SlideShare a Scribd company logo
1 of 48
Download to read offline
Bharati Vidyapeeth Deemed University
    College Of Engineering, Pune

             A
      Seminar report on
            Web 2.0
               By
          SRIJAN BOSE
           B-Tech Computer-II
              Semester- VII
               Roll No: 48


          Under the Guidance of:
   Prof. Sachin Wakurdekar
 DEPARTMENT OF COMPUTER ENGINEERING
 B.V.D.U. COLLEGE OF ENGINEERING, PUNE
                2011-2012
The world wide web
The world wide web( abbreviated as WWW or W3
commonly known as the Web) a system of
hyperlinked documents accessed via the Internet. It
was introduced to allow collaborators in remote
sites to share their ideas and knowledge.

                       WWW invented by Tim
                       Berners- Lee

                       The Web's historic logo
                       was designed by Robert
                       Cailliau
New technologies are transforming the way
people use the world wide web
WIKI
                              Podcast
 Rich User experience

Blogs       Web 2.0               API’s

        Social networks           Feeds
                AJAX
 Tags
                    User generated content
Origin of Web 2.0
               A phrase coined in 2004 by
               O’Reilly Media Group; refers
               to a perceived or proposed
               second      generation    of
               Internet-based services such
               as Social Networking sites,
               Wikis etc - that emphasize
               Online    Collaboration    &
               sharing among users
Tim O’Reilly
Web 2.0 called Read/Write Web

Web Browser based Application
Social Networking-
Connecting, Sharing, Collaborating

Participatory media.    Creating
content :
Uploading photos, Music, Videos,
Tagging, commenting, Blogging
Netscape compared with Google"
•Their flagship product was the web browser, a
desktop application, and their strategy was to use
their dominance in the browser market to establish
a market for high-priced server products. Control
over standards for displaying content and
applications in the browser would, in theory, give
Netscape the kind of market power enjoyed by
Microsoft in the PC market.

•Netscape promoted a "WebTop" to replace the
desktop, and planned to populate that WebTop
with information updates and applets pushed to
the WebTop by information providers who would
purchase Netscape servers.
•In short, Netscape focused on creating software,
updating it on occasion, and distributing it to the end
users. O'Reilly contrasted this with Google, a
company which did not at the time focus on
producing software, such as a browser, but instead
focused on providing a service based on data such as
the links Web page between sites.

•Google exploits this user-generated content to offer
Web search based on reputation through its "Page
Rank" algorithm.
A similar difference can be seen between the
   Encyclopedia Britannica Online and Wikipedia

•The Britannica relies upon experts to create
articles and releases them periodically in
publications

•Wikipedia relies on trust in anonymous users to
constantly and quickly build content. Wikipedia is
not based on expertise but rather an adaptation of
the open source and it produces and updates articles
constantly.
Web 2.0 is the common term that is used
to differentiate today’s internet.



                               Creation of
                              Web 2.0
New media and tools for a Web 2.0 world
Blogs : An easy to edit website created within a browser

Wiki : A web site that anyone can edit. Collaborative
document creation

Podcast : An Internet radio show. Subscribe, Listen & watch
whenever required. Social Bookmarking: Manage
bookmark online, tag content, network, discover

RSS : really simple syndication – a way of tracking Blogs,
wikis, news sites etc.
A “Feed Reader”is used to track all of the content.

Social Media : Facebook, Myspace, Twitter etc.
Web 2.0 websites include the following features
Search
Finding information through keyword search.


Links
Connects information together into a meaningful information ecosystem
using the model of the Web.

Authoring
The ability to create and update content leads to the collaborative work of
many rather than just a few web authors.

 Tags
 Categorization of content by users adding "tags"—short, usually one-word
 descriptions—to facilitate searching
Most Popular Site
   Yahoo!                        Orkut.com
    Google                       Google India
    Myspace                      Rediff.com
    Microsoft Network (MSN)      Naukri.com
    EBay                         Rapidshare.com
    YouTube
    WikiPedia
    Amazon.com
    Craigslist.org
   facebook
    Windows Live
    Blogger.com
What does it look like ??




