The document discusses various Internet and web technologies. It describes how the Internet is a network of networks that provides services globally. It then discusses several key Internet technologies that enable information sharing over the Internet, including protocols like TCP/IP, hardware like routers, and software for various functions. Finally, it outlines several popular Internet and web applications for activities like searching, communications, education, news, and entertainment.
IT infrastructure and network technologies by Mark John Lado Mark John Lado, MIT
Information technology infrastructure is defined as set of information technology (IT) components that are the foundation of an IT service; typically components (computer and networking hardware and facilities), but also various software and network components.
Network technology is any technology by which two or more computer systems are connected and communicate information between them.
This presentation is all about the internet basics we need to know before making a website or some other internet related works . This will help you to have a clear idea on What Is Internet.
Thank you
feel free to ask any queries in comment box
IT infrastructure and network technologies by Mark John Lado Mark John Lado, MIT
Information technology infrastructure is defined as set of information technology (IT) components that are the foundation of an IT service; typically components (computer and networking hardware and facilities), but also various software and network components.
Network technology is any technology by which two or more computer systems are connected and communicate information between them.
This presentation is all about the internet basics we need to know before making a website or some other internet related works . This will help you to have a clear idea on What Is Internet.
Thank you
feel free to ask any queries in comment box
My IT Management course in UBC MBA
Prof: Ron Cenfetelli
Web 2.0 – Moving beyond HTML
Confidentiality
Authentication
Ability to verify the identity of people/organizations
Data/Message Integrity
Ensuring communications were not modified in transit/storage
Nonrepudiation
Parties cannot deny a communication
Proof that the sender sent and proof that the receiver received
this complete notes contains 5 power point slide, first 5 give u a practcal information about internet, and another ms word file contains all theory information
Internet Notes, this notes will give how to learn internet for the students, who wants to learn internet.
to more information plz visit www.maruthivishnuvardhan.blogspot.com or mail me at maruthivardhan200@gmail.com your loving friend Maruthi K.B.
this complete notes contains 5 power point slide, first 5 give u a practcal information about internet, and another ms word file contains all theory information
Learning Outcomes
A Network of Networks
Internet
Define Computer Networks
Define Communication
State Importance of Computer network and communication
Network classification
Types of networks
Comparison of different networks
TCP/IP
Hypertext Transfer Protocol
Internet
A network formed by the co-operative interconnection of a large no. of computer networks.
Since Internet is formed by the interconnection of no. of networks, sometimes its also called as network of networks
Telecommunications, Internet and Wireless TechnologyPiyushHooda
This is a presentation on Telecommunications, Internet and wireless technology available to a corporate firm. It is a part of Management information system
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
1. Internet
The Internet is the world’s largest public
computer network; a network of networks
that provides a vast array of services to
individuals, businesses, and organizations
around the world.
In this section:
• Internet Technologies
• Web
• Internet and Web Applications
CT3g > Concepts > Internet
2. Internet
Technologies
Many different Internet technologies work
together to provide information and services
over the Internet, including a variety of
protocols, hardware, and software.
In this section:
• Internet Backbone • Client/Server • Domain Name System
• TCP/IP • Peer-to-Peer (DNS)
• Internet Service • Router • Port
Provider • Internet2
CT3 > Concepts > Internet > Internet Technologies
3. Internet Backbone
The Internet backbone refers
to the main Internet pathways
and connections, made up of
the many national and
international communication
networks that are owned by
major telecom companies,
such as Verizon, AT&T, and
Sprint—the same companies
and networks that provide
telephone service.
Links:
Gartner, Inc.: Magic Quadrant for U.S. Network Service Providers
Mapnet: View Internet backbone
AT&T international backbone
CT3 > Concepts > Internet > Internet Technologies > Internet Backbone
4. TCP/IP
The protocols on which the
Internet is based are the
Transmission Control Protocol
(TCP) and Internet Protocol
(IP); together referred to as
TCP/IP.
Internet applications divide up
information, such as an email
message, into small packets to make
efficient use of the network. Upon
arriving at their destination, the
packets are reconstructed into the
original message.
Links:
Internet Assigned Numbers Authority (IANA)
PBS: Packet Switching Demo
CT3 > Concepts > Internet > Internet Technologies > TCP / IP W3Schools: TCP/IP Tutorial
IP version 6 (IPv6)
5. Internet Service Provider
A company that provides individuals
and organizations with access to the
Internet is called an Internet service
provider (ISP).
