|By Dennis D. McDonald||
|April 15, 2006 03:00 AM EDT||
That doesn’t mean there’s agreement yet on what the term means. This is one of the reasons we’re hearing about “enterprise resistance” to Web 2.0 applications (more on this below).
Web 2.0, after all, means different things to different people:
- To the programmer, it’s a set of tools and techniques that have the potential for fundamentally altering how network based applications and data are developed, managed, and delivered.
- For start-ups and venture capitalists, it’s an opportunity to get in on the ground floor of another “bubble.”
- For the corporate CIO or IT manager, it’s another set of technologies and architectures to be adopted and supported in an era of continued I.T. department budget strains.
- For newer or smaller companies, it’s an opportunity to acquire technical and business process infrastructure at a fraction of the cost of the investments made by older and legacy companies.
- For the marketing manager it’s an opportunity to “end-run” a traditionally unresponsive I.T. department.
- For the customer it’s an opportunity to establish and maintain relationships that are both personally fulfilling and empowering in the face of the traditional power of larger institutions.
- For the CEO of an established legacy industry company, it’s a threat of loss of control over customer relations.
With so many perspectives, it's no wonder that it's difficult to get a clear picture. We’re dealing not only with shifting technical architectures but also with shifts in how individuals and organization use the Internet. We know that different industries adopt technology at different rates. In the case of Web 2.0, we're talking not just about changes in technology and associated business processes, but also about changes in the relationships that are built around how systems are developed and used.
Reality: Things Don't Always Work
My personal interest in this subject is anything but academic. As a management consultant I help companies plan and manage changes to technology and processes. With Web 2.0 the opportunity for change is massive.
This change is not going to happen overnight. There’s always a risk when a new technical architecture is introduced. Part of the risk is getting components of the architecture into the hands of the users. Another is making sure those components work reliably.
I was reminded of this recently when my wife called about an email she had received that contained a link to something she couldn't read: "I'm trying to show an attachment to an e-mail I got from a client but I can't. I called her to ask what to do and she told me to make sure that 'flash was turned on'. What does she mean by "flash?"
I explained what "Flash" from Macromedia is and fixed her problem, but not until she had experienced a significant delay in communicating with a prospective client -- all because a popular web browser add-in wasn't properly configured.
This got me to thinking about the current evangelizing that is swirling around Web 2.0, AJAX, SOA, and tools like Ruby on Rails, a web application development framework. I've been impressed with the mass of available applications that offer sophisticated functionality without requiring a "heavy client footprint." Just check out Christian Mayaud's list of Web 2.0 applications if you want to be amazed (and amused).
I thought back to my wife's question. "Flash" is one of those "helper" applications that an entire industry and developer community has grown up around. It's now firmly a part of the Internet infrastructure. That wasn't always the case. As I saw with my wife's question, there are still "pockets" of users where an unknown – but simple -- configuration setting can cause the final step in a complex communication channel to fail.
Parallels with Web 2.0
This got me to thinking about what has to happen each time an AJAX based application is used. Some current "mashups" might be combining widely available public data. With "enterprise" types of applications we might be talking about the over-the-web handling of valuable -- or sensitive -- personal or financial data. Reliability and stability of all parts of the server, net, and client will be critical. All will have to work together to ensure reliable two-way interaction.
Is uncertainty about this reliability one of the reasons why some corporate IT managers are taking a wait-and-see attitude about "web 2.0"? My wife's temporary problem with a supposedly mature piece of the web infrastructure is probably not too unusual. There are many users out there who work day in and day out without paying special attention to extensions, helper applications, thin clients, RSS feeds, and the like. There are probably a lot of them for whom managing the vicissitudes of a commonly available component such as Flash is at best, an annoyance.
In theory, the population of users like my wife might be a prime target of the Web 2.0 delivered rich functionality for remotely served applications such as are sometimes referred to as "Web Office" or Office 2.0. Technologies such as AJAX (and Flash, ActiveX, and Java, as well) help deliver near-desktop-quality functionality (some may argue with the adjective "near") without requiring the permanent installation of massive amounts of (expensively-licensed) software on the client machine. I’m sure that many corporate I.T. folks view potential simplification of the client’s configuration as A Good Thing, right?
But lots of dice have to roll the right way for all parts of the channel to work every time. Sometimes problems occur, as my wife's experience attests -- and she was dealing with one of the oldest and most venerable components for delivering rich media content.