 Personal Homepage and social Networking
Share Your Photos
To Write a Blog
To upload and share videos
Del.icio.us is an Example of a Site that Uses a
   “Folksonomy” to Organize Bookmarks
Wikipedia is a Collaborative Dictionary Being
       Edited in Real time by Anyone
Express
 Phones    Interact    Stay
                   connected



          Music
Webcams   Player
3 Concepts
        to use web 2.0 wisely

 Internet is a public place. Anonymity
                is a myth.
       The internet is for ever. What
   goes online can never be erased

         What you see online is not
            necessarily reality
Internet is forever
          Capture
  &       harvest
        store information

                        Source
Digital Footprints          Path
                        Destination
Cached
Information deleted is
                             Stored


                            Millions
                               of
                           snapshots




 Digital footprints can be Damaging
Internet is a public place
     Anonymity is a myth

   Posted         Or

 Can be identified by
 * Internet service provider
 * Foreign governments
 * Marketers
What you see online is not all reality

Digital World   Different from

                       Real World

                Cyber bullies
                 Scammers
                  Hackers
Risks of web 2.0 includes
   Contact with strangers and bullies

  Identity theft for posting personal info.

         Damage to reputation

    Access to inappropriate content
Web 1.0 Vs Web 2.0

Free Hosting
           Static Pages
     HTML
                      50k Bandwidth
Reading Information
         Social media
                    User generated content
               Virtual community
                              Web Applications
         Blogs      1Mb Bandwidth
WEB 1.0




CHOOSE THE CONTENT AND PUT ON YOUR SITE
WEB 2.0




AdSence read your site and accordingly
    recommends adds for the site
WEB 1.0




          Need to upload photos
WEB 2.0




Upload and share photos
Attributes of Web 2.0

 Rich user experience
            user participation
    dynamic content
 Metadata
        web standards
                  scalability
          openness
               freedom
Why Web 2.0 is called Network as a Platform ?

Web 2.0 websites allow users to do
more than just retrieve information.

It provide user with :

 More User Interface
 Software
 Storage facility
Technologies

    For web 2.0 development

  Adobe Flash           AJAX

     Adobe flex framework
Traditional HTTP Processing
AJAX-based Processing

•Asynchronous JavaScript and XML

• Allows for asynchronous communication
between a browser (client) and server

•Does not mandate that the end user must
wait for processing a request

•Can be used as an alternative to HTML forms
in certain situations
AJAX-based Processing
Adobe Flex

Adobe Flex is a software development
kit (SDK) released by Adobe Systems for the
development and deployment of cross-
platform rich Internet applications based on
the Adobe Flash platform. Flex applications
can be written using Adobe Flash Builder or
by using the freely available Flex compiler
from Adobe.
Concepts

Web 2.0 can be described in 3 parts

 Rich Internet Application (RIA)
 Service Oriented Architecture(SOA)
 Social Web
Web 2.0 applications are giving programmers access to their
information data stores and basic functions through simple
programming interfaces (API’s) based on service oriented
architecture principles. A program’s content and functions can be
exposed to other programs running on the web by “wrapping” them
with these API’s.




 There are really two common API standards

 1.   SOAP (simple object access protocol)

 2.   REST (representational state transfer).
Creating “Mashups” or “Remixes” that combine 3rd
 party data and information in innovative ways using
 the Web 2.0 technologiy




Housingmaps.com for finding homes that are for sale or rent in37
different countries in US
Marketing

A growing number of marketers are
using Web 2.0 tools to collaborate with
consumers on product Development,
service enhancement and promotion.

Company employees have created
wikis – that allows Users to add, delete,
and edit content.
Web 2.0 is about write Ones and read Many

As more and more number of users uses it ,
it keeps on getting better and better.

                   Tim O’Reilly on web 2.0
                   from O’Reilly Media
More advancement in the Web 2.0 technology
    Communication between different devices
            or different appliances
                             Presence of Web
                             will be More

                             Visibility of web
                             will be Less
      Interaction
                             Will be present in
                             everyday
                             appliances
Criticism
Tim Berners-Lee the inventor of www in
an interview described the term “Web
2.0” as a “piece of jargon”.

 Does not represents a newer version of
“www” but continues to use web 1.0
concepts and technologies.

