Thursday, August 29, 2019
Networking Essay Example | Topics and Well Written Essays - 2000 words
Networking - Essay Example Chief among those rules is this: Build applications that harness network effects to get better the more people use themâ⬠(Pang 2009). Unfortunately, there is still no exact definition available for this technology. In order to understand the concept of Web 2.0, one needs to be an information technology expert. The innovative web 2.0 has aid users to explore Internet in different ways. Similarly, this comes with the idea of collaboration and communication with users, people and organizations of analogous interest (Wang, Ching-Huang Wang et al. 2010). Moreover, many people discuss Web 2.0 by indicating YouTube, face book, twitter etc. These websites support features of Web2.0, as is composed of Rich Internet Application (RIA), Ajax, flash, web services, Service Oriented Architecture (SOA), iterative language and social web. The technologies associated with RIA are AJAX, Java FX, Microsoft Silverlight and Flex.The idea is to integrate desktop computing experience to the browser by integrating more than one application on the web browser. On the other hand another key component called as SOA provides a flexible platform for organizations to add services. As organizations expand businesses, SOA provides room to include innovative services and products. The primary objective of SOA is to add services as the business expands. Furthermore, Web 2.0 has introduced new social networking websites including improved interactions with employees, customers, suppliers etc. Issues Internet has blossomed vast opportunities for developers, programmers, businesses to operate a business. On the other hand, new threats keep on effecting Internet and services associated with it. Organizations are extremely cautious regarding the Internet security because Web 2.0 allows the involvement of core systems directly from the web sites. Moreover, almost everyone bank is now offering ââ¬Ëonline bankingââ¬â¢ services, which needs security with strict compliance. Most of the issues related to Internet, fallââ¬â¢s in the domain of operational problems. Web users tend to give correct personal information online to websites and a forum, which is, unsafe. Likewise, when the user access websites, chat with friends, and download software for various purposes, a hidden file known as Trojans creates a hidden remote connection, providing all the information to the hacker. For instance, if a web user conducts an online transaction via a credit card, the Trojan will extract the credit card number as the user types it from the keyboard, and sends it to the hacker. Consequently, the hacker may use credit card, resulting in financial loss. In corporate business environments, the impact is even more as compared to the home user. Hackers may breach in databases, file servers, and data warehouses, to extract classified information related to future-plans, milestones etc. and denting the organization with substantial business loss. Pornography on the web is another debatable issue, when considering children. As numerous pornographic websites are providing high quality pictures and videos, that can be accessed easily. Pornographic statistics from ââ¬Ë
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.