ANNEXURE – 2: Web 2.0 Landscape ANNEXURE – 3: How to add an RSS feed to your reader
3

12 13 14 14 15 15 16 17 18 18 19 19 20 21 22 22 23 23 24 24 24 25 26 27 27 27 28 28 29 30 31 32

Group 7 – WEB 2.0 ANNEXURE – 4: RSS and Web 2.0 33

FIGURES and TABLES USED IN THE REPORT
Figure 2.1: Evolution of the World Wide Web Figure 2.2: The Web 1.0 Participation Model Figure 2.3: Web 2.0 Participation Model Figure 2.4: A sample application/data mashup Table 2.1: Comparison Between Web 1.0 and Web 2.0 Figure 3.1: How RSS works Figure 3.2: Where Web 2.0 will be applied Figure 8.1: SOA and Web 2.0 Figure 8.2: Web 3.0 framework 5 6 7 8 9 13 17 25 26

4

Group 7 – WEB 2.0

WEB 2.0
VIEWING WEB AS A PLATFORM NOT AS A SERVICE 1.0 INTRODUCTION The word Web 2.0 does not refer to any technology as such. It just refers to the way how we have changed our usage of the World Wide Web. In the earlier period of internet (now known as Web 1.0) website were used like phone books, encyclopaedias and the sorts. Web 2.0 has enabled the usage of Web as a platform for development of new programs and interactive tools. However, its definition is greatly dependent on how users implement these functions. 2.0 EVOLUTION OF THE WORLD WIDE WEB

During the past two decades, the world has witnessed a technological revolution that has provided a totally new medium of communications entirely new to mankind. What is known today as the World Wide Web (WWW), grew out of a project for the US Department of Defense that began with a different intent in the late 1960s. The purpose of the Network was to study how researchers could share data with each other, and how communications could be maintained/sustained in the event of a nuclear attack. This project was presided by the American Research and Projects Association (ARPA) and later came to be known as the ARPANET. The ARPANET evolved with time and was eventually turned over to the National Science Foundation Figure and ultimately became known as Wide (NSF) 2.1: Evolution of the World “Internet” which the NSF allowed
Web 5

Group 7 – WEB 2.0 access to businesses, universities, and individuals. Thus, in 1992 the World Wide Web was launched. 2.1 What was Web 1.0? Presented below is the participation model of the classic web or Web 1.0, as it is better known today.
Site Owner

Site Visitors

Figure 2.2: The Web 1.0 participation model

The Web 1.0 model portrayed Web as a static medium. Here, the site owner creates content in basic HTML pages and posted this content on the Web page. This Web site was accessed by the site visitors for informative purposes. The visitors gave feedback and suggestions to the site owners through the “Contact Us” link on the website. The site owner used this data to add/modify content on the website. Here, the role of the user was just an informationseeker and the website was more like an information portal i.e. much like an online telephone directory or encyclopaedia, which divided the WWW into usable directories. In short, the website was static in nature with each one allocated their own corner in the cyberspace and it lacked user-interaction, context and scalability. 2.2 What Web 2.0 has enabled? Web 1.0 laid the foundation for the technological revolution that occurred during the transition of the century. Many technologies like RSS, SOAP, Weblogs, SaaS, Social Networking, etc. modified the way the people started using the Web – from that of a platform
6

Group 7 – WEB 2.0 to as a Service. Finally, in 2004, Tim O’Reilly coined the term Web 2.0 to indicate this change of usage and to define the various other ways in which the Web can be used in future. While Web 1.0 used internet pages written in HTML describing the form and content of the web page, Web 2.0 is a combination of applications that run directly from the internet rather than on the user’s computer. These applications are written in AJAX (Asynchronous JavaScript and XML). XML facilitates automated data exchange and describes only the content of the website. Asynchronous JavaScript enables real-time updating of websites. For example, when a friend writes a scrap for you in Orkut, you can see it appearing in fraction of a second on your scrapbook. Google is probably the best-known vendor of such an approach, with its “Google Apps” providing simple-but-adequate word-processing, spreadsheet, and presentation capabilities that compete with traditional PC-based products like Microsoft Office.

The figure above shows the Web 2.0 participation model. Here, the service provider has to make available the technology platform as well as facilitate the knowledge exchange by a set of formalized guidelines. However all creation of content like music, video, etc is done by the user. The user can also embed third party content and link on the website. For example, Digg publishes news stories from around the web. Users contribute their own news stories as well as noting other publications’ stories and all users “digg” or rate them. The Diggers also add comments to the stories and rate the comments of others, too, determining the stories’ prominence on the site. The more users who contribute and rate stories and comments, the more effective the service gets.
Figure 2.3: Web 2.0 Participation Model

Hence, Web 2.0 can be summarized as a combination of technologies, business practices, and social trends that facilitate the individual creation, control, and sharing of content on the Internet. The most fundamental requirement for Web 2.0 is high speed internet which was not available a decade ago. The evolution of broadband internet in developing countries has given the biggest platform for Web 2.0 applications (programs). 2.3 Web 2.0 has enabled data mashups

