Agile Computing Authors: Kevin Benedict, Liz McMillan, Carmen Gonzalez, Jim Kaskade, Lori MacVittie

Related Topics: Agile Computing

Agile Computing: Article

i-Technology Viewpoint: It's Time to Take the Quotation Marks Off "Web 2.0"

Why Enterprise Resistance to Web 2.0 Applications Makes Sense – and Why It Will Crumble

My friend Jeremiah Owyang says it’s time to take the quotation marks off Web 2.0. I agree with him. Web 2.0 is here to stay.

That doesn’t mean there’s agreement yet on what the term means. This is one of the reasons we’re hearing about “enterprise resistance” to Web 2.0 applications (more on this below).

Web 2.0, after all, means different things to different people:

  • To the programmer, it’s a set of tools and techniques that have the potential for fundamentally altering how network based applications and data are developed, managed, and delivered.
  • For start-ups and venture capitalists, it’s an opportunity to get in on the ground floor of another “bubble.”
  • For the corporate CIO or IT manager, it’s another set of technologies and architectures to be adopted and supported in an era of continued I.T. department budget strains.
  • For newer or smaller companies, it’s an opportunity to acquire technical and business process infrastructure at a fraction of the cost of the investments made by older and legacy companies.
  • For the marketing manager it’s an opportunity to “end-run” a traditionally unresponsive I.T. department.
  • For the customer it’s an opportunity to establish and maintain relationships that are both personally fulfilling and empowering in the face of the traditional power of larger institutions.
  • For the CEO of an established legacy industry company, it’s a threat of loss of control over customer relations.

With so many perspectives, it's no wonder that it's difficult to get a clear picture. We’re dealing not only with shifting technical architectures but also with shifts in how individuals and organization use the Internet. We know that different industries adopt technology at different rates. In the case of Web 2.0, we're talking not just about changes in technology and associated business processes, but also about changes in the relationships that are built around how systems are developed and used.

Reality: Things Don't Always Work
My personal interest in this subject is anything but academic. As a management consultant I help companies plan and manage changes to technology and processes. With Web 2.0 the opportunity for change is massive.

This change is not going to happen overnight. There’s always a risk when a new technical architecture is introduced. Part of the risk is getting components of the architecture into the hands of the users. Another is making sure those components work reliably.

I was reminded of this recently when my wife called about an email she had received that contained a link to something she couldn't read: "I'm trying to show an attachment to an e-mail I got from a client but I can't. I called her to ask what to do and she told me to make sure that 'flash was turned on'. What does she mean by "flash?"

I explained what "Flash" from Macromedia is and fixed her problem, but not until she had experienced a significant delay in communicating with a prospective client -- all because a popular web browser add-in wasn't properly configured.

This got me to thinking about the current evangelizing that is swirling around Web 2.0, AJAX, SOA, and tools like Ruby on Rails, a web application development framework. I've been impressed with the mass of available applications that offer sophisticated functionality without requiring a "heavy client footprint." Just check out Christian Mayaud's list of Web 2.0 applications if you want to be amazed (and amused).

I thought back to my wife's question. "Flash" is one of those "helper" applications that an entire industry and developer community has grown up around. It's now firmly a part of the Internet infrastructure. That wasn't always the case. As I saw with my wife's question, there are still "pockets" of users where an unknown – but simple -- configuration setting can cause the final step in a complex communication channel to fail.

Parallels with Web 2.0
This got me to thinking about what has to happen each time an AJAX based application is used. Some current "mashups" might be combining widely available public data. With "enterprise" types of applications we might be talking about the over-the-web handling of valuable -- or sensitive -- personal or financial data. Reliability and stability of all parts of the server, net, and client will be critical. All will have to work together to ensure reliable two-way interaction.

Is uncertainty about this reliability one of the reasons why some corporate IT managers are taking a wait-and-see attitude about "web 2.0"? My wife's temporary problem with a supposedly mature piece of the web infrastructure is probably not too unusual. There are many users out there who work day in and day out without paying special attention to extensions, helper applications, thin clients, RSS feeds, and the like. There are probably a lot of them for whom managing the vicissitudes of a commonly available component such as Flash is at best, an annoyance.

In theory, the population of users like my wife might be a prime target of the Web 2.0 delivered rich functionality for remotely served applications such as are sometimes referred to as "Web Office" or Office 2.0. Technologies such as AJAX (and Flash, ActiveX, and Java, as well) help deliver near-desktop-quality functionality (some may argue with the adjective "near") without requiring the permanent installation of massive amounts of (expensively-licensed) software on the client machine. I’m sure that many corporate I.T. folks view potential simplification of the client’s configuration as A Good Thing, right?

But lots of dice have to roll the right way for all parts of the channel to work every time. Sometimes problems occur, as my wife's experience attests -- and she was dealing with one of the oldest and most venerable components for delivering rich media content.