(I think of issues related to this every time I switch over from Yahoo's old-but-serviceable Web Mail interface to the Yahoo! Mail Beta. I'm using the Yahoo! Mail Beta via my office DSL connection, and I always have to wait for data to load. And while I love the "drag and drop" functionality the Yahoo! Mail Beta interface provides, the hesitation of the interface grates after a while, especially when handling as much daily e-mail as I do.)
Are Internet users willing to accept such performance glitches "outside the firewall" in order to gain access to an attractive interface and functionality that looks like it's running from a local client?
I suspect my wife won't. She may not be a “power user,” but her standards for performance are high. (I know - I hear about it whenever our home network slows down!)
Web 2.0 Enterprise Hurdles
If Web 2.0 applications built around AJAX and related technologies are to succeed in the "enterprise" several dice have to roll the right way, such as:
Tools, development, and testing processes must continue to mature (this is happening). Tools, development, and testing processes must be accepted into the enterprise -- in addition to, or in replacement of, the architectures that are already there (e.g., how many development platforms is an IT department willing to support?) Data security and stability issues must be solved -- especially when it comes to handling sensitive customer and financial data.
The new architecture must deliver -- and have documented -- (a) reduced costs, (b) added benefits, or (c) both (a) and (b).
Company executives must be willing to accept a new network architecture paradigm along with its frequent association with "social networking" functionality that many people are still not comfortable with.
Except for the last bullet point, the issues here are similar to issues associated with the introduction of any new programming language or development framework into the enterprise. The costs of changes to process and technologies have to be outweighed by the promised benefits. In that sense, AJAX is no different from other evangelized technologies that have come before, except that the Web now provides (potentially) the data, delivery platform, and the medium for promotion (and hype) – outside the firewall.
More Than Technical Architecture Challenges
I’m going to make a leap of faith here and predict that issues of security, reliability, maintainability, privacy, and functionality that are associated with web based Web 2.0 applications are going to be successfully addressed and resolved. Call me optimistic, but there’s a lot of creativity out there and I believe that current technical challenges will be overcome, and quickly.
But let's return to that last bullet point in the above section. One of the most astute descriptions of Web 2.0 adoption is the recent blog article by Thad Scheer of Sphere of Influence called Monetizing Value of Social Computing in Traditional Industries. (Author disclosure: Thad is a friend of mine.)
Thad is the CEO of a DC-area consulting firm that serves both government and corporate customers. He bases his statements on what he sees as resistance from traditional "brick and mortar" industries to adopting a new customer relationship paradigm. According to Thad, the executives of these industries see Web 2.0 as reducing their control over their data and their customer relationships, especially when "social networking" functionality is included in the mix. (Some of my own Web 2.0 Management Survey interviews have borne this view out.)
While Thad goes on to assess the more willing acceptance of Web 2.0 by newer firms and more consumer product oriented firms, the issues he points out are not issues of technical architecture, they are issues of functionality and the expectations executives have of how they relate to their customers.
It’s entirely reasonable that certain population segments and certain types of business transactions will be thought by corporate executives as being outside the realm of either existing or Web 2.0 infrastructures. Not every business transaction can -- or should -- be handled electronically, nor does it need to be handled in a fashion that increases a sense of intimacy.
Change Comes Fast
Changes to social interactions and to network infrastructure usually can't happen overnight. But pressure to adopt more collaborative and interactive techniques based on "social software," even with populations that might have traditionally been thought of as being resistant to such approaches, might develop faster than some people think. In particular, knowledge workers inside and outside even the traditional industries will expect more conversational and interactive communications both within their companies and with the companies -- and customers -- they deal with. Management will need to adapt to the fact that employees are now able to engage with customers more frequently and on a more personal level than ever before. This engagement can lead to loyalty.
Companies will respond differently depending on their structures, management styles, and regulatory constraints. Some will have a small number of "CEO-style" blogs with commenting "turned off." Some will organize groups of staff members to interact in a structured fashion with different groups of users with management structures potentially modeled after high end professional call centers. Still others will engage all staff to interact as a normal part of their job (just like answering the phone). Some may adopt Web 2.0 technologies but only within the corporate organization itself.
In many cases, the I.T. department will be called upon to evaluate and if necessary provide support for technology platforms that may interface -- reliably and safely -- with other corporate systems.
Competition Spurs Change
Will the "brick and mortar" businesses that Thad writes about just sit by while smaller and more agile competitors, who have much less invested in legacy infrastructure, nibble away at their businesses?
I don't think so. It's from such competitors that the pressure on traditional companies to adopt "Enterprise Web 2.0" most likely will come.
