Feeds

AJAX and 2.0 madness

Does every new generation need the 2.0 tag?

Top three mobile application threats

Comment Web 2.0 has a lot to answer for. Why, incidentally, is it not simply Web 2?

In any case, I have no quarrel with Web 2.0: what I do have a quarrel with is all the other 2dotohs that keep springing up. There is SaaS (software as a service) 2.0 for example and, most recently, Business Objects has been talking about BI 2.0.

This looks altogether too much like a trend, so here is my first (early) prediction for 2007: we will see more and more 2dotohs dreamed up by fancy marketing executives. I guess we should be lucky that data warehouse appliances vendors haven't described themselves as data warehousing 2.0.

And it won't end there: some smart Alec will figure out that if 2dotoh is good then 3dotoh will be great. Moreover, we'll probably start to have products that incorporate 2dotoh. So, instead of product x release y+1 we'll have product x release y 2.0. Oh yuck - pass me the sick bag!

However, all of this is not to say there aren't genuinely new generations of things coming to pass. For example, business intelligence really is in the process of re-inventing itself, though it has a lot to do yet. One of those things, as it happens, relates to AJAX (asynchronous JavaScript and XML), which derives from the Web 2.0 world.

Now, AJAX supports what are known as rich internet applications. Put simply, what these allow you to do is to interact dynamically with a web-based application at a field level, rather than having to refresh web pages all the time. A lot of web-based applications require you to fill in a form and the application can't respond to you until the form is completed; what rich internet applications allow the software to do is to respond to you on a field by field basis, thereby supporting a much richer customer experience. However, this isn't what's important about AJAX for BI.

Most BI tools do not provide interactive graphics. For example, suppose you have a dashboard that shows a variety of inter-related data using, say, a spreadsheet, a scatter plot and a histogram. Now, what you might want to do is to look at a subset of the data in more detail and a good way to do this might be to draw a box on the scatterplot that surrounded the items you were interested in and then select this subset to investigate. In this scenario you want all of the presentation options in use to change automatically as you make that selection. Well, you can't do that using conventional browser technology, but you will be able to do it using AJAX.

Like most technologies this represents both an opportunity and a threat. It is an opportunity for potential users and it is an opportunity for the majority of BI players who can't do this yet. On the other hand it is a threat to those few companies that have already developed ways to do this, notably Advizor Solutions, Spotfire, and Visual Sciences, as they will lose one of the major differentiators that they have when compared to the likes of Business Objects and Cognos. Of course, they will argue they have some very clever graphics and are further down this road than the big boys. Both of these facts are true, but that does not mean that these vendors will not come under increasing pressure as BI 2.0 develops.

Copyright © 2006, IT-Analysis.com

Maximizing your infrastructure through virtualization

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.