(I think of issues related to this every time I switch over from Yahoo's old-but-serviceable Web Mail interface to the Yahoo! Mail Beta. I'm using the Yahoo! Mail Beta via my office DSL connection, and I always have to wait for data to load. And while I love the "drag and drop" functionality the Yahoo! Mail Beta interface provides, the hesitation of the interface grates after a while, especially when handling as much daily e-mail as I do.)

Are Internet users willing to accept such performance glitches "outside the firewall" in order to gain access to an attractive interface and functionality that looks like it's running from a local client?

I suspect my wife won't. She may not be a “power user,” but her standards for performance are high. (I know - I hear about it whenever our home network slows down!)

Web 2.0 Enterprise Hurdles
If Web 2.0 applications built around AJAX and related technologies are to succeed in the "enterprise" several dice have to roll the right way, such as:

Tools, development, and testing processes must continue to mature (this is happening). Tools, development, and testing processes must be accepted into the enterprise -- in addition to, or in replacement of, the architectures that are already there (e.g., how many development platforms is an IT department willing to support?) Data security and stability issues must be solved -- especially when it comes to handling sensitive customer and financial data.

The new architecture must deliver -- and have documented -- (a) reduced costs, (b) added benefits, or (c) both (a) and (b).

Company executives must be willing to accept a new network architecture paradigm along with its frequent association with "social networking" functionality that many people are still not comfortable with.

Except for the last bullet point, the issues here are similar to issues associated with the introduction of any new programming language or development framework into the enterprise. The costs of changes to process and technologies have to be outweighed by the promised benefits. In that sense, AJAX is no different from other evangelized technologies that have come before, except that the Web now provides (potentially) the data, delivery platform, and the medium for promotion (and hype) – outside the firewall.

More Than Technical Architecture Challenges
I’m going to make a leap of faith here and predict that issues of security, reliability, maintainability, privacy, and functionality that are associated with web based Web 2.0 applications are going to be successfully addressed and resolved. Call me optimistic, but there’s a lot of creativity out there and I believe that current technical challenges will be overcome, and quickly.

But let's return to that last bullet point in the above section. One of the most astute descriptions of Web 2.0 adoption is the recent blog article by Thad Scheer of Sphere of Influence called Monetizing Value of Social Computing in Traditional Industries. (Author disclosure: Thad is a friend of mine.)

Thad is the CEO of a DC-area consulting firm that serves both government and corporate customers. He bases his statements on what he sees as resistance from traditional "brick and mortar" industries to adopting a new customer relationship paradigm. According to Thad, the executives of these industries see Web 2.0 as reducing their control over their data and their customer relationships, especially when "social networking" functionality is included in the mix. (Some of my own Web 2.0 Management Survey interviews have borne this view out.)

While Thad goes on to assess the more willing acceptance of Web 2.0 by newer firms and more consumer product oriented firms, the issues he points out are not issues of technical architecture, they are issues of functionality and the expectations executives have of how they relate to their customers.

It’s entirely reasonable that certain population segments and certain types of business transactions will be thought by corporate executives as being outside the realm of either existing or Web 2.0 infrastructures. Not every business transaction can -- or should -- be handled electronically, nor does it need to be handled in a fashion that increases a sense of intimacy.

Change Comes Fast
Changes to social interactions and to network infrastructure usually can't happen overnight. But pressure to adopt more collaborative and interactive techniques based on "social software," even with populations that might have traditionally been thought of as being resistant to such approaches, might develop faster than some people think. In particular, knowledge workers inside and outside even the traditional industries will expect more conversational and interactive communications both within their companies and with the companies -- and customers -- they deal with. Management will need to adapt to the fact that employees are now able to engage with customers more frequently and on a more personal level than ever before. This engagement can lead to loyalty.

Companies will respond differently depending on their structures, management styles, and regulatory constraints. Some will have a small number of "CEO-style" blogs with commenting "turned off." Some will organize groups of staff members to interact in a structured fashion with different groups of users with management structures potentially modeled after high end professional call centers. Still others will engage all staff to interact as a normal part of their job (just like answering the phone). Some may adopt Web 2.0 technologies but only within the corporate organization itself.

In many cases, the I.T. department will be called upon to evaluate and if necessary provide support for technology platforms that may interface -- reliably and safely -- with other corporate systems.

Competition Spurs Change
Will the "brick and mortar" businesses that Thad writes about just sit by while smaller and more agile competitors, who have much less invested in legacy infrastructure, nibble away at their businesses?

I don't think so. It's from such competitors that the pressure on traditional companies to adopt "Enterprise Web 2.0" most likely will come.