7

Group 7 – WEB 2.0 Users add content or create content like new applications, embedding video, etc. to the webpage by a mashup. A mashup is created by combining APIs. API stands for Application Processor Interface. APIs are a set of routines, protocols, and tools for building software applications i.e. APIs are the basic building blocks of an Application. APIs are generally open source codes available freely on the internet. The user can put these blocks together to build a custom application that can run on the web. A user can also modify an API to create a custom application. When the user merges two different APIs to create a new application, it results in a mashup, which is an integrated online offering. For example, a user can use the RSS feed API of New York Times to identify the locations in his pin code where crimes took place recently. By mapping this API with the API of Google maps, the user can create a new application in his blog/webpage that displays the locations of crime on the Map. A search result of the application would look like the picture shown in Figure 2.4

Figure 2.4: A sample application/data mashup TABLE 2.1: Comparison between Web 1.0 and Web 2.0

Web1.0
(1993-2003)
Pretty much HTML pages viewed through a browser

Web 2.0
(2003- beyond)
Web pages, plus a lot of other “content” shared over the web, with more interactivity; more like an application than a “page” Mode Primary Unit of content “Write” & Contribute “Post / record”

“Read” “Page”

8

Group 7 – WEB 2.0
“static” Web browser “Client Server” Web Coders “geeks” State Viewed through… Architecture Content Created by… Domain of… “dynamic” Browsers, RSS Readers, anything “Web Services” Everyone “mass amatuerization”

3.0 KEY TECHNOLOGIES OF WEB 2.0: The creator of Web 2.0, Tim O’Reilly summarized Web 2.0, “Web 2.0 is the business revolution in the computer industry caused by the move to the Internet as platform, and an attempt to understand the rules for success on that new platform. Chief among those rules is this: Build applications that harness network effects to get more people to use them.” In short, the foundation of Web 2.0 is collaboration. But how do individuals, workgroups, and communities of similar individuals collaborate on a global scale? At the core of Web 2.0, three distinct technologies empower individuals to collaborate on a scale never before achieved: blogs, wikis and RSS (which stands for “Really Simple Syndication”.) While these three technologies first emerged from the consumer market through social networking sites such as myspace.com, they are evolving to address the needs of the enterprise, and in the process of doing so provide early adopters with unparalleled competitive advantage. The following section details about the technologies and gives their implications in Business Management. 3.1 Blogs Many are surprised to learn that General Motors is an ardent proponent of blogging to reach a broad range of customers. During a recent interview, Vice Chairman Bob Lutz of General Motors described his company’s adoption of blogs, “No better opportunity exists to engage in an open dialog and exchange of ideas with customers and potential customers than using blogging technology.”

9

Group 7 – WEB 2.0 The term web-log, or blog, was coined by Jorn Barger in 1997 and refers to a simple webpage consisting of brief paragraphs of opinion, information, personal diary entries, or links, called posts, arranged chronologically with the most recent first, in the style of an online journal. Most blogs also allow visitors to add a comment below a blog entry. Each post is usually ‘tagged’ with a keyword or two, allowing the subject of the post to be categorised within the system so that when the post becomes old it can be filed into a standard, theme-based menu system. Clicking on a post’s description, or tag (which is displayed below the post), will take you to a list of other posts by the same author on the blogging software’s system that use the same tag. The most successful blogs traditionally provide commentary, news and/or insight on a particular subject. More often than not, blogs combine text, images, video, audio and links to other blogs, web pages, and other content related to their core topics. Blogger.com is a very good example of blogs. 3.1.1 Business Insight of Blogs: Blogs provide an excellent means of promoting products, articulating solutions, and exposing a brand to search engines such as Google - the primary means by which prospective customers locate product and service information. Blogs are the best online information gathering tools. This is because blogs provide the neutral platform for the users or potential users to ask questions and drop in the answers. This in turn facilitates for an open discussion about the product and thereby helps the R & D team of a company to know the true tests of customer, which can rarely be captured through the formal traditional ways. More often than not, blogs are used to reinforce their brands and compliment traditional marketing campaigns through media channels such as television and radio. Similarly, while advertising, promotional and collateral sources provide more direct control, blogs are often believed to offer more credibility since they channel real world customer observations and insight. This open exchange of ideas often translates to a less threatening means of reaching prospective customers, particularly during the discovery process when many are gathering information and in the early stages of opening a dialog with a product or service provider. Using the tagging feature of blogs, the problem of getting quick-hitting content to people that
10

