introduction to web 2.0 technologies

24
IBSG - 1 Copyright © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential IBSG - 1 Cisco Confidential Web 2.0 trends & complexity Bill Brennan Cisco System Data Center October 2008

Upload: peterbuck

Post on 05-Dec-2014

413 views

Category:

Documents


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Introduction to Web 2.0 Technologies

IBSG - 1Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 1Cisco Confidential

Web 2.0 trends& complexity

Bill BrennanCisco SystemData CenterOctober 2008

Page 2: Introduction to Web 2.0 Technologies

IBSG - 2Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 2Cisco Confidential

Web 2.0 Defined

"Web 2.0 is a knowledge-oriented environment where human interactions generate content that is published, managed and used through network applications in a service-oriented architecture.“

-Dario de Judicibus IBM

Page 3: Introduction to Web 2.0 Technologies

IBSG - 3Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 3Cisco Confidential © 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicPresentation_ID

Paradigm and Complexity Shift

Developer Centric

Today’s IT

Custom Code

Designed to Last

Stovepipe Applications

Monitoring Availability

Web 2.0 - SOAArchitecture

IT and Business Analysts

Assembly and Customization

Designed to Change

Services

Services Governance & SLA

Web2.0 IT

Page 4: Introduction to Web 2.0 Technologies

IBSG - 4Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 4Cisco Confidential

Web 2.0 is a natural extension of a Services Oriented Architecture (SOA)

Page 5: Introduction to Web 2.0 Technologies

IBSG - 5Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 5Cisco Confidential

Characteristics of Social Networking

Page 6: Introduction to Web 2.0 Technologies

IBSG - 6Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 6Cisco Confidential

Online Youth Activities

Page 7: Introduction to Web 2.0 Technologies

IBSG - 7Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 7Cisco Confidential

Market Transition

Page 8: Introduction to Web 2.0 Technologies

IBSG - 8Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 8Cisco Confidential

Blogoshere 2006

http://technorati.com/weblog/2006/11/161.html

Page 9: Introduction to Web 2.0 Technologies

IBSG - 9Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 9Cisco Confidential

What are the tools?

Tim Swan presentation

Page 10: Introduction to Web 2.0 Technologies

IBSG - 11Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 11Cisco Confidential

Emerging Business Models

Page 11: Introduction to Web 2.0 Technologies

IBSG - 12Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 12Cisco Confidential

Interconnected Business Models

http://blogs.zdnet.com/Hinchcliffe/?p=137

Page 12: Introduction to Web 2.0 Technologies

IBSG - 15Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 15Cisco Confidential

Social Networks as Distribution Models

OpenSocial 350M users

Joint Development with Google, Yahoo and MySpace

4500 Applications Developed

Installed150M times

Facebook

37000 Applications Developed

Installed 715M times

Example: RockYou’s Apps 124M times

Page 13: Introduction to Web 2.0 Technologies

IBSG - 16Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 16Cisco Confidential

6 Degree of Separation

http://upload.wikimedia.org/wikipedia/commons/9/94/Six_degrees_of_separation.png

Page 14: Introduction to Web 2.0 Technologies

IBSG - 17Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 17Cisco Confidential

3 Degrees of Separation

Page 15: Introduction to Web 2.0 Technologies

IBSG - 18Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 18Cisco Confidential

Contact Management and Presentation

Page 16: Introduction to Web 2.0 Technologies

IBSG - 19Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 19Cisco Confidential

Public Health - Movers and Shakers

http://www.fas-research.com/gallery/Case-Study-Gain-Lose-Influence.pdf

Page 17: Introduction to Web 2.0 Technologies

IBSG - 20Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 20Cisco Confidential

Google’s Applications

Search • Alerts • Blog Search* • Book Search • Catalogs • Custom Search Engine* • Desktop* • Directory • Earth* • Finance* • Gears • Images • Language Tools • Maps • Personalized Search* • Product Search • Scholar • SketchUp • Toolbar* • Web Accelerator • Web Search Ads • AdSense • AdWords • Analytics Tools* • YouTube

Applications • Apps • Blogger* • Calendar* • Checkout • Code • Docs & Spreadsheets • Gmail* • Groups* • Labs • News* • Notebook* • orkut • Pack • Picasa* • Picasa Web Albums • Reader* • Talk* • Translate • Video* •Mobile  Webmaster •  Mobile* Android •Enterprise  Dodgeball •  Earth for Enterprise/Google Earth Pro • Maps for Enterprise • Mini • Search Appliance • SketchUp Pro

http://www.google.com/intl/en/press/descriptions.html

Page 18: Introduction to Web 2.0 Technologies

IBSG - 21Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 21Cisco Confidential

Social Network Growth

Page 19: Introduction to Web 2.0 Technologies

IBSG - 23Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 23Cisco Confidential

Open API adoption

Effect of Amazon’s data and software used for many apps

Page 20: Introduction to Web 2.0 Technologies

IBSG - 27Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 27Cisco Confidential

Operational Tipping Point

O’Reilly spoke with Microsoft’s Debra Chrapaty, VP of operations for Windows Live about this, noting that:

Her belief is that there’s going to be a tipping point in Web 2.0 where the operational environment will be a key differentiator. I mentioned the idea that Web 2.0 has been summed up as "Fail Fast, Scale Fast," and she completely agreed. When it hit its growth inflection point, MySpace was adding a million users every four days — not at all an easy feat. As these massive apps become the norm, unless you can play in a game where services can be highly stable, geodistributed, etc., you won’t be in the game. And that’s where she came to the idea that being a developer "on someone’s platform" may ultimately mean running your app in their data center. http://blogs.zdnet.com/Hinchcliffe/?p=54

Page 21: Introduction to Web 2.0 Technologies

IBSG - 29Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 29Cisco Confidential

Technology/Service Convergence

Application Architecture

Web 2.0

SOA

Organization Consolidation

Virtualization

Consolidation

Service Models

Cloud Computing

SAAS

Stream Computing

Page 22: Introduction to Web 2.0 Technologies

IBSG - 30Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 30Cisco Confidential

Data Stream and Operational Complexity

XML Growth

Virtualization

VDI

Data Center

Cluster applications

Video

Sensor Networks

Web 2.0

Page 23: Introduction to Web 2.0 Technologies

IBSG - 31Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 31Cisco Confidential

Conclusions Market is converging

Platforms

API’s

Virtualization

Service Models

Communication/Collaboration Internally is key to success

Identity

Application policy-security

Data Center complexity

Consolidate-Virtualizate-Orchestrate

Dynamic Provisioning Models

Compliance to SLA

Page 24: Introduction to Web 2.0 Technologies

IBSG - 33Copyright © 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential IBSG - 33Cisco Confidential