Internet service providers have been under the scrutiny of privacy advocates and
government regulators for analyzing the data packets that flow over their networks. In a
practice called traffic shaping, or packet shaping, ISPs analyze data packets and inhibit
packets from sources that are hogging bandwidth, so that all customers have more equal
use of the bandwidth.
Links:
ISP-Planet: Top 23 U.S. ISPs by Subscriber
CNET: Internet access tools
CT3 > Concepts > Internet > Internet Technologies > Internet Service Provider
6. Router
A router is a network device
that manages network traffic by
evaluating messages and
routing them over the fastest
path to their destination.
Although routers play a crucial role on the
Internet backbone, they also are used on
smaller networks. Routers are used on
business and home networks to allow
computers on the network to communicate.
Links:
Princeton University: Traceroute Tool
Visualware: VisualRoute tool
CT3 > Concepts > Internet > Internet Technologies > Router
7. Domain Name System (DNS)
The Domain Name System (DNS) maintains a database of
all domain names and IP addresses used on the Internet and
acts like a phonebook, supplying information to Internet
nodes and routers working to get data packets to their
destination. Links:
The TCP/IP Guide
Internet Corporation for Assigned Names and Numbers (ICANN)
ICANN: Accredited Registrars
InformationWeek:
CT3 > Concepts > Internet > Internet Technologies > Domain Name System (DNS)
8. Port
In a computer
network context, a
port is an address
used by clients and
servers that is
associated with a
specific service.
Just as the post office sorts mail by zip code,
Internet servers sort data packets by port
number to deliver them to the intended service.
Links:
Listing of port numbers
CT3 > Concepts > Internet > Internet Technologies > Port Webopedia: Well-Known TCP Port Numbers
9. Internet2
Internet2 is a research and development consortium led by more
than 200 U.S. universities and supported by partnerships with
industry and government to develop and deploy advanced network
applications and technologies for tomorrow’s Internet
Links:
Internet2
National LambdaRail
Internet2 Applications
CT3 > Concepts > Internet > Internet Technologies > Internet2
Access Grid
10. Web
Technologies
The Web, short for World Wide Web, is an
Internet service that provides convenient
access to information and services through
hyperlinks.
In this section:
• Web Browser • XML • Cookie
• Web Server • CSS • Plug-in
• URL • Web Development • Web Programming
• HTML Software
CT3 > Concepts > Internet > Web
11. Web Browser
A Web client, usually called a
Web browser, such as Internet
Explorer, Safari, and Firefox, is
used to request Web pages from
Web servers, interpret the HTML
code in the Web page that is
delivered, and display it onscreen.
Links:
TopTenREVIEWS: Internet Browser Software Review
Firefox Web browser (Windows, Mac, Linux)
Internet Explorer Web browser (Windows)
Safari Web browser (Windows and Mac)
CT3 > Concepts > Internet > Web > Web Browser http://www.opera.com/
Google Chrome Web browser (Windows)
12. Web Server
The term Web server refers to software that
fulfills Web page requests from Web clients,
and the computers that run such
software.
Web hosting companies provide Web
service and Web storage services to
individuals and businesses for an annual
fee. Links:
The Register: Apache rules web server landscape
Web Hosting Choice: Best 10 Web Hosting Sites
CT3 > Concepts > Internet > Web > Web Server Apache Software Foundation
WebServUSB
13. URL
The Internet Corporation for Assigned
Names and Numbers (ICANN) is
responsible for managing URLs and IP
addresses. ICANN authorizes
businesses known as accredited
registrars to register new domain names.
A Uniform Resource Locator, more commonly called a
URL, acts as a Web page address, incorporating the domain
name of the Web server and the location of the Web page
file on the server. Links:
ICANN
ICANN: Top-Level Domains
CT3 > Concepts > Internet > Web > URL ICANN: Accredited Registrars
name domains
14. HTML
Hypertext Markup Language (HTML) is the
primary markup language used to specify the
formatting of a Web page.
Links:
W3Schools: HTML Tutorial
CT3 > Concepts > Internet > Web > HTML W3C: XHTML2 Working Group Home Page
15. XML
XML (Extensible Markup
Language) provides a
method for describing and
classifying Internet-delivered
data so that it is easier to
organize and manage.
Links:
W3C: The Semantic Web
W3Schools: XML Tutorial
W3C: Extensible Markup Language (XML)
CT3 > Concepts > Internet > Web > XML Microsoft: XML Developer Center
16. CSS
Cascading Style Sheets or CSS
allows easy application of visual
styles for fonts, colors, layout, and
other page attributes to create a
visual theme for Web pages and
sites.
