Feeds

Web 2.0 - carry on, don't lose your job

Been there, seen that

Top 5 reasons to deploy VMware with Tegile

The IT industry is masterful at recycling old concepts under new names. Web 2.0's transition from the mass market to the enterprise is a case in point.

Every aspect of Web 2.0 has its historic parallel. Software as a service (SaaS) providers used to be called time-sharing bureaus. Wikis were content management systems and blogging used to be online publishing. Even social networking has its origins in Douglas Englebart's work on collaborative working at the Augmentation Research Center (ARC).

It is surprising then that Web 2.0's move to the enterprise has become the latest pantomime villain set to steal IT workers' jobs.

The argument runs that a combination of SaaS, wikis, blogging and mash up software will put application builders out of work as "business" people learn to build and manage their own applications. AJAX, not outsourcing, is the new enemy.

This year certainly saw established middleware and tools companies - IBM, BEA Systems, Oracle and Serena Software to name just four - chant the mantra of business people building their own applications in order to sound fashionable and sell more of their software.

However, there are mixed signals on the true progress of Web 2.0 in the enterprise market.

Web 2.0 - a kit bag of terms wrapping in Enterprise 2.0 and Office 2.0 - does appear to be finding its way into business according to reports here and here.

When not regaling us with stories of jobs lost to SaaS enterprise resource planning (ERP), though, InformationWeek highlights the challenges facing enterprise adoption of Web 2.0 once companies begin rolling them out and realizing their limitations.

Unfortunately for the Web 2.0 evangelists, it seems Web 2.0 applications and services must fit in with - not replace - companies' existing software, they must integrate with other new Web 2.0 software and services, they are in need of customization, and - oh - those social networking sites you've heard so much about seem to be fed more by vendors with a vested interest in running the service than an end user community actually donating code.

One thing is clear. If developers' jobs are under threat it is unlikely to be from a bagful of old technologies under a new name.®

Intelligent flash storage arrays

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.