10. “In real space, we recognise how laws regulate – through
constitutions, statutes, and other legal codes. In cyberspace we
must understand how a different ‘code’ regulates – how the
software and hardware [...] that make cyberspace what it is also
regulate cyberspace as it is.” Lessig, L. (2006) Code 2.0. New
York, Basic Books, p.5.
“We can build, or architect, or code cyberspace to protect
values that we believe are fundamental. Or we can build, or
architect, or code cyberspace to allow those values to disappear.
There is no middle gound. There is no choice that does not
include some kind of building. Code is never found; it is only
ever made, and made only ever by us” (Ibid p.6.) “Cyberspace
will present us with ambiguities over and over again [...] we will
be forced to do something we’re not very good at doing –
deciding what it is we want, and what is right.” (Ibid p.25-6)
17. WEB 2.0
The term WEB 2.0 results from an attempt to understand and
classify the common features that link the web based applications
emerging in the last seven years, following the ‘bursting of the
dot.com bubble’ in 2001. According to Tim O’Reilly , CEO of
O’Reilly Media , who coined the term in partnership with
MediaLive International, these applications have gained
ascendancy because they are better equipped to utilize the
potential of the internet, than were the previous generation of
“WEB 1.0” programs.
19. WEB 2.0
Netscape vs. Google
Netscape Google
• Delivered as a service
• Sold as software
• Database management
• Series of tools
• Contained within a Browser:
• Browser: Allowing you to
becoming intergral to the
interact with information.
infomation.
20. WEB 2.0
Amazon
Amazon sold the same and was provided the same
information as its rivals, but unlike its rivals it made
better use of the internet.
• They allow customers to submit reviews.
• They publish customer ratings.
• They prioritise popular items.
• They build recommended lists and show you
items related to your last purchase.
21.
22. WEB 2.0
O’Reilly’s summary.
• Services, not packaged software.
• Control over unique, hard-to-recreate data
sources that get richer as more people use
them.
• Trusting users as co-developers.
• Harnessing collective intelligence.
• Leveraging the long tail through customer
service.
• Software above the level of a single device.