The Wayback Machine - https://web.archive.org/web/20190125210804/http://openwebdeveloper.sys-con.com/node/456101

Welcome!

Release Management Authors: Pat Romanski, Elizabeth White, David H Deans, Liz McMillan, Jnan Dash

Related Topics: Machine Learning , Java IoT, Industrial IoT, Mobile IoT, Microservices Expo, ColdFusion, IBM Cloud, PowerBuilder, Weblogic, Microsoft Cloud, Linux Containers, Adobe Flex, Open Source Cloud, Containers Expo Blog, Eclipse, Cognitive Computing , Silverlight, Agile Computing, Wearables, Release Management

Machine Learning : Article

Where Are RIA Technologies Headed in 2008?

What are the most burning AJAX, rich web applications, and Web 2.0 questions need to be answered in 2008?

I am always being told off by i-technologists for quoting Picasso as having said that computers are useless. But I still love his reasoning? "Because they can only give you answers."

Picasso, like AJAXWorld Magazine, liked questions. So we thought we would share with you what some of the world's leading rich Internet application pioneers are thinking may be the next questions that we need to see answered. From that readers can themselves infer where AJAX is headed.

What are the top questions to ask next about AJAX?

Eric Miraglia of Yahoo!

1.  (From March'08) How do I calculate the ROI of building my RIA on the iPhone SDK vs using AJAX?

2.  How do I assess the performance of my app and decide what to do next to make it faster? 

3.  When it comes to accessibility, how do I know what's required of me for my rich web apps?  Beyond what's required, what makes good business sense?

4. What are the ten most important steps I can take to make sure my rich internet app is secure?  What tools are available to help me diagnose whether it's secure?

5. For all the press that they get, are mashups really contributing to the experience of the web? 

Douglas Crockford, creator of JSON

I just have one question I'd like answered: How are we to fix the web? AJAX exploits all of the remaining capability of the 1999 browser standards, which were not state of the art even then. Where do we go from here? Will open standards fall to technologically superior proprietary systems?

Coach Wei, founder and CTO of Nexaweb

1.  What are people mostly using AJAX for? Enhancing existing website, building a new website, building an application, replacing an old client/server application, etc?

2.  How much JavaScript did your team write for your AJAX-enabled website/web app (excluding third party Javascript libraries): under a hundred lines of Javascript, a few hundred lines , a few thousand lines, tens of thousands of lines or even more?

3.  Are you using mashup or do you plan to do some mashup, for which kind of project?

4.  Which tools (IDE) do people using for AJAX development?

5.  Do you still develop web 1.0 style applications, and why?

See next page for predictions from: Google's Christian Schalk, JackBe's John Crupi, Josh Gertzen of the ThinWire AJAX Framework, Kevin Hakman of TIBCO GI, and Andre Charland of Nitobi.

JOIN IN THE DISCUSSION: What would your questions be: please add them here.

AJAXWorld 2008 East Call for Papers Is Closing Shortly!

Submissions deadline: December 31, 2007

Next March's Conference is has been receiving higher-caliber suggestions and submissions than ever.

Is it easy yet to make AJAX applications that easily go offline? Are developers better off using an AJAX framework, a toolkit or just coding their own AJAX/JavaScript? Will JavaScript 2.0 be a success, or a dud? How can AJAX apps be made secure? When will AJAX development finally be easy? Submissions on these and dozens of other topics have already begun streaming in to AJAXWorld Conference & Expo 2008 East, being held in New York City on March 18-20, 2008.

Click here to submit your speaking proposal today !

More Stories By Jeremy Geelan

Jeremy Geelan is Chairman & CEO of the 21st Century Internet Group, Inc. and an Executive Academy Member of the International Academy of Digital Arts & Sciences. Formerly he was President & COO at Cloud Expo, Inc. and Conference Chair of the worldwide Cloud Expo series. He appears regularly at conferences and trade shows, speaking to technology audiences across six continents. You can follow him on twitter: @jg21.

Comments (15)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
History of how we got here. What IoT devices are most vulnerable? This presentation will demonstrate where hacks are most successful, through hardware, software, firmware or the radio connected to the network. The hacking of IoT devices and systems explained in 6 basic steps. On the other side, protecting devices continue to be a challenging effort. Product vendors/developers and customers are all responsible for improving IoT device security. The top 10 vulnerabilities will be presented a...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Where many organizations get into trouble, however, is that they try to have a broad and deep knowledge in each of these areas. This is a huge blow to an organization's productivity. By automating or outsourcing some of these pieces, such as databases, infrastructure, and networks, your team can instead focus on development, testing, and deployment. Further, organizations that focus their attention on these areas can eventually move to a test-driven development structure that condenses several l...
The graph represents a network of 1,329 Twitter users whose recent tweets contained "#DevOps", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 10 January 2019 at 23:50 UTC. The tweets in the network were tweeted over the 7-hour, 6-minute period from Thursday, 10 January 2019 at 16:29 UTC to Thursday, 10 January 2019 at 23:36 UTC. Additional tweets that were mentioned in this...
Security Past the Perimeter: An Immune System for the Cloud
The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace-and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety? This discussion will highlight which means there are to protect IoT devices from unau...
Over the course of two days, in addition to insightful conversations and presentations delving into the industry's current pressing challenges, there was considerable buzz about digital transformation and how it is enabling global enterprises to accelerate business growth. Blockchain has been a term that people hear but don't quite understand. The most common myths about blockchain include the assumption that it is private, or that there is only one blockchain, and the idea that blockchain is...