 AJAX did not replace HTTP protocol
Peek into the future – Web 3.0

• Being defined as the "Semantic Web"
• Personalization is the new buzzword
• A.I. + Profiling + Search + Rich
     metadata = high degree of
     Personalization
Thank You

More Related Content

What's hot

C:\Fakepath\Web 2 0
C:\Fakepath\Web 2 0C:\Fakepath\Web 2 0
C:\Fakepath\Web 2 0mbucher
 
Emerging Technologies: Finding Function in Social Media
Emerging Technologies: Finding Function in Social MediaEmerging Technologies: Finding Function in Social Media
Emerging Technologies: Finding Function in Social MediaJordan Epp
 
Multimedia & Web2.0
Multimedia & Web2.0Multimedia & Web2.0
Multimedia & Web2.0Shweta Jain
 
Education Using Technology
Education Using TechnologyEducation Using Technology
Education Using Technologycharliepankeko
 
Using Social Software to Market yourself - inside and outside the firewall
Using Social Software to Market yourself - inside and outside the firewallUsing Social Software to Market yourself - inside and outside the firewall
Using Social Software to Market yourself - inside and outside the firewallIan McNairn
 
World Wide Platform
World Wide PlatformWorld Wide Platform
World Wide PlatformPeter Coffee
 
Some Fast Thoughts On Web 2 V3
Some Fast Thoughts On Web 2 V3Some Fast Thoughts On Web 2 V3
Some Fast Thoughts On Web 2 V3Marc Danziger
 
The internet lecture3
The internet lecture3The internet lecture3
The internet lecture3icleir_
 
Web Content Management with IBM Connections
Web Content Management with IBM ConnectionsWeb Content Management with IBM Connections
Web Content Management with IBM ConnectionsFelix Binsack
 
Web 2.0 Presentation Student Teachers
Web 2.0 Presentation Student TeachersWeb 2.0 Presentation Student Teachers
Web 2.0 Presentation Student TeachersMaureen Williams
 
Making Web 2.0 Work for B2B Brands
Making Web 2.0 Work for B2B BrandsMaking Web 2.0 Work for B2B Brands
Making Web 2.0 Work for B2B BrandsLaurence Vincent
 
I B A H R I N E 7 T H E I N T E R N E T
I B A H R I N E 7  T H E  I N T E R N E TI B A H R I N E 7  T H E  I N T E R N E T
I B A H R I N E 7 T H E I N T E R N E Tibahrine
 
Native is easy. Mobile web is freaking hard.
Native is easy. Mobile web is freaking hard.Native is easy. Mobile web is freaking hard.
Native is easy. Mobile web is freaking hard.Jason Grigsby
 

What's hot (20)

C:\Fakepath\Web 2 0
C:\Fakepath\Web 2 0C:\Fakepath\Web 2 0
C:\Fakepath\Web 2 0
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Meda5400 Web2.0.ppt
Meda5400 Web2.0.pptMeda5400 Web2.0.ppt
Meda5400 Web2.0.ppt
 
Emerging Technologies: Finding Function in Social Media
Emerging Technologies: Finding Function in Social MediaEmerging Technologies: Finding Function in Social Media
Emerging Technologies: Finding Function in Social Media
 
Multimedia & Web2.0
Multimedia & Web2.0Multimedia & Web2.0
Multimedia & Web2.0
 
Education Using Technology
Education Using TechnologyEducation Using Technology
Education Using Technology
 
Using Social Software to Market yourself - inside and outside the firewall
Using Social Software to Market yourself - inside and outside the firewallUsing Social Software to Market yourself - inside and outside the firewall
Using Social Software to Market yourself - inside and outside the firewall
 
World Wide Platform
World Wide PlatformWorld Wide Platform
World Wide Platform
 
Web 2.0 in Education
Web 2.0 in EducationWeb 2.0 in Education
Web 2.0 in Education
 
Some Fast Thoughts On Web 2 V3
Some Fast Thoughts On Web 2 V3Some Fast Thoughts On Web 2 V3
Some Fast Thoughts On Web 2 V3
 
The internet lecture3
The internet lecture3The internet lecture3
The internet lecture3
 
Web2.0 in Education
Web2.0 in EducationWeb2.0 in Education
Web2.0 in Education
 
Web Content Management with IBM Connections
Web Content Management with IBM ConnectionsWeb Content Management with IBM Connections
Web Content Management with IBM Connections
 
Web 2.0 Presentation Student Teachers
Web 2.0 Presentation Student TeachersWeb 2.0 Presentation Student Teachers
Web 2.0 Presentation Student Teachers
 
Web3 0 The Semantic Web
Web3 0   The Semantic WebWeb3 0   The Semantic Web
Web3 0 The Semantic Web
 
Making Web 2.0 Work for B2B Brands
Making Web 2.0 Work for B2B BrandsMaking Web 2.0 Work for B2B Brands
Making Web 2.0 Work for B2B Brands
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
I B A H R I N E 7 T H E I N T E R N E T
I B A H R I N E 7  T H E  I N T E R N E TI B A H R I N E 7  T H E  I N T E R N E T
I B A H R I N E 7 T H E I N T E R N E T
 
Native is easy. Mobile web is freaking hard.
Native is easy. Mobile web is freaking hard.Native is easy. Mobile web is freaking hard.
Native is easy. Mobile web is freaking hard.
 