Group 7 – WEB 2.0 need it is enabled. Similarly, the effective use of blogs enables users to develop a dialog (or read the dialog of others) before committing to a product or service. Additionally, because blogs are not restricted by classic call centre constraints – for example, call volumes, staff levels, time zones differences, etc. – customers and prospects can often access critical information without consuming expensive resources. A very good example of blogging in Indian Context is the online shopping portals like Ebay, Rediff, Indiaplaza, etc. These sites provide blogging option for users to comment and rate the seller and the product. New buyers find this information useful while looking for information about the quality & specifications of the product, delivery time taken, after sales service and integrity of a seller. The seller rating feature of Ebay has made it the most favourable and trustable site for online purchases. In a similar way, Dell Computers also provides blogging for users to comment on the recent Dell product they purchased. 3.1.2 Blog Mining Blog Mining is another concept which is taking its hold in the online environment. Blog mining is similar to data mining- in that, it refers to the thread searching in the blog and coming out with relevant results. It is quite necessary to mine the blogs for usable and measurable competitive, distribution, product development, service, and support insights. Capturing information from the chaos of scattered data is the challenge. That's why blog mining is starting to get real. Many search methods have been proposed to carry out successfully mine the blogs. This has in turn provided entrepreneurs another tool to compete in the online war by coming up with blog mining tools. Example: SAS, SPSS, BTT (BlogPulse tracking tool). BuzzMetrics is a company which gives a methodology of mining the blogs mentions of a company or product and also tracks the impact of the word-of-mouth influence in purchase decisions. Techdirt Inc. is a company that provides competitive intelligence for its customers. The concept of Techdirt is to scan blogs, web pages, and any other form of
11

Group 7 – WEB 2.0 publically available electronic information and then deliver to its customers, a personalized blog of information on market information, competitive analysis and major news from your industry. 3.2 Wikis A wiki is a webpage or set of WebPages that can be easily edited by anyone who is allowed access. Wikipedia’s popular success has meant that the concept of the wiki, as a collaborative tool that facilitates the production of a group work, is widely understood. Wiki pages have an edit button displayed on the screen and the user can click on this to access an easy-to-use online editing tool to change or even delete the contents of the page in question. Simple, hypertext-style linking between pages is used to create a navigable set of pages. 3.2.1 Business Insights of Wikis Increasingly, companies that consider themselves “technology early adopters” are applying wikis to non encyclopaedic content such as product information, company profiles, documentation, and user guides. Instead of explicit document versioning, wikis simplify the approach to content collaboration by maintaining a single shelf product that anyone can review, change, edit or annotate. Wikis encourage participation and contribution, which in turn generates more valuable and relevant content for all participants. In the view of business implications, Wiki can be viewed as information dissemination tool. That is, all the information, say about a product, can be kept at one place can be made accessible to the users, say by the manufacturer of the product. By this, the users can get all the information at one stop and that too, reliable or accountable - for the reference of the information giver can be tracked, if required. Thus the reader remains assured of the authenticity of the information. Also, if not for commercial use, the Wikis can also be used as an information disseminating tool within the company. This helps better when a common message or information is to be propagated to all the employees of the company. In a way, it can act as an intranet. For example, Infosys Technologies uses ‘Sparsh’ which in fact, is a Wiki application. Nokia’s “Insight and Foresight” business unit – a group which, not surprisingly, identifies disruptive technology and business model developments – embraced wikis “as an alternative
12

Group 7 – WEB 2.0 to email.” Wiki was used as an alternative to email in many other companies too. Additionally, because coordination was conducted openly – for everyone to observe and contribute – instead of hidden in email, other team members benefited as well. This helped departments collaborate and work together by adding views and data in a single page, which was viewable by everyone, and this reduced the clogging of inboxes and uncooperative ways of communication. Communicating through wiki enables participation of everyone as anyone can come in at any point of time and read the happenings. In the Indian context, Pagalguy.com has used wikis to help students participate in discussion with peers from their aspired b-schools. Since all conversations in the web pages are displayed, a person can see all the discussions at any point of time and reply to any statement made. This has helped many students prepare for b-school exams and interviews. Wikis also allow creation of online polls and have proven to of a great benefit to marketing research companies. These companies can now conduct relevant surveys by choosing apt samples of population at reduced costs or at no cost at all. 3.3 RSS The third and final component of Web 2.0 technology is RSS, an abbreviation for “Really Simple Syndication.” The following model shows how the RSS works.

Software programs known as “Feed Readers” or “Aggregators” routinely check a user’s “subscribed feeds” to see if any of those feeds have new digital content such as news, blogs or podcasts. If there is new or updated content, the digital content is retrieved and that
13

Figure 3.1: How RSS works

Group 7 – WEB 2.0 content is presented to the user. Google News Alerts, for example, is a Google branded RSS feed service. 3.3.1 Business Insights of RSS: RSS can be used as a marketing tool for business. This is because RSS can keep a track of the users of an online service, as it keeps a track of any updates in online news website. This address tracking can be of great help in informing the customers/site viewers when a company launches a new product or introduces a new scheme. This is particularly true in banking sector where new offers and deposit schemes are launched very often. The use of RSS has increased especially after the CBS (Core banking system) adoption on a large scale in various banks. For example: ICICI bank and ICICI Life insurance company (icicidirect.com) makes use of RSS extensively. Pagalguy.com, Marketingnews.com, etc. are again an examples of RSS feeds. A user gets subscribed to a discussion thread if he/she replies or posts content in that discussion thread. If any person replies to the user’s message or post a new message in that thread, the user immediately gets notified by email – the feed readers pickup that message, look for the user’s mail id in the user’s database, check if the user has enabled RSS settings, then send the message to the user. This has proven to be of great use to many people in research and product development, etc. 4.0 KEY ASPECTS OF WEB 2.0 The key aspects of Web are: • • • Interpersonal Computing Web Services Software as a Service (SaaS)

