Web 2.0 & 3.0Web 2.0 & 3.0
CIO/CTO ForumCIO/CTO Forum
March 21, 2007March 21, 2007Srik Soogoor, Founder & CEO, Visvo, Inc.Srik Soogoor, Founder & CEO, Visvo, Inc.
Web 2.0Web 2.0“I can’t tell you what it is…but I know it when I see it”
“Web 2.0 is a set of social, economic, and technology trends that collectively form the basis for the next generation of the Internet – a more mature, distinct medium characterized by user participation, openness, and network effects.”
Tim O’Reilly, Fall 2006
Web 2.0 Web Site CharacteristicsWeb 2.0 Web Site Characteristics
The site should not act as a “walled garden” – it should be easy to get data in and out of the system.
Users usually own their data on the site and can modify it at their convenience.
Mainly Web-based – Most successful Web 2.0 applications can be used almost entirely through a Web browser: this is commonly referred to by the phrase “network is the platform.”
Data returns should be dynamic rather than static, changing depending on variables associated with the user’s query (keywords, location).
An “architecture of participation” that allows users to add value to the application as they use it.
Social networking aspects
Your customer base is truly global.1 billion worldwide with Internet access and growing.
Your customers are always on.Broadband usage approaching 50 percent.
Your customers are connected everywhere they go.2 billion mobile devices.
Your customers aren’t just connected, they’re engaged.Nearly 50 percent of US adults have contributed content online.
Your costs of production have dramatically decreased.IT infrastructure costs are down by 72 percent in six years.
You have new revenue opportunities.Online advertising in US is up 37 percent in 2006.
Market Drivers of Web 2.0Market Drivers of Web 2.0
8 Core Patterns of Web 2.0 Success8 Core Patterns of Web 2.0 Success
Harnessing collective intelligence
Data is the Next “Intel Inside”
Innovation in Assembly
Rich User Experiences
Software Above the Level of a Single Device
Perpetual Beta
Leveraging the Long Tail
Lightweight Models and Cost-Effective Scalability
Enterprise 2.0 is the use of emergent social software platforms within companies, or between companies and their partners or customers.
Enterprise 2.0Enterprise 2.0
Best Practices of Enterprise 2.0Best Practices of Enterprise 2.0
Seek to own a unique, hard to recreate source of data
Enhance the core data
Users control their own data
Make some rights reserved, not all
Define a data stack strategy
Own the index, namespace, or format
Design data for reuse
Outsource or supply data access management
Innovation in Assembly
Data as the next “Intel Inside”
Software Above the Level of a Single Device
Harnessing
collective
intelligenceLightweight
models
Cost Effective Scalability
Perpetual Beta
Web 2.0
Search
Enterprise 2.0
LinksAuthoring
TagsExtensions
Signals E2.0 Apps
wikis
blogs
Social freeform emergent
Networks, Data and Software
Connected Devices and People
Read/write access
Rich User Experiences
Network effects
Global micro markets of internet and enterprise IT users (1 –2 billion people)
Anatomy of Web 2.0 and Enterprise 2.0Anatomy of Web 2.0 and Enterprise 2.0
mySpace
Flickr
Visvo
YouTube
cxoOnly
Amazon
craigsList
SalesForce
37Signals
Windows Live
Open Solaris
ExamplesExamples
Web 2.0Web 2.0 Enterprise 2.0Enterprise 2.0
ExamplesExamples
myEngineer.com
Recommendations for the EnterpriseRecommendations for the Enterprise
1. It’s about ease-of-use, first and foremost.
2. Change requires motivation. Provide it.
3. Emergent doesn’t mean a blank slate.
4. Discoverability isn’t an afterthought, it’s the core.
5. It’s OK to fear loss of control and misuse.
6. Dynamic, effective advocates are a key enabler.
7. Triggering an Enterprise 2.0 ecosystem quickly is likely an early activity driver.
8. Allow the tools to access enterprise services.
Example: Hidden Social Network Strengths
Example: Hidden Social Network Strengths
Knowledge management and collaboration.Help locate expertise.Seed new communities of practice.Improve cross-functional knowledge-sharing.Strategic decision-making across leadership teams.
Team-building.Facilitate post-merger integration.Help leaders identify how to structure teams for innovation.Structure and manage distributed teams.
Human resources.Identify and monitor the effects of workforce diversity, hiring practices and leadership development.Improve on-boarding, retention, employee satisfaction and productivity.
Sales and marketing.Speed or expand the adoption of new products, technologies or ideas as part of an overall
communication strategy.
Strategy.Support planning and strategy for engaging in partnerships and alliances.
Business Applications of Social Networking
Business Applications of Social Networking
Recommendations for EnterprisesRecommendations for Enterprises
Build Community
Communicate & Collaborate
Customize the Experience
Integrate wit Existing Repositories
Protect User Information
Social NetworkingSocial Networking
Build CommunityBuild Community
Build Community
Member GroupsProfilesSearchReportingEvents calendar, RSVPTagging, RSS FeedsPoints systemContest ManagementBanner TrackingMembership Levels
Communicate & Collaborate
Content Management System MP3, Video and Podcasting supportMedia Galleries supporting video, music, documents, imagesForums and Message BoardsE-mail lists/trackingImport remote RSS feedsWikiSystem-wide Messaging
Communicate & CollaborateCommunicate & Collaborate
Customize the Experience
Hub & Spokes Multi-sitesCustom ModulesCustomizable User ExperienceEditable system mail
Customize the ExperienceCustomize the Experience
Integrate with Existing Repository
Web Services LDAPMature API
Integrate with Existing RepositoryIntegrate with Existing Repository
Protect User Information
ACL support, Module access controlMember RolesMembership RulesSecure Admin areaFully automatic security updatesPrivate hardware, private network (optional)Physical security
Protect User InformationProtect User Information
Protect User Information
ACL support, Module access controlMember RolesMembership RulesSecure Admin areaFully automatic security updatesPrivate hardware, private network (optional)Physical security
Protect User InformationProtect User Information