Webware Webinar
Webware WebinarWebware Webinar
Webware Webinar
 

Viewers also liked

The "whatever" Web
The "whatever" WebThe "whatever" Web
The "whatever" WebKAZAR Yassir
 
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...Eugene Kowalzki
 
[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb
[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb
[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWebMyeongun Ryu
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)Ali Saif Mirza
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhaniJack Mansukhani
 
5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep WebAmber Horsburgh
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Smart quill seminar report final
Smart quill seminar report finalSmart quill seminar report final
Smart quill seminar report finalPramod Kumar
 

Viewers also liked (13)

The "whatever" Web
The "whatever" WebThe "whatever" Web
The "whatever" Web
 
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
 
Sangeetha seminar (1)
Sangeetha  seminar (1)Sangeetha  seminar (1)
Sangeetha seminar (1)
 
[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb
[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb
[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb
 
The deepweb
The deepwebThe deepweb
The deepweb
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
5G report
5G report5G report
5G report
 
Smart quill seminar report final
Smart quill seminar report finalSmart quill seminar report final
Smart quill seminar report final
 

Similar to Web 2.0

Web 2.0
Web 2.0Web 2.0
Web 2.0Photon
 
Web 2.0 / Library 2.0 Part One
Web 2.0 / Library 2.0 Part OneWeb 2.0 / Library 2.0 Part One
Web 2.0 / Library 2.0 Part OneEddie Byrne
 
Trends and advancement in www (web 1.0 and web2.0) assignment
Trends and advancement in www (web 1.0 and web2.0) assignment Trends and advancement in www (web 1.0 and web2.0) assignment
Trends and advancement in www (web 1.0 and web2.0) assignment LekshmiSanal1
 
Web 2 0 Presentation
Web 2 0  PresentationWeb 2 0  Presentation
Web 2 0 PresentationStephen Nold
 
Web 2.0 The Very Basics Remote
Web 2.0 The Very Basics RemoteWeb 2.0 The Very Basics Remote
Web 2.0 The Very Basics Remotebibliotecaria
 
web 3 poerpoint presentation in simple words and the evolution of web
web 3 poerpoint presentation in simple words and the evolution of webweb 3 poerpoint presentation in simple words and the evolution of web
web 3 poerpoint presentation in simple words and the evolution of webachuarjunnattakom
 
Web2.0 2012 - lesson 2
Web2.0 2012 - lesson 2Web2.0 2012 - lesson 2
Web2.0 2012 - lesson 2Carlo Vaccari
 
Web 2.0: "We are married to the Web"
Web 2.0: "We are married to the Web"Web 2.0: "We are married to the Web"
Web 2.0: "We are married to the Web"Asim Khan
 

Similar to Web 2.0 (20)

Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Praveenkumar
PraveenkumarPraveenkumar
Praveenkumar
 
web2.0 - computer networks
web2.0 - computer networksweb2.0 - computer networks
web2.0 - computer networks
 
Web
WebWeb
Web
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Web 2.0 and Web 3.0
Web 2.0 and Web 3.0Web 2.0 and Web 3.0
Web 2.0 and Web 3.0
 
Web 2.0 / Library 2.0 Part One
Web 2.0 / Library 2.0 Part OneWeb 2.0 / Library 2.0 Part One
Web 2.0 / Library 2.0 Part One
 
W2
W2W2
W2
 
Trends and advancement in www (web 1.0 and web2.0) assignment
Trends and advancement in www (web 1.0 and web2.0) assignment Trends and advancement in www (web 1.0 and web2.0) assignment
Trends and advancement in www (web 1.0 and web2.0) assignment
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
web 2.0
web 2.0web 2.0
web 2.0
 
Semantic web
Semantic webSemantic web
Semantic web
 
Web 2 0 Presentation
Web 2 0  PresentationWeb 2 0  Presentation
Web 2 0 Presentation
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
Web 2.0 The Very Basics Remote
Web 2.0 The Very Basics RemoteWeb 2.0 The Very Basics Remote
Web 2.0 The Very Basics Remote
 
web 3 poerpoint presentation in simple words and the evolution of web
web 3 poerpoint presentation in simple words and the evolution of webweb 3 poerpoint presentation in simple words and the evolution of web
web 3 poerpoint presentation in simple words and the evolution of web
 
