C.4 The Evolving Web Flashcards
C.4.1
Discuss how the web has supported new methods of online interaction such as social networking.
Some technologies which were crucial in the development of web 2.0 were:
* Flash
* Ajax / API
* Javascript
Internet standards also helped interporability and facilitated online interaction. For example:
* standard file formats: JSON, XML
C.4.2
Describe how cloud computing is different from a client-server architecture
Client sever architecture:
An application gets split into the client side and server-side.
Cloud computing
Still relies on client server architecture but puts focus on sharing resoruces over the internet. SaaS is a subset of cloud computing, as it offers applications / services over the cloud (the internet).
C.4.3
Discuss the effects of the use of cloud computing for specified organizations
Using cloud storage will allow organisation to store information that can be accessed with any device that has an internet connection.
There are two types of cloud computing services, private cloud and public cloud.
In a private cloud, the company owns the data centres which deliver the service to internal users only.
In a public cloud, the cloud computing service is offered and maintained by a third party company.
The benefits and disadvantages are the same as the pros and cons of using SaaS.
C.4.4
Discuss the management of issues such as copyright and intellectual property on the web
Copyright law protects any original works and copyright protection is automatic
If you want people to be able to use your works and change it, then they can opt for a creative commons license instead.
Common copyright licenses for software include:
* MIT license
* Apache license 2.0
C.4.5
Describe the interrelationship between privacy, identification and authentication
Privacy:
Privacy is the seclusion of information from others. In the context of the web this can relate to healthcare records or passwords to name a few.
Identification:
Defined as the process of claiming to be one’s identity. This process is important for privacy and is required for authentication.
Authentication:
Process of proving/confirming one’s identification. Most usually done through a username-password combination, but more important data might use two factor authentication. This usually involves two of the following three: something you have (key, phone for SMS message), something you know (password), and something you are (fingerprint).
C.4.6
Describe the role of network architecture, protocols and standards in the future development of the web
People are trying to make the web more semantic, this will require new standards but existing architecture and protocols can be used.
People are also trying to distribute it and introduce more P2P networks, this however will require new network architecture and protocols as much of the web is still centralised.
Protocols and architecture will have to keep adapting to ensure that data is safe from malicious activity as hackers find more and more ways to breach security.
C.4.7
Explain why the web may be creating unregulated monopolies
Monopolies is when a single company dominates an industry.
Many people are not tech savvy so switching between tech devices or doing things on the web is difficult for them. Therefore they prefer to stick with brands they are already familiar with.
There are high barriers to entry for this market so there is less competition. Additionally, even when startup companies gain traction, they are often aggressibely aqquired by the monopolies.
C.4.8
Discuss the effects of a decentralized and democratic web
Benefits:
* More control over data
* tracking data and surveillance is harder
* other benefits with decntralised networks (mentioned in previous deck)
Issues:
* Security is harder as there are more points of attack
* other issues with decntralised networks (mentioned in previous deck)