I am not prepared to rule out the ability of even large “legacy” companies to adopt the faster, more open and agile ways of smaller competitors. In fact, the ability to effectively innovate and manage using collaborative technologies that incorporate social networking methods may turn out to be the next “big thing” in management, comparable to the quality improvement movements spawned in the 20th century by foreign competition to U.S. manufacturing. This might even rival – and compete with – the current resources being put into process and system outsourcing.
The wave of change will not be limited to manufacturing but will impact all sizes and types of industries that need to communicate with their customers. That’s everyone.
How to Move Forward
OK, so much for analysis, let’s get practical. The following is my advice to managers, executives, and employees who want to take advantage of Web 2.0 technologies:
- Start small. Do a prototype, not an enterprise rollout. Focus on early results based on well defined, achievable goals.
- Involve both business and IT. Even if you can negotiate deals with externally software vendors without the involvement of your IT department, don’t do it. Your IT department probably has more experience with knowing what might go wrong than you do!
- Minimize integration complexity. Don’t start with a project that requires manipulation of the company’s “crown jewel” financial or customer data. Keep it simple.
- Focus on business benefits. Don’t do something because it’s free, easy, or nice to know. Focus on a system that supports the financial or strategic goals of your organization. It’s always easier to justify costs associated with money making activities than costs associated with overhead and administration.
- Know your costs. Even if you’re using existing staff, existing networks, existing hardware, and free software, don’t pretend that time and infrastructure are free. Keep track of staff, user, and support staff time. If you’re successful with your initial project you’ll have to translate these into dollars.
- Use the technology. Practice what you preach. If you’re experimenting with web based tools for customer communication, use web based tools to support project management and staff communication.
- Face issues headlong. Have a process to track and resolve all business, personal, and technical issues that arise during the course of the project.
- Don’t demonize the opposition. Opposition to Web 2.0 may be justified. Listen and find out what the core issues really are, surface them, and address them.
- Remember it’s a business. Even if you’re working with collaborative software that supports personalization, relationships, and intimacy, remember that there needs to be a reasonable line drawn between business and personal matters.
- Manage. Don’t just toss the technology into the user community. Be prepared to guide, give feedback and, where necessary, lead. Remember: no matter what project management philosophy you follow, projects don’t manage themselves, especially projects where you are breaking new technological or cultural ground.
|Mahendrap 11/25/09 03:09:00 AM EST|
"2.0" denotes enabling "interactivity" to web based applications. And, many things enable this interactivity, whether Ajax, or something else.
Once can cut the noise about debating what 2.0 means and focus on how enabling "interactivity" to existing contexts like content, users and commerce can throw up interesting solutions.
It is possible to roll out sub 15K Proof of concepts in web 2.0 in any context before the investor worries about ROI. A lot of Social Media Consultants and sometimes Web 2.0 Platform vendors are all doing it. Keep looking.
|jgo 05/04/06 02:10:37 PM EDT|
LAMP is good. AJAX is evil.
|Dennis D. McDonald 04/18/06 12:39:03 PM EDT|
AUTHOR NOTE: My "acknowledgement" pararaph was inadvertantly omitted from the above article: "Rod Boothby, Chris Law, Jeremiah Owyang, Luis Suarez, and Ken Yarmosh were all kind enough to share their insights with me as I refined the article."
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Dec. 5, 2016 04:15 AM EST Reads: 1,607
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Dec. 5, 2016 04:00 AM EST Reads: 4,676
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Dec. 5, 2016 04:00 AM EST Reads: 5,086
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 5, 2016 03:30 AM EST Reads: 934
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dec. 5, 2016 01:30 AM EST Reads: 746
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Dec. 5, 2016 12:45 AM EST Reads: 1,569
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Dec. 5, 2016 12:30 AM EST Reads: 6,083
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Dec. 5, 2016 12:15 AM EST Reads: 1,159
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 10:45 PM EST Reads: 1,000
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Dec. 4, 2016 10:45 PM EST Reads: 1,672
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Dec. 4, 2016 06:30 PM EST Reads: 2,177
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
Dec. 4, 2016 06:30 PM EST Reads: 2,035
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Dec. 4, 2016 06:00 PM EST Reads: 1,545
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 04:15 PM EST Reads: 4,210
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 04:15 PM EST Reads: 626
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Dec. 4, 2016 03:00 PM EST Reads: 3,262
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Dec. 4, 2016 02:15 PM EST Reads: 2,015
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
Dec. 4, 2016 02:00 PM EST Reads: 946
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
Dec. 4, 2016 02:00 PM EST Reads: 1,911
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Dec. 4, 2016 02:00 PM EST Reads: 617