Welcome!

Recurring Revenue Authors: Elizabeth White, Yeshim Deniz, Xenia von Wedel, Liz McMillan, Carmen Gonzalez

Related Topics: Machine Learning

Machine Learning : Article

AJAX: The i-Technology Story of 2005

AJAX and related developments in the rich internet application (RIA) space has been an incredible story in 2005

I try not to write too much about technical topics on this blog but the story of AJAX and related developments in the rich internet application (RIA) space has been an incredible story in 2005. For example, "AJAX" was a term coined in only February with publication of the now-famous and seminal paper on the topic by Jesse James Garrett of Adaptive Path. Since then, it has practically become a household word and a central plank in the Web 2.0 story. I knew something very special was going on when I wrote a blog article summarizing the history of AJAX and its overall development that subsequently received tens of thousands of reads in a single day and took my server down a bunch of times (admittedly, it was slashdotted, but that's the point really.)

I believe Web 2.0, as exciting as it is, is only starting to happen. We have a long way to go and lots of interesting developments are taking place almost daily which are changing the very ground upon which we all stand. For example, I wrote about AMASS in an article last week. AMASS provides a pretty clean and simple client-side storage system for Web 2.0 applications to permanently keep information on your local computer without badly breaking security or being too egregious a hack. Now someone has mashed-up that capability with TrimQuery, a JavaScript database engine that provides the capabilities of a robust SQL database in about 700 lines of JavaScript. The result allows extremely sophisticated applications to be built to run in most any browser and run online, or offline, without the risk of losing data. We are watching the Web client turn into a full-blown computing platform in front of our very eyes.



It's not clear the world is 100% ready for long loading AJAX applications yet but then again one big driver of all this is that network bandwidth is increasing much faster than Moore's Law, the famous driving force of the original computer industry. Another sign of progress is that even the ugliness of the early versions of the Ajax model are getting fixed. Brad Neuberg (yes, the AMASS guy) has just published a very impressive article on the O'Reilly site on how to fix the Back button and add bookmark support for Ajax. These were some of the classic problems that Alex Bosworth first identified and complained about with AJAX and this new DHTML way of building non-reloading pages that are really whole applications. My point is that not only are we witnessing history in the making but it's very much not about creating "Frankenstein" hacks to make it happen. There is considerable work going into making it elegant and well-designed too.

I'm committed to understanding and helping explain the big picture of Web 2.0 and contribute to painting and appreciating the whole panorama of what is happening in this important space. While some of it will certainly be about interesting and readily accessible topics, like the wisdom of crowds, we also need to know that some of the most compelling work is going into the nuts and bolts work of pushing the underlying technology towards supporting this new vision of the Web. Stay tuned for more...

Technorati: web2.0, ajax
See Live Related Bookmarks: Del.lookup for this site... 

posted Tuesday, 1 November 2005 12:45 AM

More Stories By RIA News Desk

Ever since Google popularized a smarter, more responsive and interactive Web experience by using AJAX (Asynchronous JavaScript + XML) for its Google Maps & Gmail applications, SYS-CON's RIA News Desk has been covering every aspect of Rich Internet Applications and those creating and deploying them. If you have breaking RIA news, please send it to [email protected] to share your product and company news coverage with AJAXWorld readers.

Comments (2) View Comments

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Most Recent Comments
SYS-CON Belgium News Desk 02/28/06 11:49:34 AM EST

I try not to write too much about technical topics on this blog but the story of AJAX and related developments in the rich internet application (RIA) space has been an incredible story in 2005. For example, AJAX was only a term coined in February with publication of the now-famous and seminal paper on the topic by Jesse James Garret of Adaptive Path. Since then, it has practically become a household word and a central plank in the Web 2.0 story.

SOA Web Services Journal News Desk 11/01/05 01:22:17 PM EST

I try not to write too much about technical topics on this blog but the story of Ajax and related developments in the rich internet application (RIA) space has been an incredible story in 2005. For example, Ajax was only a term coined in February with publication of the now-famous and seminal paper on the topic by Jesse James Garret of Adaptive Path. Since then, it has practically become a household word and a central plank in the Web 2.0 story.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...