PPT on Web 2.0
PPT on Web 2.0PPT on Web 2.0
PPT on Web 2.0
 
Introduction to Web 2.0
Introduction to Web 2.0Introduction to Web 2.0
Introduction to Web 2.0
 
Web2.0 2012 - lesson 2
Web2.0 2012 - lesson 2Web2.0 2012 - lesson 2
Web2.0 2012 - lesson 2
 
Web 2.0: "We are married to the Web"
Web 2.0: "We are married to the Web"Web 2.0: "We are married to the Web"
Web 2.0: "We are married to the Web"
 

Recently uploaded

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Recently uploaded (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Web 2.0

  • 1. Bharati Vidyapeeth Deemed University College Of Engineering, Pune A Seminar report on Web 2.0 By SRIJAN BOSE B-Tech Computer-II Semester- VII Roll No: 48 Under the Guidance of: Prof. Sachin Wakurdekar DEPARTMENT OF COMPUTER ENGINEERING B.V.D.U. COLLEGE OF ENGINEERING, PUNE 2011-2012
  • 2.
  • 3. The world wide web The world wide web( abbreviated as WWW or W3 commonly known as the Web) a system of hyperlinked documents accessed via the Internet. It was introduced to allow collaborators in remote sites to share their ideas and knowledge. WWW invented by Tim Berners- Lee The Web's historic logo was designed by Robert Cailliau
  • 4. New technologies are transforming the way people use the world wide web
  • 5. WIKI Podcast Rich User experience Blogs Web 2.0 API’s Social networks Feeds AJAX Tags User generated content
  • 6. Origin of Web 2.0 A phrase coined in 2004 by O’Reilly Media Group; refers to a perceived or proposed second generation of Internet-based services such as Social Networking sites, Wikis etc - that emphasize Online Collaboration & sharing among users Tim O’Reilly
  • 7. Web 2.0 called Read/Write Web Web Browser based Application Social Networking- Connecting, Sharing, Collaborating Participatory media. Creating content : Uploading photos, Music, Videos, Tagging, commenting, Blogging
  • 8. Netscape compared with Google" •Their flagship product was the web browser, a desktop application, and their strategy was to use their dominance in the browser market to establish a market for high-priced server products. Control over standards for displaying content and applications in the browser would, in theory, give Netscape the kind of market power enjoyed by Microsoft in the PC market. •Netscape promoted a "WebTop" to replace the desktop, and planned to populate that WebTop with information updates and applets pushed to the WebTop by information providers who would purchase Netscape servers.
  • 9. •In short, Netscape focused on creating software, updating it on occasion, and distributing it to the end users. O'Reilly contrasted this with Google, a company which did not at the time focus on producing software, such as a browser, but instead focused on providing a service based on data such as the links Web page between sites. •Google exploits this user-generated content to offer Web search based on reputation through its "Page Rank" algorithm.
  • 10. A similar difference can be seen between the Encyclopedia Britannica Online and Wikipedia •The Britannica relies upon experts to create articles and releases them periodically in publications •Wikipedia relies on trust in anonymous users to constantly and quickly build content. Wikipedia is not based on expertise but rather an adaptation of the open source and it produces and updates articles constantly.
  • 11. Web 2.0 is the common term that is used to differentiate today’s internet. Creation of Web 2.0
  • 12. New media and tools for a Web 2.0 world Blogs : An easy to edit website created within a browser Wiki : A web site that anyone can edit. Collaborative document creation Podcast : An Internet radio show. Subscribe, Listen & watch whenever required. Social Bookmarking: Manage bookmark online, tag content, network, discover RSS : really simple syndication – a way of tracking Blogs, wikis, news sites etc. A “Feed Reader”is used to track all of the content. Social Media : Facebook, Myspace, Twitter etc.
  • 13. Web 2.0 websites include the following features Search Finding information through keyword search. Links Connects information together into a meaningful information ecosystem using the model of the Web. Authoring The ability to create and update content leads to the collaborative work of many rather than just a few web authors. Tags Categorization of content by users adding "tags"—short, usually one-word descriptions—to facilitate searching
  • 14. Most Popular Site  Yahoo!  Orkut.com  Google  Google India  Myspace  Rediff.com  Microsoft Network (MSN)  Naukri.com  EBay  Rapidshare.com  YouTube  WikiPedia  Amazon.com  Craigslist.org  facebook  Windows Live  Blogger.com