Interpersonal Computing is about using online technology to connect people to each other in social networks or in business teams. Examples of these are Facebook, Blogger, Orkut, Flickr and YouTube. This feature of Web 2.0 allows people to exchange messages with each other and also photos and videos. The end user is the key-person in modifying or adding to the content to the website. Web Services are components of online functionality (APIs) that can put together to form a mashup. As explained above, two applications from different websites can be integrated
14

Group 7 – WEB 2.0 together to form a new application. An example of this is the ability to embed a YouTube video in your blog or webpage, thus using YouTube’s API to run the video on your blog/website. Example: Embedding YouTube videos in Orkut website under the header “My favourite videos” is using YouTube’s API with Orkut’s API. SaaS is another offering of Web 2.0 that helps a user run an application online, an application that is not installed in his computer. GoogleDocs is a basic example of SaaS. It provides with office components like word documents to be used without being installed on the machine. The development in this field has led us to an era where, now, online operating systems are available. For example, Knopix is a Saas which has all the kernel files stored on the CD and we can directly run the Linux CD without installing the OS onto the system. GlideOS 3.0, YouOS and eDesk are some examples of online desktops which enable a user access his files from anywhere across the world. 5.0 BUSINESS IMPACTS OF WEB 2.0: 5.1 Reducing the Cost of Customer Care Most businesses direct their customers to a website as the first resource for issue resolution. If the inquiry cannot be resolved online, then more often than not, the customer places a phone call to the company and an agent, in turn, logs a support incident or trouble ticket. If the inquiry is not resolved with the call center representative, the trouble ticket is forwarded to a support engineer who in turn may consult with additional resources such as engineering, quality assurance or product management. When applied to the world’s largest companies, the size and scope of this process is vast. In fact, in a typical Global 1000 technology company, approximately 500,000 support-related inquiries are recorded each year. Almost 60% of these inquiries are relatively insignificant in nature and will not have a major impact on the customer’s business. Successful companies that embrace Web 2.0 and mass collaboration are augmenting their support portals with wikis, blogs and RSS services that allow customers to create fast, fluid and innovative content. A marketing director at SAP, the global software giant, explains that Web 2.0 technologies “are not a replacement of our corporate portal, but an addition to it.” By fostering a community of users that rely on a company’s products and services, and encouraging customers to exchange ideas, recommend best practices and address one
15

Group 7 – WEB 2.0 another’s support issues, forward-leaning companies are finding that they can deliver more proactive customer care at lower costs. In fact, Stata Labs, the software company that develops the Bloomba email client and SA Proxy Pro Spam Filter software, relies on wikis and blogs to promote collaboration across its customers and empower support staff-members to solve problems faster. In particular, Web 2.0 technologies help integrate a first-line support team in India with the second-line support team in India. Each support request generated on the website sends an email to a support wiki; requests are automatically categorized. “Firsttier support reps query the wiki knowledge base for pre-written answer templates, but if they don’t know the answer, they can use the workspace to compose standard answers.” 5.2 The financial impact The desire to cut costs and increase revenue is behind this widespread adoption of Web 2.0. A full 79% of companies surveyed see the collaborative aspects of Web 2.0 as a way to increase corporate revenue and/or margins. As a cost-reducer, 30% of companies expect Web 2.0 tools to trim the most in customer-service and -support costs. “Instead of a call centre with 5,000 people, you could have one with 2,000,” says Citigroup’s Mr Koeppel, because customers can find their own answers to questions online. However, 21% of companies also expect Web 2.0 tools to lower public relations, advertising and marketing costs, while 17% expect to reduce the costs of product and service innovation. Blogging, for example, “is very effective from a marketing and branding standpoint,” says Anthony Christie, executive vice-president and chief marketing officer at Global Crossing Ltd, a US$2bn telecoms company that provides broadband, voice, data and multimedia communications solutions in more than 600 cities in 60 countries on six continents. “It’s an extremely efficient, low-cost approach to building your brand.” For example, in 2006 the world’s largest car manufacturer, General Motors (GM), followed its successful launch in 2005 of a blog called FastLane with a second blog called FYI. This strategy helped GM change consumer perception that GM is impersonal. As well as cost reduction, though, many businesses also expect Web 2.0 to add to their revenue.
Marketing and sales Customer service Information and research IT 28% 54% 47%

16

Group 7 – WEB 2.0
Strategy Operations General management R&D Supply-chain management Finance Human resources 10% 17% 14% 14% 14% 13% 11%

8% Procurement 4% Legal 4% Risk 3% Source: Economist Intelligence Unit survey, January 2007

