"Businesses are starting to realise the strengths of web 2.0 in terms of fast deployment of rich internet applications, use of open source technologies, and the communications benefits it can provide to employees and customers," said John Andrews, president and chief executive at Evans Data.
"While developers are the 'early adopters' of the technology, the demand for web 2.0 talent is only getting hotter. It is an indication that the business market will continue to grow quite rapidly."
The 2008 Web 2.0 Development Report from Evans Data suggests that developers are working on web 2.0 software for business applications in several areas, including interface design, widget development and social networking sites.
In terms of interface design, 40 per cent of interfaces for web 2.0 applications are 'mixed' web-rich clients that include Ajax for fast downloads of pages with live feeds of data (widgets) and other dynamic components found in web 2.0 applications.
An "overwhelming" majority of respondents are using widgets from Google, Microsoft, Yahoo and others to deploy fast, lightweight business applications and services.
Additionally over half of the developers in scientific and technical fields see social networking as a communications and collaboration medium.
Businesses wake up to web 2.0
By
Robert Jaques
on Apr 18, 2008 7:13AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

Channel can help lead customers to boosting workplace wellbeing with professional headsets

Tech For Good program gives purpose and strong business outcomes

Kaseya Dattocon APAC 2024 is Back

Build cybersecurity capability with award winning Fortinet training from Ingram Micro

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report