49
Web 2.0 Tim O’Reilly O’Reilly Media, Inc. www.oreilly.com TTI/Vanguard December 1, 2005

Web 2 - TTI/Vanguard€¦ · • Rendezvous-enabled • Not yet collaborative • No "architecture of participation" 36 4. Software Above the Level of a Single Device ... Web 2.0

Embed Size (px)

Citation preview

Web 2.0 Tim O’Reilly

O’Reilly Media, Inc.www.oreilly.com

TTI/VanguardDecember 1, 2005

1

Pattern Recognition

•How many of you use Linux?

•How many of you use Google?

•What’s being missed here?

2

The "Killer Apps” of the New Millennium

CraigsList

Wikipedia

3

What do these apps have in common?

CraigsList

Wikipedia

4

Information Businesses

5

Software As a Service

6

Harnessing Collective Intelligence

7

Web 2.0

8

How Many of You Have O’Reilly Books?

9

What We Really Do At O'Reilly

•Find interesting technologies and peopleinnovating from the edge

•Amplify their effectiveness by spreadingthe information needed for others tofollow them.

•Our goal: “Changing the world byspreading the knowledge of innovators.”

10

Watch the Alpha Geeks!

Rob Flickenger and his potato chip can antenna

• New technologies first exploited by hackers,then entrepreneurs, then platform players

• Two examples– Wireless community networks

predict universal Wi-Fi– Screen scraping predicts web services

11

"The future is here. It's just notevenly distributed yet."

--William Gibson

12

(Control by API)

Desktop ApplicationStack

Proprietary Software

Hardware Lock InBy a Single-Source Supplier

System Assembled fromStandardized

Commodity Components

13

Free and Open Source Software

Cheap Commodity PCs

Intel Inside

14

ProprietarySoftware As a Service

Subsystem-Level Lock In

Integration of CommodityComponents

Internet ApplicationStack

Apache

15

"The Law of Conservationof Attractive Profits"

"When attractive profits disappear at onestage in the value chain because a productbecomes modular and commoditized, theopportunity to earn attractive profits withproprietary products will usually emerge atan adjacent stage."

-- Clayton ChristensenAuthor of The Innovator's Solution

In Harvard Business Review, February 2004

16

Six Rules for SuccessfulWeb 2.0 Applications

17

1. Users Add Value

The key to competitive advantage in internetapplications is the extent to which users addtheir own data to that which you provide.

18

Remember What I Said Earlier?

Hackers are “lead users”who tell us where thefuture is going.

Companies apply theirinsights in new contextsto build next-generationproducts.

19

Listening to Linux and Open Source

• Architect your software in such a way that it canbe used easily as a component of a largersystem. (Architect for participation!)

• Grant a license that does not hinder such acombination.

• Let developers “scratch their own itch” bymodifying or extending the software.

• Release early and release often.• Set up mechanisms for users to submit bugs

and patches. Promote your most active usersinto roles of greater responsibility.

20

Listening to eBay

• Business Week: ”Upwards of 430,000people in the U.S. alone -- more than areemployed worldwide by General Electric Co.and Procter & Gamble combined -- earn afull- or part-time living on eBay”

The users ARE the application!

21

Listening to Google• Google leverages millions of independent linkers

via PageRank algorithm, AdSense

• Business model monetizes “the long tail” ofinternet advertising

Source: Wired Magazine

22

Amazon - JavaScript

23

BN - JavaScript

24

CraigsList

25

WikiPedia

26

MapQuest - the counterexample

27

MapQuest - The Counter-Example

• Another killer app of Web 1.0• Didn’t add user content• First Yahoo!, then MSN, then Googleintroduced competing properties using thesame underlying data

• No increasing returns or network effects

28

1. Users Add Value

The key to competitive advantage in internetapplications is the extent to which users addtheir own data to that which you provide.

Therefore: Don’t restrict your “architecture ofparticipation” to software development.Involve your users both implicitly andexplicitly in adding value to your application.

29

2. Network Effects by Default

Only a small percentage of users will go tothe trouble of adding value to yourapplication.

30

Listening to Napster• Building on top of open source, Yahoo! pays

people to build their directory

• Learning from open source, DMOZ/OpenDirectory and Wikipedia use volunteers

• Implementing one of the deep trends behindopen source, P2P file sharing users build songswapping network as a byproduct of their ownself-interest

31

2. Network Effects by Default

Only a small percentage of users will go tothe trouble of adding value to yourapplication.

Therefore: Set inclusive defaults foraggregating user data as a side-effect oftheir use of the application.

32

3. The Perpetual Beta

When devices and programs are connectedto the internet, applications are no longersoftware artifacts, they are ongoing services.

33

3. The Perpetual Beta

When devices and programs are connectedto the internet, applications are no longersoftware artifacts, they are ongoing services.

Therefore: Do not package up new featuresinto monolithic releases, but instead addthem on a regular basis as part of thenormal user experience. Engage your usersas real-time testers, and instrument theservice so that you know how people usethe new features.

34

4. Software Above the Level of aSingle Device

The PC is no longer the only access devicefor internet applications, and applicationsthat are limited to a single device are lessvaluable than those that are connected.

35

Listening to ITunes

iTunes

• Software above thelevel of a single device• Database back end• Web services-enabled (CDDB)• Rich client front ends• Mobile device support• Rendezvous-enabled

• Not yet collaborative• No "architecture ofparticipation"

36

4. Software Above the Level of aSingle Device

The PC is no longer the only access devicefor internet applications, and applicationsthat are limited to a single device are lessvaluable than those that are connected.

Therefore: Design your application from theget-go to integrate services across handhelddevices, PCs, and internet servers.

37

5. Data is the Next “Intel Inside”

Applications are increasingly data-driven.

Therefore: Owning a unique, hard-to-recreate source of data may lead to an Intel-style single-source competitive advantage.

38

Google Maps/Navteq

39

Google Maps again

40

Own the Namespace

Some data is a commodity and impossible forany one party to own, but access to the datacan be controlled through legal means.

Therefore: If you can’t own the data, own the namespace or registry for the data.

41

6. A Platform Beats an ApplicationEvery Time

•Lotus 1-2-3•WordPerfect•Netscape Navigator

•Excel•Word•Internet Explorer

42

Two Types of Platform• One Ring to Rule Them All

• Small Pieces Loosely Joined

43

Small Pieces Loosely Joined

• An architecture of participation means thatyour users help to extend your platform

• Low barriers to experimentation mean that thesystem is "hacker friendly" for maximuminnovation

• Interoperability means that one component orservice can be swapped out if a better onecomes along

• "Lock-in" comes because others depend onthe benefit from your services, not becauseyou're completely in control

44

6. A Platform Beats an ApplicationEvery Time

Web 2.0 applications are built of a network ofcooperating data services.

Therefore: Offer web services interfaces andcontent syndication, and re-use the dataservices of others.

45

Google Maps + Craig’s List

46

Google maps + flickr

47

“I’m an inventor.I became interested inlong term trends becausean invention has to makesense in the world inwhich it is finished, notthe world in which it isstarted.”

-Ray Kurzweil

48

For more information

http://www.oreilly.com/go/web2

http://radar.oreilly.com