Figure 3.2: Where Web 2.0 will be applied

5.3 Some Examples of Web 2.0 in Business AdSense Google's AdSense program lets a website/page owner sell advertising space for other people's ads on his website--and not just any ads that Google chooses, but ads that are relevant to his site's content pages. The service is free, and the owner earns money every time someone clicks on an ad. AdSense has become popular with bloggers and other people who run non-commercial sites. You sign up, carve out some space on your pages for the ads, paste a few lines of code from Google into the HTML for your site, and let Google fill in your pages with color-coordinated ads. When somebody clicks one of the ads, Google pays you a fee (the amount varies, and the company doesn't disclose its payments). Second-life Grid Second Life is an online social networking site which has recently opened up a new concept called Second Life Grid. Here the users can buy virtual land called grid and use virtual cash (which is purchased using Domestic currency) to construct buildings and facilities to resemble their desired environments. The advantage of this is that users can form online social networks, Business can conduct meetings in the virtual environment, professors can conduct class for all students. This helps reduce overhead costs of buildings, facilities, etc that would be incurred otherwise.
17

Group 7 – WEB 2.0 Visionary international corporations – Michelin, IBM, Xerox, Saint-Gobain Glass, Harvard School of Law, and Stanford Business School -- have established and grown significant presences on the Second Life Grid. These organizations have built spaces in Second Life Grid in some of these ways: • • • • • • • Hold in-person meetings without leaving the office, using real-time 3D collaboration Construct product and process simulations so employees and business collaborators from all over the world can test new designs and concepts Conduct employee training especially one-on-one training Meet with global partners at your virtual headquarters Receive product feedback from clients Conduct virtual classrooms and courses. Build community around your brand

6.0 WEB 2.0 FACILITATING THE OVERALL BUSINESS EFFICIENCY 6.1 Better customer and supplier relationships Web 2.0 ushers in a collaborative nature of relationships - Web 2.0 applications have opened up a lot of communication channels--and opportunity--for business professionals. Now they can reach out to individuals from across the globe and share content and web applications. Through blogs, wikis, and social networking sites such as Facebook and LinkedIn, people are becoming more and more electronically intertwined. "There's a sense of security in a Web 2.0 world where people trust their personal information to others," says Jordan Frank, VP of sales and marketing for Traction Software. "Ensuring success in Web 2.0 means that trust doesn't get broken," says Frank. Most companies don't want to restrict the collaborative flow that Web 2.0 has brought with it; and they want to continue to build on their Web 2.0 platforms. A Gartner Executives Programs survey of 1,500 CIOs from across the globe revealed that half of the respondents expected to invest in Web 2.0 technologies for the first time in 2008. Internet experts agree that part of that investment must include security measures to protect organizations' intellectual property.
18

Group 7 – WEB 2.0 6.2 Competitive advantage to firms Web 2.0 adds competitive advantage to firms - With the spread of corporate sponsored Web 2.0 applications IT managers have started to install tools that can measure and analyze activities. Companies could use the data from these sites to significantly improve customer relations and even measure the hype surrounding their brands. Kimberly-Clark Corp. first created an online community — Scott CommonSense — for users and potential users of its Scott personal care products in 2004. The consumer products company began taking steps to analyze the data compiled by the Web 2.0 application. The community offers information such as personal finance and healthy living advice and enables members to interact with one another. The more the member participates in the community, the more loyal he becomes to the company's products. 6.3 New avenues to serve customer better Web 2.0 unfolding new opportunities - Several vendors are moving quickly to meet what they expect will be growing corporate demand for Web 2.0 analytics tools. For example, Omniture Inc., Utah-based Web analytics vendor and Lithium Technologies Inc., a social media platform supplier in Emeryville, Calif joined forces to link their products to provide corporate customers with what the companies described as a holistic view of user behavior across multiple Web properties, including online communities. The integrated offering will help businesses capture social data from blogs and forums and integrate that information with other pertinent company online data. BuzzAboutWireless, based on Lithium's platform, uses Omniture analytics to better measure how social media can be used to acquire new customers and otherwise boost business, Omniture said. In yet another example, Demand-Base Inc. launched Demand-Base Stream, a free desktop widget that can be used to identify visitors to a corporate Web site. When a company or organization visits a corporate site, the Demand-Base tool streams the identity of the visitor across the bottom of desktops used by Web site operators, noted Demand-Base CEO Chris Golee.

19

Group 7 – WEB 2.0 Responsys Inc. is using Demand-Base Stream to ascertain whether sales calls or e-mails to potential customers have been successful, said Scott Olrich, chief marketing officer at the San Bruno, Calif.-based e-mail marketing company. The sales team at Responsys learns immediately when a recipient of a sales call visits its Web site. The company uses the LinkedIn process to contact the prospect, Olrich said. The data mining engine alerts users to the key data on a site. It also identifies unimportant data that can be ignored. NuConomy's Studio Weboffering includes a two way API that lets operators change the look of sites based on current metrics and insights. Web site operators can change advertising on a page or push specific content to a user based on his interests. by opening APIs in order to help third-party developers build applications using data compiled by the analytics tools. For example, some developers have built applications that display Google Analytics data on Apple's iPhone, while others have developed Flash-based versions of the service. 6.4 Innovations in security Web 2.0 brings forth better commitment to security - Just as collaboration in a Web 2.0 environment is a continuous process, security measures require the same diligence. The proactive approach that is necessary to have successful Web 2.0 security measures in place is catching on. The solutions must still be easy for companies to integrate into their operations such as the ones that Central Desktop offers provide companies with a slate of secure tools that have consumer-friendly functionality. So security becomes an easy process for them to control. Companies are likely going to have to continue navigating themselves through the security issue, since they may not get a guiding hand from developers. More enterprises are testing software before it is even installed as a way to prevent potential security issues from occurring in the first place. While Web 2.0 security features can create a more productive work environment, there are also financial benefits. What companies need to recognize is that implementing security measures can serve as a competitive advantage - cost advantage of fixing things early in the cycle. Fortunately, this shift is occurring. Web 2.0 security solution providers say that they have seen an increased interest in security products from customers. They expect the need for
20