Links:
W3C: Cascading Style Sheets
http://www.w3schools.com/css/
CSS Zen Garden
CT3 > Concepts > Internet > Web > CSS
17. Web-Development Software
Web development software
allows developers to create Web
pages more easily using a word-
processing-style environment and
automating complex coding
activities.
WYSIWYG (pronounced ―wizzie-
wig‖) implies that the Web page you
design with the Web development
software will look the same when
published on the Web.
Links:
Adobe Dreamweaver CS4 software
Aptana software
Web Developer’s Journal
CT3 > Concepts > Internet > Web > Web-Development Software
18. Cookie
A cookie, sometimes called an
HTTP cookie, is a small text file
placed on a user’s computer by a
Web server in order to identify the
user whenever he or she returns to
visit a Web site.
Cookie files can contain data or
perhaps a unique identifier that is
used to look up your personal profile
in a database on the server.
Links:
Cookie Central
Microsoft: Information About Cookies
Firefox: Cookies
CT3 > Concepts > Internet > Web > Cookie
19. Plug-In
A plug-in works with a Web
browser to offer extended
services such as audio
players, video, animation, 3D
graphics viewers, and
interactive media.
Links:
Internet Explorer Add-ons
CT3 > Concepts > Internet > Web > Plug-In Download.com: Plug-ins
Firefox Add-ons
20. Web Programming
Web programming
refers to the
development of
software written to run
either in a Web browser
or on a Web server,
using Web-based input
and output.
Links:
Java + You
JavaScript, The Definitive JavaScript Resource
W3Schools: JavaScript Tutorial
Adaptive Path – Ajax: A New Approach to Web Applications
CT3 > Concepts > Internet > Web > Web Programming )
21. Internet and
Web Applications
Internet and Web applications are varied and many, assisting individuals,
businesses, and organizations with all facets of life including education, news
and information sharing, communication, travel, commerce, and entertainment.
In this section:
• Search Engine • Online Education • Online TV and Video
• Portal • Online Travel • Online Games
• Internet Communications • Online Employment • Web 2.0
• Online Information Support • Web 3.0
• Online News • Online Music
CT3 > Concepts > Internet > Internet and Web Applications
22. Search Engine
A search engine is a valuable
software tool that enables
users to find information on the
Web by specifying words that
are key to their topics of
interest—keywords.
Links:
Google
63% 20% 3% Live
Yahoo!
AOL Search
Ask
Dogpile
Mahalo
Wikia Search
A9
CT3 > Concepts > Internet > Internet and Web Applications > Search Engine Search Engine Showdown
Google: Improve Your Search Experience
23. Portal
A Web portal is a
Web page that
combines useful
information and links,
and acts as an entry
point to the Web—the
first page you open
when you begin
browsing the Web.
Links:
iGoogle
My Yahoo!
MSN
AOL
About.com: The Top Personalized Start Pages
Killer Startups: Start-page Review
VerticalPortals.com Main Directory
CT3 > Concepts > Internet > Internet and Web Applications > Portal IBM: Portals and dashboards
24. Internet Communications
Links:
Internet communications include text- Wikipedia: Emoticon
Wikipedia: List of common emoticons
based communications such as email and NetLingo: The List of Chat Acronyms & Text
Message Shorthand
instant messaging, voice communications AIM Instant Messenger
Internet Relay Chat
such as Voice over IP (VoIP), video Yahoo! Web Chat
Spin Chat
communications, and a variety of group and Skype
Second Life
community forums. Vonage VoIP Internet Phone Service
TokBox Live Video Calling
Cisco TelePresence
CT3 > Concepts > Internet > Internet and Web Applications > Internet Communications HP Halo telepresence & video conferencing
25. Online Information
Online information refers
to information of all
kinds—business,
personal, governmental,
factual, opinionated, even
inaccurate—that is
delivered over the Internet
and Web.
Wikipedia provides a platform for Internet users to share
information on every topic. Links:
Wikipedia
Purdue University: Searching the World Wide Web
Naperville (IL) Central High School: Research Tips for the Internet
CT3 > Concepts > Internet > Internet and Web Applications > Online Information
26. Online News
Online news refers
to newspapers,
magazines,
journals, news
radio and
television, and
blogs that deliver
news and
information about Links:
current events on PBS
NPR
AP
BBC
Technorati
Blogs.com
Google News ABC News Google Reader
the Web. Yahoo! News
The New York Times
Newsvine Google News
MSNBC Yahoo! News
Yahoo!: News By Industry The Boston Globe Digg
San Francisco Chronicle The Miami Herald Newsvine
CT3 > Concepts > Internet > Internet and Web Applications > Online News Citizen Journalism Report Chicago Tribune Reuters
27. Online Education
In a program it calls OpenCourseWare,
the Massachusetts Institute of
Technology (MIT) is offering all of its
courses free online. Students who take
courses via OpenCourseWare will not
earn credit toward a degree or have
access to teachers, but they can benefit
from the knowledge gained.