I am not prepared to rule out the ability of even large “legacy” companies to adopt the faster, more open and agile ways of smaller competitors. In fact, the ability to effectively innovate and manage using collaborative technologies that incorporate social networking methods may turn out to be the next “big thing” in management, comparable to the quality improvement movements spawned in the 20th century by foreign competition to U.S. manufacturing. This might even rival – and compete with – the current resources being put into process and system outsourcing.

The wave of change will not be limited to manufacturing but will impact all sizes and types of industries that need to communicate with their customers. That’s everyone.

How to Move Forward
OK, so much for analysis, let’s get practical. The following is my advice to managers, executives, and employees who want to take advantage of Web 2.0 technologies:

  1. Start small. Do a prototype, not an enterprise rollout. Focus on early results based on well defined, achievable goals.
  2. Involve both business and IT. Even if you can negotiate deals with externally software vendors without the involvement of your IT department, don’t do it. Your IT department probably has more experience with knowing what might go wrong than you do!
  3. Minimize integration complexity. Don’t start with a project that requires manipulation of the company’s “crown jewel” financial or customer data. Keep it simple.
  4. Focus on business benefits. Don’t do something because it’s free, easy, or nice to know. Focus on a system that supports the financial or strategic goals of your organization. It’s always easier to justify costs associated with money making activities than costs associated with overhead and administration.
  5. Know your costs. Even if you’re using existing staff, existing networks, existing hardware, and free software, don’t pretend that time and infrastructure are free. Keep track of staff, user, and support staff time. If you’re successful with your initial project you’ll have to translate these into dollars.
  6. Use the technology. Practice what you preach. If you’re experimenting with web based tools for customer communication, use web based tools to support project management and staff communication.
  7. Face issues headlong. Have a process to track and resolve all business, personal, and technical issues that arise during the course of the project.
  8. Don’t demonize the opposition. Opposition to Web 2.0 may be justified. Listen and find out what the core issues really are, surface them, and address them.
  9. Remember it’s a business. Even if you’re working with collaborative software that supports personalization, relationships, and intimacy, remember that there needs to be a reasonable line drawn between business and personal matters.
  10. Manage. Don’t just toss the technology into the user community. Be prepared to guide, give feedback and, where necessary, lead. Remember: no matter what project management philosophy you follow, projects don’t manage themselves, especially projects where you are breaking new technological or cultural ground.

More Stories By Dennis D. McDonald

Dennis D. McDonald is a management consultant with special interests in project management, process improvement, information technology, IT department management strategy, and intellectual property management. Dr. McDonald has nearly 25 years’ experience in research, project management, and consulting company ownership. He has managed or participated in projects related to customer communications, customer system consolidation, cost-benefit analysis of copyright formalities, technology product marketing strategy, automation of scholarly publication, application portfolio consolidation, online parts catalogs, and call center system strategy. He earned his BA in Psychology at the Ohio State University and his MLS and PhD in Library and Information Science at the University of Maryland. He is currently an independent consultant, moderates the Linkedin Bloggers online group, and he is a member of the Podcast Roundtable. His weblog is called All Kind Food. Dr. McDonald lives in Alexandria, Virginia. His email address is: [email protected]

Comments (3) View Comments

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

Most Recent Comments
Mahendrap 11/25/09 03:09:00 AM EST

"2.0" denotes enabling "interactivity" to web based applications. And, many things enable this interactivity, whether Ajax, or something else.

Once can cut the noise about debating what 2.0 means and focus on how enabling "interactivity" to existing contexts like content, users and commerce can throw up interesting solutions.

It is possible to roll out sub 15K Proof of concepts in web 2.0 in any context before the investor worries about ROI. A lot of Social Media Consultants and sometimes Web 2.0 Platform vendors are all doing it. Keep looking.

jgo 05/04/06 02:10:37 PM EDT

LAMP is good. AJAX is evil.

Dennis D. McDonald 04/18/06 12:39:03 PM EDT

AUTHOR NOTE: My "acknowledgement" pararaph was inadvertantly omitted from the above article: "Rod Boothby, Chris Law, Jeremiah Owyang, Luis Suarez, and Ken Yarmosh were all kind enough to share their insights with me as I refined the article."

@ThingsExpo Stories
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessi...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, will discuss the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They will also review two "free infrastruct...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, will discuss how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team a...
Join IBM November 2 at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how to go beyond multi-speed it to bring agility to traditional enterprise applications. Technology innovation is the driving force behind modern business and enterprises must respond by increasing the speed and efficiency of software delivery. The challenge is that existing enterprise applications are expensive to develop and difficult to modernize. This often results in what Gartner calls...
Although it has gained significant traction in the consumer space, IoT is still in the early stages of adoption in enterprises environments. However, many companies are working on initiatives like Industry 4.0 that includes IoT as one of the key disruptive technologies expected to reshape businesses of tomorrow. The key challenges will be availability, robustness and reliability of networks that connect devices in a business environment. Software Defined Wide Area Network (SD-WAN) is expected to...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...