Web 2.0

Read Complete Research Material

Web 2.0


Web 2.0 is an evolution of the Web towards greater simplicity (not requiring extensive technical knowledge or computer for users) and interactivity (allowing everyone to contribute in different forms). It is a method of designing systems that are networked by considering the interactions; they work better as more people use them. Web 2.0 introduces an update in the technical specifications of the web and cumulative alterations in the mode that software programmers and clients use Web. The new technology is qualitatively different from previous Web technologies that have been questioned by the creator of the World Wide Web, Tim Berners-Lee.

Currently, Web 2.0 has altered the order of people's access to data and sharing. Since the list is growing tremendously with the introduction of more application. Web 2.0 has become so popular that many companies today use the term in its marketing, often without even realizing what it means. This has raised concerns regarding security of Web 2.0. The paper aims to discuss he security implications of Web 2.0, modern security application associated, most successful approaches to security in Web 2.0 (Hua, 2011).


The question about Web 1.0 and Web 2.0 is not so simple, because a lot of avid terms of the beautiful Startups do not have anything to do with Web 2.0. By analyzing the most successful projects of the Web 1.0 and the most interesting new applications, we have attempted to highlight the basic principles of Web 2.0. In recent years, Web 2.0 has changed the order of people's access to data and sharing. It is now almost impossible to find a public or private entity that is not using Web 2.0 features to solve various problems and organizing processes. Web 2.0 refers to the increased use of interactive and computing. These tools accelerate information sharing and collaboration through a smooth union of computers and data. Social networking sites, blogs, wikis, websites for collective viewing video, host-services, Web and composite applications, folk classification are just some examples of how Web 2.0 (Health Management Technology, 2009).

Cloud computing also includes features of Web 2.0 by distributing the data between different devices and combining them again. For example, backup services and organization of public access, such as Dropbox and Apple Mobile Me provide opportunities to store and retrieve data using a variety of devices including desktops, laptops and smart phones. Google Apps and Salesforce.com have functions which are absent in traditional computing environments (Allen, 2001).

Despite all the advantages of Web 2.0, when using this technology costs fall, but they do not guarantee the value systems and software. Web 2.0 leads to serious problems with security involving heavy costs. On the one hand, IT departments must control a complex web of interconnected servers (sometimes serving multiple organizations or departments) and try to understand the ways in which moving data streams. While on the other hand, there is practically no way to implement standards or to use a set of agreed policies to protect application servers and ...
Related Ads