Welcome!

Machine Learning Authors: Yeshim Deniz, Zakia Bouachraoui, Liz McMillan, Pat Romanski, Elizabeth White

Related Topics: Machine Learning , Java IoT, Microservices Expo, Microsoft Cloud

Machine Learning : Article

As IBM Jumps On Board, There's Just No Stopping AJAX Now

AJAX Will Define the Entire i-Technology Year In 2006

Dion Hinchcliffe, veteran software architect and editor-in-chief of Web 2.0 Journal, is very forthright about AJAX:

"I assert that AJAX encourages, even enables, software creators down a path that is inherently disruptive to the greater software world."
What does Hinchcliffe mean by "disruptive"? He means that "traditional native software" (as he calls it) will never be able to compete with the fact that AJAX software delivers an application fresh to your browser each time you load the URL, so that you're always getting the latest version, with all fixes and updates, automatically. "It's the end of software upgrades, fixes, and security patches," he says.

Next comes the fact that, because AJAX apps generally require no installation of software, you can run your apps and get your data anywhere you find a browser: at an Internet kiosk, cafe, library, friend's home, etc. "I love it that great AJAX software like Writely lets me have my software, and all my data, wherever I am at the click of a URL," Hinchcliffe enthuses. "I can effortlessly share it with others when I want and I never have to spend any of my time copying files to thumb drives, e-mailing things to other accounts, etc. It makes life so much simpler and easy."

It is the end of "isolated software," Hinchcliffe insists. "Connected software" is what is taking over. He explains:

"AJAX software is delivered using the entire Web as a platform. That means it can (with a little proxy on the server, provided by the AJAX developer) talk to and use any service out on the greater Web. This has facilitated a dizzying array of 'mash-ups' - and it means that software created from scratch is going away, as it should."
Above all what Hinchcliffe deems disruptive about AJAX is that it is hastening the deprecation of the traditional operating system.

"The issue is that AJAX software is almost completely operating system neutral," he says, adding: "AJAX applications use the Web itself as their platform and just need a browser with JavaScript and XmlHttpRequest."

"And to be sure, some browser compatibility testing must be done, but that will issue will likely only decrease as AJAX development tools provide the browser abstraction automatically. In the end, whether a user is running Windows, Linux, MacOS, or something else entirely doesn't matter. AJAX is even on mobile devices now. This is enormously disruptive to the gigantic operating system industry which generally depends on being the most compelling platform for their target audience. That just isn't the case any more. The Web is that compelling platform for an increasing number of people."
Hinchcliffe isn't the only one to be so adamant about AJAX's game-changing nature.


Next Page:
AJAX Predictions For 2006

More Stories By Jeremy Geelan

Jeremy Geelan is Chairman & CEO of the 21st Century Internet Group, Inc. and an Executive Academy Member of the International Academy of Digital Arts & Sciences. Formerly he was President & COO at Cloud Expo, Inc. and Conference Chair of the worldwide Cloud Expo series. He appears regularly at conferences and trade shows, speaking to technology audiences across six continents. You can follow him on twitter: @jg21.

Comments (1)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomplished expert in Enterprise Architecture, Adi has also served as CxO advisor to numerous Fortune executives.
In addition to 22 Keynotes and General Sessions, attend all FinTechEXPO Blockchain "education sessions" plus 40 in two tracks: (1) Enterprise Cloud (2) Digital Transformation. PRICE EXPIRES AUGUST 31, 2018. Ticket prices: ($295-Aug 31) ($395-Oct 31) ($495-Nov 12) ($995-Walk-in) Does NOT include lunch.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo the God, also posted personal information of celebrities and government officials, including Michelle Obama, former CIA director John Brennan, Kim Kardashian and Tiger Woods. Taylor recently became an advisor to cybersecurity start-up Path which helps companies make sure their websites are properly loading around the globe.
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, insiders, government compulsion, and network hackers? Join Ambuj Kumar (CEO, Fortanix) to discuss best practices and technologies for enterprises to securely transition to a multi-cloud hybrid world.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a member of the Society of Information Management (SIM) Atlanta Chapter. She received a Business and Economics degree with a minor in Computer Science from St. Andrews Presbyterian University (Laurinburg, North Carolina). She resides in metro-Atlanta (Georgia).