The Wayback Machine - https://web.archive.org/web/20190203094023/http://openwebdeveloper.sys-con.com:80/node/456101

Welcome!

Release Management Authors: Pat Romanski, Elizabeth White, David H Deans, Liz McMillan, Jnan Dash

Related Topics: Machine Learning , Java IoT, Industrial IoT, Mobile IoT, Microservices Expo, ColdFusion, IBM Cloud, PowerBuilder, Weblogic, Microsoft Cloud, Linux Containers, Adobe Flex, Open Source Cloud, Containers Expo Blog, Eclipse, Cognitive Computing , Silverlight, Agile Computing, Wearables, Release Management

Machine Learning : Article

Where Are RIA Technologies Headed in 2008?

What are the most burning AJAX, rich web applications, and Web 2.0 questions need to be answered in 2008?

I am always being told off by i-technologists for quoting Picasso as having said that computers are useless. But I still love his reasoning? "Because they can only give you answers."

Picasso, like AJAXWorld Magazine, liked questions. So we thought we would share with you what some of the world's leading rich Internet application pioneers are thinking may be the next questions that we need to see answered. From that readers can themselves infer where AJAX is headed.

What are the top questions to ask next about AJAX?

Eric Miraglia of Yahoo!

1.  (From March'08) How do I calculate the ROI of building my RIA on the iPhone SDK vs using AJAX?

2.  How do I assess the performance of my app and decide what to do next to make it faster? 

3.  When it comes to accessibility, how do I know what's required of me for my rich web apps?  Beyond what's required, what makes good business sense?

4. What are the ten most important steps I can take to make sure my rich internet app is secure?  What tools are available to help me diagnose whether it's secure?

5. For all the press that they get, are mashups really contributing to the experience of the web? 

Douglas Crockford, creator of JSON

I just have one question I'd like answered: How are we to fix the web? AJAX exploits all of the remaining capability of the 1999 browser standards, which were not state of the art even then. Where do we go from here? Will open standards fall to technologically superior proprietary systems?

Coach Wei, founder and CTO of Nexaweb

1.  What are people mostly using AJAX for? Enhancing existing website, building a new website, building an application, replacing an old client/server application, etc?

2.  How much JavaScript did your team write for your AJAX-enabled website/web app (excluding third party Javascript libraries): under a hundred lines of Javascript, a few hundred lines , a few thousand lines, tens of thousands of lines or even more?

3.  Are you using mashup or do you plan to do some mashup, for which kind of project?

4.  Which tools (IDE) do people using for AJAX development?

5.  Do you still develop web 1.0 style applications, and why?

See next page for predictions from: Google's Christian Schalk, JackBe's John Crupi, Josh Gertzen of the ThinWire AJAX Framework, Kevin Hakman of TIBCO GI, and Andre Charland of Nitobi.

JOIN IN THE DISCUSSION: What would your questions be: please add them here.

AJAXWorld 2008 East Call for Papers Is Closing Shortly!

Submissions deadline: December 31, 2007

Next March's Conference is has been receiving higher-caliber suggestions and submissions than ever.

Is it easy yet to make AJAX applications that easily go offline? Are developers better off using an AJAX framework, a toolkit or just coding their own AJAX/JavaScript? Will JavaScript 2.0 be a success, or a dud? How can AJAX apps be made secure? When will AJAX development finally be easy? Submissions on these and dozens of other topics have already begun streaming in to AJAXWorld Conference & Expo 2008 East, being held in New York City on March 18-20, 2008.

Click here to submit your speaking proposal today !

More Stories By Jeremy Geelan

Jeremy Geelan is Chairman & CEO of the 21st Century Internet Group, Inc. and an Executive Academy Member of the International Academy of Digital Arts & Sciences. Formerly he was President & COO at Cloud Expo, Inc. and Conference Chair of the worldwide Cloud Expo series. He appears regularly at conferences and trade shows, speaking to technology audiences across six continents. You can follow him on twitter: @jg21.

Comments (15)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace-and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety? This discussion will highlight which means there are to protect IoT devices from unau...
The term "digital transformation" (DX) is being used by everyone for just about any company initiative that involves technology, the web, ecommerce, software, or even customer experience. While the term has certainly turned into a buzzword with a lot of hype, the transition to a more connected, digital world is real and comes with real challenges. In his opening keynote, Four Essentials To Become DX Hero Status Now, Jonathan Hoppe, Co-Founder and CTO of Total Uptime Technologies, shared that ...
Intel is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley. It is the world's second largest and second highest valued semiconductor chip maker based on revenue after being overtaken by Samsung, and is the inventor of the x86 series of microprocessors, the processors found in most personal computers (PCs). Intel supplies processors for computer system manufacturers such as Apple, Lenovo, HP, and Dell. Intel also manufactu...
The graph represents a network of 1,329 Twitter users whose recent tweets contained "#DevOps", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 10 January 2019 at 23:50 UTC. The tweets in the network were tweeted over the 7-hour, 6-minute period from Thursday, 10 January 2019 at 16:29 UTC to Thursday, 10 January 2019 at 23:36 UTC. Additional tweets that were mentioned in this...
Gartner projected that by the year 2022, smart contracts will be in use by more than 25% of global organizations despite speculative risks. Smart contracts allow blockchain applications to perform secure, immutable and valid transactions and contractual conditions without third parties. The EVP of SIGNiX, a PKI e-signature provider launching SmarTract (smart contracts to automate legal contracts and more), Pem Guerry would like to share how blockchain's smart contracts enable enterprise organiza...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
History of how we got here. What IoT devices are most vulnerable? This presentation will demonstrate where hacks are most successful, through hardware, software, firmware or the radio connected to the network. The hacking of IoT devices and systems explained in 6 basic steps. On the other side, protecting devices continue to be a challenging effort. Product vendors/developers and customers are all responsible for improving IoT device security. The top 10 vulnerabilities will be presented a...