Online education refers to Web sites designed to educate
or support education and training. Links:
MIT: OpenCourseWare
Open Courseware Consortium
Blackboard Learning Management System
SkillSoft
Yale University: Open Yale Courses
CT3 > Concepts > Internet > Internet and Web Applications > Online Education eHow
Certiport
28. Online Travel
Online travel refers to Web sites and
services that support various travel
activities such as preparing for travel,
finding your way around new
environments, reserving flights and
lodging, booking tours and activities,
and renting vehicles.
Links:
Google Maps
Google Earth
Microsoft Virtual Earth
Microsoft Live Search Maps
MapQuest
Travelocity
Expedia
Priceline
iPhone GPS
Loopt
CT3 > Concepts > Internet > Internet and Web Applications > Online Travel
Yahoo! Travel
29. Online Employment Support
Online employment support
refers to Web-delivered
information and services that
support researching
employment options and finding
employment.
•Select a career.
•Discover who the players are in your chosen career
•Learn about the companies that interest you
•Network with others in the field.
•View job listings at general employment Web sites. Links:
•View job listings at industry-specific employment Web sites JobWeb
Yahoo! HotJobs
•Create an impressive Web site to represent yourself. Monster
CareerBuilder
College Board Career Browser
CareerOverview.com
U.S. Department of Labor: Occupational Outlook Handbook
CT3 > Concepts > Internet > Internet and Web Applications > Online Employment Support
30. Online Music
Online music refers to
music delivered through
Internet-based or Web-
based services and
includes Internet radio,
music subscription
services, and music
download services.
Links:
Pandora is a unique online music service that Live365
Pandora
builds radio stations around the listener’s Last.fm
Apple iTunes
musical tastes. Microsoft’s Zune
Amazon MP3 Downloads
Napster
Rhapsody
CT3 > Concepts > Internet > Internet and Web Applications > Online Music Podcast Alley
31. Online TV and Video
Online TV and video
refers to television
programming, motion
pictures, movies, and
user-generated video
available on the Web.
Links:
Hulu
Joost
ABC
CBS
NBC
Netflix
YouTube
CT3 > Concepts > Internet > Internet and Web Applications > Online TV and Video Google Video
32. Online Games
Online games are the many different
types of single-user, multiuser, and
massively multiuser games played on the
Internet and the Web.
Multiplayer online games can be categorized into the
following genres:
•Action •Role-Playing Games
•Board (RPG)
•Card •Sims
•Flight Simulation •Sports
•MultiUser Dimension or •Strategy
MultiUser Dungeon •Trivia/Puzzle
(MUD)
Links:
Ferion
MSN Games
Massively Multi-Player Online Role Playing Games
Top 100 Game Sites
XBox LIVE
CT3 > Concepts > Internet > Internet and Web Applications > Online Games World of Warcraft
The Lord of the Rings Online
33. Web 2.0
Web 2.0 refers to Web
resources that allow average
users to collaborate and
contribute to Web content,
and to the transition of the
Web from an information
resource to a computing
platform.
Links:
CT3 > Concepts > Internet > Internet and Web Applications > Web 2.0 List of Links
34. Web 2.0 Links
• Social networks: • Rich Internet Apps:
– Facebook – Google Docs
– MySpace – Google Apps
– LinkedIn – 37signals
• Social bookmarking: – Zoho
– Digg – Flypaper
– Delicious – SlideRocket
• Crowdsourcing: – icloud
– Wikipedia – eyeOS
– Epinions – Buzzword
• Media sharing: – Todoist
– Flickr – Adobe Photoshop Express,
– SmugMug • Other:
– YouTube – Plaxo Web 2.0 aggregator
• Blogging: – Swurl Web 2.0 aggregator
– WordPress – SecondLife virtual world social network
– Blogger
– Twitter
– Jaiku
– Pownce
– Plurk
– Spoink
35. Web 3.0
Web 3.0 refers to the next
major change that will take
place in Web technology, and
as such is speculation at this
point.
Links:
The New York Times: Entrepreneurs See a Web Guided by Common Sense
CT3 > Concepts > Internet > Internet and Web Applications > Web 3.0