Group 7 – WEB 2.0 such solutions will continue to grow as Web 2.0 applications are further developed and integrated into the workflow. 7.0 WEB 2.0 AND SECURITY As has been seen web 2.0 has opened opportunities for business professionals, as they can reach out to individuals from across the globe and share content and web applications. Users trust the sharing of information in this medium just because their friends do, or simply because these sites have not let them down. But with new technologies come new vulnerabilities and more security concern. The older version used static pages when compared to dynamic AJAX-enabled websites in case of Web 2.0. Web 2.0 applications are vulnerable to a variety of threats, from cookie tampering to cross-site scripting (XSS) attacks. Often, when such attacks occur, the user is unaware that his computer and more important data has been compromised Companies are facing security issues on both the client side and the server side. Web 2.0 uses Web Services in addition to traditional web usage like jsp and asp. SAOP protocol which is used in web services is conveyed over HTTP. All this imply that traditional protocol level attacks on HTTP, SMTP, FTP, etc apply even when conveying SOAP/XML messages. The different security issues are: (i) Authentication If a feed requires authentication, then authentication based attacks such as replay, session/credential hijacking is possible. (ii) Client Side Attacks: Cross-Site Scripting & Forgery A feed can contain content from various sources. When such content is presented to the user in a single web page, applying a single security model for a browser is almost impossible. This will eventually lead to cross-site scripting and forgery attacks. 7.1 Preventive Measures Don’t drop your guard: People don't read licensing agreements, they'll add a widget or they'll click on a link and as a result the "bad guys" have got so better at making harmful applications look legitimate which finally affects the end user.

21

Group 7 – WEB 2.0 Purchasing security tools: IBM acquired Watchfire and HP bought SPI Dynamics. These companies developed security tools. These security tools scan and test web applications for security vulnerabilities. It also offers recommendations for how to fix problems that are identified, which helps organizations close the loop on their security issues. Mi5 Networks has technologies that will block users from visiting a webpage that is identified as a risk. They receive a message that informs them that the particular page violates company policy Securing Enterprise 2.0: Apart from authentication which is the general security check, other important aspects of security include permission/access control, an audit trial and monitoring. Softwares such as traction software address all of the above issues. Commitment required: This is required from the business owner who needs to take a proactive approach in order to face less vulnerability. Staying Safe on Social Networking Sites: Social networking sites, sometimes referred to as "friend-of-a-friend" sites, build upon the concept of traditional social networks where you are connected to new people through people you already know. 7.2 Security Implications in Social Networking Sites Social networking sites rely on connections and communication, so they encourage you to provide a certain amount of personal information. When deciding how much information to reveal, people may not exercise the same amount of caution as they would when meeting someone in person because • • • • the internet provides a sense of anonymity the lack of physical interaction provides a false sense of security they tailor the information for their friends to read, forgetting that others may see it they want to offer insights to impress potential friends or associates

While the majority of people using these sites do not pose a threat, malicious people may be drawn to them because of the accessibility and amount of personal information available on them. The more information malicious people have about others, the easier it is for them to take advantage of others. 7.3 Measures to prevent security/privacy attacks:
22

Group 7 – WEB 2.0 • Limit the amount of personal information you post - Do not post information that would make you vulnerable (e.g., your address, information about your schedule or routine). If your connections post information about you, make sure the combined information is not more than you would be comfortable with strangers knowing. • Remember that the internet is a public resource - Only post information you are comfortable with anyone seeing. This includes information in your profile and in blogs and other forums. Also, once you post information online, you can't retract it. Even if you remove the information from a site, saved or cached versions may still exist on other people's machines • Be wary of strangers - The internet makes it easy for people to misrepresent their identities and motives Consider limiting the people who are allowed to contact you on these sites. If you interact with people you do not know, be cautious about the amount of information you reveal or agreeing to meet them in person. • Be skeptical - Don't believe everything you read online. People may post false or misleading information about various topics, including their own identities. This is not necessarily done with malicious intent; it could be unintentional, a product of exaggeration, or a joke. Take appropriate precautions, though, and try to verify the authenticity of any information before taken any action. • Check privacy policies - Some sites may share information such as email addresses or user preferences with other companies. This may lead to an increase in spam. Also, try to locate the policy for handling referrals to make sure that you do not unintentionally sign your friends up for spam. Some sites will continue to send email messages to anyone you refer until they join. 8.0 LOOKING AHEAD - THE FUTURE OF WEB 2.0 Within 15 years the Web has grown from a group work tool for scientists at CERN into a global information space with more than a billion users. Currently, it is both returning to its roots as a read/write tool and also entering, through the power of the six big ideas, a new, more social, community and participatory phase. But where will it go next? Although Web 2.0 is barely off the ground, some are already beginning to ask: What will Web 3.0 look like?
23