  • 15. What does it look like ?? Personal Homepage and social Networking
  • 17. To Write a Blog
  • 18. To upload and share videos
  • 19. Del.icio.us is an Example of a Site that Uses a “Folksonomy” to Organize Bookmarks
  • 20. Wikipedia is a Collaborative Dictionary Being Edited in Real time by Anyone
  • 21. Express Phones Interact Stay connected Music Webcams Player
  • 22. 3 Concepts to use web 2.0 wisely Internet is a public place. Anonymity is a myth. The internet is for ever. What goes online can never be erased What you see online is not necessarily reality
  • 23. Internet is forever Capture & harvest store information Source Digital Footprints Path Destination
  • 24. Cached Information deleted is Stored Millions of snapshots Digital footprints can be Damaging
  • 25. Internet is a public place Anonymity is a myth Posted Or Can be identified by * Internet service provider * Foreign governments * Marketers
  • 26. What you see online is not all reality Digital World Different from Real World Cyber bullies Scammers Hackers
  • 27. Risks of web 2.0 includes Contact with strangers and bullies Identity theft for posting personal info. Damage to reputation Access to inappropriate content
  • 28. Web 1.0 Vs Web 2.0 Free Hosting Static Pages HTML 50k Bandwidth Reading Information Social media User generated content Virtual community Web Applications Blogs 1Mb Bandwidth
  • 29. WEB 1.0 CHOOSE THE CONTENT AND PUT ON YOUR SITE
  • 30. WEB 2.0 AdSence read your site and accordingly recommends adds for the site
  • 31. WEB 1.0 Need to upload photos
  • 32. WEB 2.0 Upload and share photos
  • 33. Attributes of Web 2.0 Rich user experience user participation dynamic content Metadata web standards scalability openness freedom
  • 34. Why Web 2.0 is called Network as a Platform ? Web 2.0 websites allow users to do more than just retrieve information. It provide user with :  More User Interface  Software  Storage facility
  • 35. Technologies For web 2.0 development Adobe Flash AJAX Adobe flex framework
  • 37. AJAX-based Processing •Asynchronous JavaScript and XML • Allows for asynchronous communication between a browser (client) and server •Does not mandate that the end user must wait for processing a request •Can be used as an alternative to HTML forms in certain situations
  • 39. Adobe Flex Adobe Flex is a software development kit (SDK) released by Adobe Systems for the development and deployment of cross- platform rich Internet applications based on the Adobe Flash platform. Flex applications can be written using Adobe Flash Builder or by using the freely available Flex compiler from Adobe.
  • 40. Concepts Web 2.0 can be described in 3 parts  Rich Internet Application (RIA)  Service Oriented Architecture(SOA)  Social Web
  • 41. Web 2.0 applications are giving programmers access to their information data stores and basic functions through simple programming interfaces (API’s) based on service oriented architecture principles. A program’s content and functions can be exposed to other programs running on the web by “wrapping” them with these API’s. There are really two common API standards 1. SOAP (simple object access protocol) 2. REST (representational state transfer).
  • 42. Creating “Mashups” or “Remixes” that combine 3rd party data and information in innovative ways using the Web 2.0 technologiy Housingmaps.com for finding homes that are for sale or rent in37 different countries in US
  • 43. Marketing A growing number of marketers are using Web 2.0 tools to collaborate with consumers on product Development, service enhancement and promotion. Company employees have created wikis – that allows Users to add, delete, and edit content.
  • 44. Web 2.0 is about write Ones and read Many As more and more number of users uses it , it keeps on getting better and better. Tim O’Reilly on web 2.0 from O’Reilly Media
  • 45. More advancement in the Web 2.0 technology Communication between different devices or different appliances Presence of Web will be More Visibility of web will be Less Interaction Will be present in everyday appliances
  • 46. Criticism Tim Berners-Lee the inventor of www in an interview described the term “Web 2.0” as a “piece of jargon”.  Does not represents a newer version of “www” but continues to use web 1.0 concepts and technologies.  AJAX did not replace HTTP protocol
  • 47. Peek into the future – Web 3.0 • Being defined as the "Semantic Web" • Personalization is the new buzzword • A.I. + Profiling + Search + Rich metadata = high degree of Personalization