Open Source
   Cloud Computing
   Web 2.0
   Mobile Technologies

Contact us

   91 40 27803303


  Connect with us on:

What is Web 2.0 technology?
Web 2.0 is the term used to describe a variety of web sites and applications that allow anyone to create and share online information or material they have created. A key element of the technology is that it allows people to create, share, collaborate and communicate. Web 2.0 differs from other types of websites as it does not require any web design or publishing skills to participate, making it easy for people to create and publish or communicate their work to the world. The nature of this technology makes it an easy and popular way to communicate information to either a select group of people or to a much wider audience. The University can make use of these tools to communicate with students, staff and the wider academic community. It can also be an effective way to communicate and interact with students and research colleagues.

There are number of different types of Web 2.0 applications including wikis, blogs, social networking, folksonomies, podcasting and content hosting services. Many of the most popular websites are Web 2.0 sites such as Wikipedia, YouTube, Facebook, MySpace, Flickr and more.

A Wiki is a collaborative website that anyone within the community of users can contribute to or edit. A Wiki can be open to a global audience or can be restricted to a select network or community. Wikis can cover a specific topic or subject area. Wikis also make it easy to search or browse for information. Although primarily text, wikis can also include images, sound recordings and films. Wikipedia, the free internet encyclopedia is the most well known Wiki.

A blog is a contraction of the words web log. Blogs usually provide commentary or information on a particular issue, event or topic. In some cases, blogs can be about a particular person, an online, public or personal diary. A blog is usually maintained by a single person or a small group of contributors. Visitors to the blog can comment on the entries made or respond to comments made by other visitors. Blogs are primarily text but can also be the form of photos or other images, sounds or films.

Social Networking
Social networking allows an individual to create a profile for themselves on the service and share that profile with other users with similar interests to create a social network. Users can choose to have public profiles which can be viewed by anyone or private profiles which can only be viewed by people that the users allow. Users can usually post photographs, music and videos on their site. Popular social network services include Facebook.

Content Hosting Services
Content hosting or content sharing sites allow users to upload content that they have created for others to view. Two of the most popular of these sites are YouTube, for videos and Flickr, for photographs. Users can also create an individual profile and list their favorite photos or videos. Users are able to rate and comment on the videos or photos posted and provide feedback to the creator and other users. Copyright infringement is an issue for some of these services as many users do not upload original content.

The Applications for Web2.0

Web 2.0 Application Developments:

Applications on the Web are evolving from the model of centralized control to a much more distributed pattern of information distribution, illustrated by the growing popularity of blogs, wikis, syndication, communities and content sharing. This new model is being called Web 2.0.

This explores the changing patterns in the production, transfer and consumption of content on the world Wide Web. Attend this course and you gain a clear understanding of Web 2.0, potential applications and service and the technologies required in both the fixed and mobile environments.

As Web 2.0 application usage and sophistication increase, so does the need for flexible access and Web 2.0- ready security, since even seemingly safe sites can be targeted for malware distribution. McAfee understands the security needs of the Web 2.0 world and offers the industry’s most effective, proven web security solutions, web solutions protect users and assets from malware entering the network as well as misuse of the Internet. Beyond simply allowing or denying access, our solutions let you control how web applications are used, enabling a safe, productive Web 2.0 experience. For example, you can allow users to access Facebook, but block their access to Facebook games. Web 2.0 solutions also prevents unauthorized data from leaving the organization through bot- infected machines attempting to phone home or users attempting to transmit sensitive data — intentionally or unintentionally.

With Coresonant Web 2.0 solutions, you can deploy web security any way you choose, from the cloud, through our robust on-premise appliances and in virtualized environments, to best fit your network needs.