Group 7 – WEB 2.0 The Web, or more precisely the network, as platform and the idea of software above the level of a single device is becoming firmly entrenched as a concept and it is likely that over the next few years we will start to perceive personal computing more as a process of interacting with networked services rather than using a particular computing device. This trend can only be exacerbated by the move towards ubiquitous computing. 8.1 The emerging field of Web Science Web science is an emerging discipline, recently proposed by Tim Berners-Lee and his colleagues at the University of Southampton and MIT. Its goal is to understand the growth of the Web, its emerging topology, trends and patterns and to develop new scientific approaches to studying it. Increasingly, given the importance of the Web as a social tool, there will be more research into the social and legal relationships behind information. 8.2 The continued development of the Web as platform Computing software architecture tends to go in phases, paradigms even, and the Web or network as platform is one such paradigm. In coming years an increasing number of tools and operating system-like software will emerge to further this process. An example of this is Parakey, which is currently being developed by the co-founder of the Mozilla Firefox project, Blake Ross. It will provide a browser-based way to access and manipulate the contents of your desktop PC and also allow others, with your permission, to do the same. In effect, it provides software that essentially turns your computer into a local server. 8.3 Trust, privacy, security and social networks A great deal of discussion is taking place around provenance, reputation, privacy and security of Web and email data. The sheer scale of material that people are prepared to post, often the most intimate details and photos that a generation ago would only have been seen and known by a handful of friends is changing the nature of privacy. There is also a growing awareness that as the volume of information available from the Web grows the ability to determine what is accurate and from a trusted source becomes ever more difficult. Increasingly, there is concern about some of the more dubious aspects of search engine optimisation (in which search engines are manipulated so that certain websites appear higher in the rankings), web link spam (groups of pages that are linked together with the sole purpose of obtaining an undeservedly high score in search engine rankings).
24

Group 7 – WEB 2.0 There are large numbers of spam and email filters on the market and despite best efforts they are still not regarded as fully adequate. A tool bar inserted into the Web browser provides information on the trustworthiness of the website being viewed based on knowledge and ratings obtained both from a social network of friends and colleagues and trusted third parties (such as Consumer Unions and PayPal). 8.4 Web 2.0 and SOA Service-Oriented Architecture (SOA) is an architectural approach in which highly independent, loosely-coupled, component-based software services are made interoperable, and there is now some discussion around a potential synergy between Web technologies and SOA. In particular, some argue that bringing together the rich front-end user experience provided by the latest Web technologies such as RIA with SOA-enabled technologies at the back end could provide improved reliability, better scalability, and better governance. Both have openness, data re-use and interoperability at their core. In fact, Web 2.0 data mashups could be considered similar to the composite applications of SOA (see diagram below). There are, of course, differences: SOA relies heavily on governance, which Web 2.0 lacks.

9.0 WEB 3.0

Figure 8.1: SOA and Web Source: http://web2.wsj2.com

At the WWW2006 conference in Edinburgh, when asked by TechWatch about the likely characteristics of 'Web 3.0', Tim Berners-Lee stated that he believes that the next steps are
25

Group 7 – WEB 2.0 likely to involve the integration of high-powered graphics (Scalable Vector Graphics, or SVG) and that underlying these graphics will be semantic data, obtained from the RDF Web, that ‘huge data space’. A focus on visualisation is also evident elsewhere: Ted Nelson, the inventor of hypertext, is working on FloatingWorld: a system for displaying documents, including the links between them, in three dimensions. He recently spoke of the idea of translating this concept to a 3-dimensional social networking system. In addition, IBM recently announced the winning ideas in an international search for technology developments that it would fund to the tune of $100Million over the next couple of years. One of the winners was the ‘3D Internet’ which will take the best of virtual worlds such as Second Life and gaming environments, and merge them with the Web. However, it could be argued that this, once again, is focusing on Web technologies and not looking at the big ideas. For this we should maybe go back to the fundamental idea of the topology of the Web and take a look at what kind of a legacy Web 2.0 may have left us with. If some of the more negative effects of Web 2.0 have taken hold to a demonstrably detrimental effect, it is quite possible to envisage a situation where 'Web 3.0' would become a backlash to Web 2.0. As part of this process there are several areas where developments in Semantic Web and those within social software are beginning to be explored in consort:
Everything, Contextualizing Extracting meaninginto Changing the web the from the everywhere, web based on the way people interact with the THE SEMANTIC WEB a language that can be all the people using web time it read and categorized by the system rather ARTIFICIAL INTELLIGENCE than humans

PERSONALIZATION

MOBILITY

The Semantic Web is “a web of data”. With semantic web, computers will scan and interpret Figure 8.2: Web 3.0
Framework information on web pages using software agents. The software agents will be programs that

crawl through the web, searching for relevant information. Theses agents will have collection of information called ontologies, which exist in the form of metadata. Metadata is
26

