Uploaded by syggsg

O'Reilly Web 2.0

advertisement
Web 2.0
Tim O’Reilly
O’Reilly Media, Inc.
www.oreilly.com
TTI/Vanguard
December 1, 2005
Pattern Recognition
• How many of you use Linux?
• How many of you use Google?
• What’s being missed here?
1
The "Killer Apps” of the New Millennium
CraigsList
Wikipedia
2
What do these apps have in common?
CraigsList
Wikipedia
3
Information Businesses
4
Software As a Service
5
Harnessing Collective Intelligence
6
Web 2.0
7
How Many of You Have O’Reilly Books?
8
What We Really Do At O'Reilly
• Find interesting technologies and people
innovating from the edge
• Amplify their effectiveness by spreading
the information needed for others to
follow them.
• Our goal: “Changing the world by
spreading the knowledge of innovators.”
9
Watch the Alpha Geeks!
• New technologies first exploited by hackers,
then entrepreneurs, then platform players
• Two examples
– Wireless community networks
predict universal Wi-Fi
– Screen scraping predicts
web services
Rob Flickenger and his potato chip can antenna
10
"The future is here. It's just not
evenly distributed yet."
--William Gibson
11
Desktop Application
Stack
Proprietary Software
(Control by API)
System Assembled from
Standardized
Commodity Components
Hardware Lock In
By a Single-Source Supplier
12
Free and Open Source Software
Cheap Commodity PCs
Intel Inside
13
Internet Application
Stack
Proprietary
Software As a Service
Integration of Commodity
Components
Apache
Subsystem-Level Lock In
14
"The Law of Conservation
of Attractive Profits"
"When attractive profits disappear at one
stage in the value chain because a product
becomes modular and commoditized, the
opportunity to earn attractive profits with
proprietary products will usually emerge at
an adjacent stage."
-- Clayton Christensen
Author of The Innovator's Solution
In Harvard Business Review, February 2004
15
Six Rules for Successful
Web 2.0 Applications
16
1. Users Add Value
The key to competitive advantage in internet
applications is the extent to which users add
their own data to that which you provide.
17
Remember What I Said Earlier?
Hackers are “lead users”
who tell us where the
future is going.
Companies apply their
insights in new contexts
to build next-generation
products.
18
Listening to Linux and Open Source
• Architect your software in such a way that it can
be used easily as a component of a larger
system. (Architect for participation!)
• Grant a license that does not hinder such a
combination.
• Let developers “scratch their own itch” by
modifying or extending the software.
• Release early and release often.
• Set up mechanisms for users to submit bugs
and patches. Promote your most active users
into roles of greater responsibility.
19
Listening to eBay
• Business Week: ”Upwards of 430,000
people in the U.S. alone -- more than are
employed worldwide by General Electric Co.
and Procter & Gamble combined -- earn a
full- or part-time living on eBay”
The users ARE the application!
20
Listening to Google
• Google leverages millions of independent linkers
via PageRank algorithm, AdSense
• Business model monetizes “the long tail” of
internet advertising
21
Source: Wired Magazine
Amazon - JavaScript
22
BN - JavaScript
23
CraigsList
24
WikiPedia
25
MapQuest - the counterexample
26
MapQuest - The Counter-Example
• Another killer app of Web 1.0
• Didn’t add user content
• First Yahoo!, then MSN, then Google
introduced competing properties using the
same underlying data
• No increasing returns or network effects
27
1. Users Add Value
The key to competitive advantage in internet
applications is the extent to which users add
their own data to that which you provide.
Therefore: Don’t restrict your “architecture of
participation” to software development.
Involve your users both implicitly and
explicitly in adding value to your application.
28
2. Network Effects by Default
Only a small percentage of users will go to
the trouble of adding value to your
application.
29
Listening to Napster
• Building on top of open source, Yahoo! pays
people to build their directory
• Learning from open source, DMOZ/Open
Directory and Wikipedia use volunteers
• Implementing one of the deep trends behind
open source, P2P file sharing users build song
swapping network as a byproduct of their own
self-interest
30
2. Network Effects by Default
Only a small percentage of users will go to
the trouble of adding value to your
application.
Therefore: Set inclusive defaults for
aggregating user data as a side-effect of
their use of the application.
31
3. The Perpetual Beta
When devices and programs are connected
to the internet, applications are no longer
software artifacts, they are ongoing services.
32
3. The Perpetual Beta
When devices and programs are connected
to the internet, applications are no longer
software artifacts, they are ongoing services.
Therefore: Do not package up new features
into monolithic releases, but instead add
them on a regular basis as part of the
normal user experience. Engage your users
as real-time testers, and instrument the
service so that you know how people use
the new features.
33
4. Software Above the Level of a
Single Device
The PC is no longer the only access device
for internet applications, and applications
that are limited to a single device are less
valuable than those that are connected.
34
Listening to ITunes
iTunes
• Software above the
level of a single device
• Database back end
• Web servicesenabled (CDDB)
• Rich client front ends
• Mobile device support
• Rendezvous-enabled
• Not yet collaborative
• No "architecture of
participation"
35
4. Software Above the Level of a
Single Device
The PC is no longer the only access device
for internet applications, and applications
that are limited to a single device are less
valuable than those that are connected.
Therefore: Design your application from the
get-go to integrate services across handheld
devices, PCs, and internet servers.
36
5. Data is the Next “Intel Inside”
Applications are increasingly data-driven.
Therefore: Owning a unique, hard-torecreate source of data may lead to an Intelstyle single-source competitive advantage.
37
Google Maps/Navteq
38
Google Maps again
39
Own the Namespace
Some data is a commodity and impossible for
any one party to own, but access to the data
can be controlled through legal means.
Therefore: If you can’t own the data, own
the namespace or registry for the data.
40
6. A Platform Beats an Application
Every Time
•Excel 1-2-3
•Lotus
•WordPerfect
•Word
•Netscape
•Internet
Explorer
Navigator
41
Two Types of Platform
• One Ring to Rule Them All
• Small Pieces Loosely Joined
42
Small Pieces Loosely Joined
• An architecture of participation means that
your users help to extend your platform
• Low barriers to experimentation mean that the
system is "hacker friendly" for maximum
innovation
• Interoperability means that one component or
service can be swapped out if a better one
comes along
• "Lock-in" comes because others depend on
the benefit from your services, not because
you're completely in control
43
6. A Platform Beats an Application
Every Time
Web 2.0 applications are built of a network of
cooperating data services.
Therefore: Offer web services interfaces and
content syndication, and re-use the data
services of others.
44
Google Maps + Craig’s List
45
Google maps + flickr
46
“I’m an inventor.
I became interested in
long term trends because
an invention has to make
sense in the world in
which it is finished, not
the world in which it is
started.”
-Ray Kurzweil
47
For more information
http://www.oreilly.com/go/web2
http://radar.oreilly.com
48
Download