When the dot.com bubble hit in 2001 due to everyone investing in the promises of world wide web technology. Companies that survived the crash realize wha they had in common. That was the need to transform from the rigid features of stand-alone, boundary-bound, customized applications to interactive and dynamic applications. Web 1.0 was all about individuality and incompatibility. for instance, when Netscape, the first browser of its kind was launched, it was a platform in itself with a browser and desktop application. it was product-oriented as it wanted to be gain market share, dominance and compete with other systems in its category. Google, however, used a service oriented approach by offering its services to the public. The trade-off was offering the public their services in exchange of storing user’s experience, habits, likes, dislikes in its ever expanding database. Google focused on improving customer experience and clearly, we all know who won the market share.
However, as we continue to advance technologically, there are new lingo like big data, internet of things, software as a service, virtual reality that pushes for more space in some sort of cloud or cloud computing and more processing power and lastly security. Security however, is still at infant stage and has just now to get the attention it deserves. On one hand, cloud computing has made it cheaper for companies to rid their datacenter equipment and maintenance and move data to the cloud. Security ought to be heavily invested before Internet of Things (IoT) fully takes offs.
However, there is clearly a trend or relationship with how major upgrades in web technology dominate the previous. The web 1.0 was like a standalone of application with boundaries and incompatibility issues. The web 2.0 is, according to O’Reilly, “a gravitational core” and”a solar system of sites that demonstrates some of all of those principles, at a varying distance from that core” (O’Reilly, 2005. pg 2). The IoT would start out as a community or smart city, state, country and eventually on a global scale. In fact, With the exploration of different planets in our solar system, it is arguably projected that planet earth might have its own Ip address but probably not in my lifetime. The world has a very long way to go before getting there…or so we know.
Tim, O’reilly (2005). What is Web 2.0. Design patterns and Business Models for the Next Generation of Software. O’Reilly
Plagiarism is very discrediting and unacceptable in every aspect of life. These days as technology has made it possible to share our ideas and more across the world, it has also constrained the plagiarism especially in the Academic field. A perfect example is the safe assign features on Ball State University’s Black board site. Because there is the tendency commit plagiarism unintentionally, safe-assign has limited the possibility with its rules of constraint. By placing some constraints in safe assign, it gives the writer a limited percentage of citations and quotes to retain the author’s original ideas while referencing claims from other authors. secondly, it uses an algorithm to search for similarities in combinations of words and sentences against a large database of words and sentences in the internet. Lastly, it acts as way of proof-reading your paper to provide top-notch quality work worth publishing. If one is able to clear the huddles of safe assign and turns his or her assignment in, there is the peace of mind and high level of confidence that your assignment is free from plagiarism.
On Friday, December 2nd, was the Accenture challenge. Our team’s energy finally returned after the delicious breakfast was served. prior to D-Day, it had been a week of research on the topic of our presentation or consultation. Generally, we were all running on few hours of sleep but we were determined to sell our ideas as professionals.Indeed, we definitely tend to perform best when under pressure and the sense of achievement outweighs the actual reward received. I remember a story i was told in Nigeria many years ago. This was the story of the race between the hawk and tortoise. At go, the hawk flew very swiftly and made it to the finish line in a matter of minutes. The tortoise, however, took his time and eventually made it to the finish line. Spectators watching the race were very excited and yet curious as to why the tortoise took so long to finish the race. Then the tortoise shared his interesting and adventurous story of how he saw different terrains, met different tribes, tried different dishes and more. Although the tortoise lost the race to time, he won the race with his rich adventures and experiences. But the most important thing is he never lost sight of the finish line. A moral to the story is to life isn’t about rushing things but expanding our knowledge and understanding of life itself.
I felt the challenge had some much to offer in terms of team work, focus, simplicity and competence. This was a real life scenario of the challenges consultants face when dealing with clients. Firstly, Team work is very important. if your team is focused, competent and have a simple style of presenting, it gives leverage to gaining the full and attention of your clients. Secondly, another ingredient to the mix would be improvisation. By improvisation, i am referring to having a contingent plan or plan B should the first plan fail. I remember Dr. Gillette corrected our team on having an estimate ready when presenting to clients. I am very happy that we got that tip because if it were an actual consultation, our pitch would have been discredited. I was very fortunate our team won second place but honored to have this opportunity to experience the challenges of consulting from Accenture.
Welcome to Center for Information and Communication Sciences Web Blog. This is where you express your thoughts on the human factors affecting technology, Politics, and the economy