Group 7 – WEB 2.0 information included in the code for web pages that is invisible to humans but readable to computers. 9.1 Semantic Wikis This is a developing research area, but in essence, researchers are looking at ways to annotate wiki content with semantic information. A Semantic wiki allows users to make formal descriptions of things in a manner similar to Wikipedia, and also annotate these pages with semantic information using formal languages such as RDF and OWL (Oren et al., 2006). A number of engines are being developed to support this concept including Platypus and SemperWiki. 9.2 Semantic Blogging Blogs can be more than an easy-to-use publishing tool. Their ability to also generate machine readable RSS and Atom feeds means that they can also be used to distribute machinereadable summaries of their content and thus facilitate the aggregation of similar information from a number of sources. Traditionally, these feeds are used for the headlines from blog postings, but by combining the ideas behind the Semantic Web with blogging software – Semantic Blogging – it may be possible to develop new information management systems. For example, RDF semantic data can be used to represent and export blog metadata, which can then be processed by another machine. 9.3 Semantic Desktop It is envisaged that combining the ideas of the Semantic Web and Web 2.0 services with traditional desktop applications and the data they hold (such as word processor files, emails and photos) on your local computing device will facilitate a more personalised way of working. In theory, this should create a more focused information and knowledge management environment, helping to find a way through personal ‘data swamps’. Research work is at an early stage, but IBM is working on QEDWiki, a wiki-based application framework for collaboration working which enables the creation of enterprise mash-ups. 9.4 Web 2.0 VS Web 3.0 Web 2.0 “Read-write web” Web 3.0 “Portable personal web”
27

Group 7 – WEB 2.0 Focused on communities Blogs Sharing Content – XML,RSS Web Applications Tagging (“folksonomy”) Google Focused on individual Life stream Dynamic content – semantic web Widgets, drag-drop mash ups User behavior (“me-onomy”) iGoogle, NetVibes

10.0 REFERENCES 1. TIM O’REILLY. What is Web 2.0: Design Patterns and Business Models for the next generation of software. O'Reilly website, 30th September 2005. O’Reilly Media Inc. http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html 2. Blog Mining through Opinionated Words by Giuseppe Attardi and Maria Simi, University of Pisa. 3. TIM O’REILLY. Web 2.0: Compact Definition. O'Reilly Radar (blog), 1st October 2005. O’Reilly Media Inc http://radar.oreilly.com/archives/2005/10/web_20_compact_definition.html 4. TIM O’REILLY. People Inside & Web 2.0: An interview with Tim O’Reilly. OpenBusiness website, April 25th 2006. http://www.openbusiness.cc/category/partners-feature/ 5. http://search.ebscohost.com 6. Wikipedia 7. www.google.com 8. Business Week – Web 2.0 has Corporate America Spinning 9. Web 2.0 by Ed Yourdon, September 2007 10. www.us-cert.gov 11. www.suitetwo.com 12. www.secondlifegrid.com 13. www.howstuffworks.com

11.0 GLOSSARY:
28

Group 7 – WEB 2.0
Blog Personal or corporate online journal that offers reporting and opinion about people, things and events. The use of Web 2.0-type concepts and software (see below) within an enterprise. Enterprise 2.0 was first used by Andrew McAfee of Harvard Business School in the Spring 2006 MIT Sloan Management Review. An application that pulls and displays information from Mash-up multiple sources in response to user queries to deliver a customised result. A situation in which a product or service becomes more Network effect valuable the more people use it. Really Simple Syndication, an online system that lets average consumers designate what news or information they want RSS multiple sources to deliver directly to them. An online labelling system that lets consumers create a de facto index for the purposes of identifying and sharing content. “Web 2.0 is the network as platform, spanning all connected devices; Web 2.0 applications are those that make the most of the intrinsic advantages of that platform: delivering software as a continually updated service that gets better the more people Web 2.0 use it, consuming and remixing data from multiple sources, including individual users, while providing their own data and services in a form that allows remixing by others, creating network effects through an ‘architecture of participation,’ and going beyond the page metaphor of Web 1.0 to deliver rich user experiences.” A collaborative website that average users can update, without a need for programming skills. Wiki is a Hawaiian word for Wiki quick.

Enterprise 2.0

Tagging

ANNEXURE – 1 Moving Towards Web 2.0

29

Group 7 – WEB 2.0

Web 1.0 to Web 3.0

30

Group 7 – WEB 2.0

ANNEXURE – 2 WEB 2.0 Landscape

31

Group 7 – WEB 2.0

ANNEXURE – 3 How to add an RSS feed to your reader

Open Your Reader

RSS and Podcasts: Podcasts are same as traditional RSS feeds. However podcasts use RSS to capture digital content like music and videos from the Syndicating website. For example, the Apple Ipod has a podcatcher software. When you connect the ipod to a PC with Internet connection, the feed reader checks your favorite websites for data updation. If it finds any update of data, it downloads the content and transfers it to your Ipod via the PC. This makes the data portable and available at any point of time.

ANNEXURE – 4 RSS and WEB 2.0
Right click to Copy

32

Group 7 – WEB 2.0

33

Sign up to vote on this title
UsefulNot useful