<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d44687025217244124\x26blogName\x3dNah...+bacalah\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://nahbacalah.blogspot.com/search\x26blogLocale\x3den\x26v\x3d2\x26homepageUrl\x3dhttp://nahbacalah.blogspot.com/\x26vt\x3d-6913263739474953990', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

Nah... bacalah

Koleksi himpunan cerita cerita lawak, pedoman dan pelbagai lagi. sekadar untuk menceriakan hari dan memanjangkan lagi pandangan dan fikiran.

 

Muridku Cerdik

Seorang guru, Cikgu Murni (Umur: 22) menghadapi masalah dengan salah seorang muridnya (Abu). Lalu guru ini bertanya kepada murid tersebut : "Apa sebenarnya masalah awak, Abu?"
Lalu Abu menjawab, "Saya terlalu cerdik untuk berada di darjah 4, kakak saya menduduki UPSR dan saya lebih cerdik dari dia, maka saya seharusnya berada di tempat yang sama juga!".

Cikgu Murni dah tak tertahan. Dia bawa Abu ke pejabat pengetua. Sementara Abu menunggu di ruang tamu, Cikgu Murni terangkan keadaan tersebut kepada pengetua. Pengetua mengatakan yang dia akan berikan ujian kepada Abu dan jika Abu gagal menjawab, maka Abu harus kekal di darjah 3 dan berkelakuan baik. Abu dibawa masuk ke pejabat Pengetua dan Cikgu Murni terangkan pada Abu dan Abu bersetuju untuk ambil ujian yang akan diberikan.

Pengetua: Apa 3 x 3?
Abu: 9
Pengetua: Apa 6 x 6?
Abu: 36

Pengetua terus bertanyakan soalan2 berdasarkan tahap pencapaian murid2 UPSR dan si Abu mampu menjawab tiap soalan yang diberikan. Lalu pengetua memandang Cikgu Murni dan berkata, "Saya rasa murid ini sepatutnya berada di darjah 6", Lalu Cikgu Murni berkata pada pengetua, "Saya ada soalan saya sendiri, boleh tak saya ajukan pada Abu?". Pengetua dan Abu bersetuju.

Cikgu Murni: Apa yang lembu ada 4 di badan, tapi saya cuma ada dua?
Abu: (berfikir) Kaki

Cikgu Murni: Apa yang ada di dalam seluar kamu tapi tidak pada seluar saya?
Abu: Saku

Cikgu Murni: Apa yang bermula dengan huruf "K" akhir dengan "A", ianya berbulu, berbentuk oval, nyaman dan mengandungi lapisan nipis keputihan?
Abu: Kelapa

Cikgu Murni: Apakah yang masuk keras dan berwarna "pink", bila keluar lembik dan melekit?

Mata Pengetua terbuka luas dan sebelum sempat dia menahan, siAbu terus menjawab.

Abu: Gula-gula getah (Bubblegum)

Cikgu Murni: Apa yang mereka lakukan, lelaki secara berdiri, wanita secara duduk dan anjing secara tiga kaki?

Mata Pengetua sekali lagi terbuka sangat2 luas dan sebelum dia sempat hendak menahan si Abu terus menjawab.

Abu: Bersalaman

Cikgu Murni: Baik, sekarang saya akan ajukan soalan berbentuk siapakah saya, okay?
Abu: Baik Cikgu

Cikgu Murni: Awak memasukkan batang kedalam saya. Awak ikat saya untuk saya berdiri. Saya kebasahan sebelum awak.

Pengetua kelihatan resah dengan soalan yang diajukan oleh Cikgu Murni.

Abu: Khemah


Cikgu Murni: Jari memasuki saya. Awak menggesel-gesel saya bila awak teringatkan saya. Lelaki idaman akan mendapat saya dahulu.

Pengetua semakin resah dan tidak selesa. Lantas terus meneguk segelas Nescafe 3in1.

Abu: Cincin perkahwinan

Cikgu Murni: Saya ada bermacam-macam saiz. Bila saya sakit saya akan meleleh. Bila saya keluar, banyak tisu yang akan digunakan. Bila awak hembuskan saya, akan berasa lega.

Sekali lagi pengetua rasa amat resah dengan soalan yang di ajukan oleh Cikgu Murni dan ingin membantah, tapi si Abu mendahuluinya.

Abu: Hidung

Cikgu Murni: Saya batang yang keras. Hujungnya tajam. Saya akan datang dan masuk dengan lajunya.
Abu: Anak panah

Cikgu Murni: Sekarang saya akan ajukan soalan dalam Bahasa Inggeris, okay?
Abu: Okay

Cikgu Murni: What word starts with a 'F' and end in 'K' that means lot of heat and excitement?
Abu: Firetruck

Cikgu Murni: What word starts with a 'F' and ends in 'K' & if you dont get it you have to use your hand.
Abu: Fork

Cikgu Murni: What is it that all men have one of. It's longer on some men than on others, the pope does not use his, and a man gives it to his wife after they are married?
Abu: Surname

Cikgu Murni: What part of the man has no bones but has muscles, lots of veins and loves pumping?
Abu: Heart

Pengetua menghembuskan nafas kelegaan bila mendengar jawapan yang diberikan oleh si Abu, lantas berkata "Baik hantar murid ini ke Universiti Malaya; jawapan yang saya fikirkan semuanya salah".

Labels:

 
 

gabra punya pasal

kat baling ada satu famili...

famili tu ada ayah n mak mertua, anak dan menantu serta cucu.

satu hari, tengah sedang menantu lelakinya tgk tv, ayah nyer lalu depan dia.
tiba2 ayah mertuanyer rebah depan dia sambil pegang dada..
kelam kabut dia ..pastu bini mak mertua dia pun datang terkam..semua terkejut..
semua dh gabra..sambil pegang2 dada...ayah mertua dia pengsan..
tk sedar..pastu macam sedar tk sedar..

menantu tadi gabra..mak mentua dia suruh dia ajar mengucap kat bapak dia tu sebab dia ribakan.
dia gabra jugak...pastu bini dia pun surh sambil tolak2 bahu...
mak dia suruh lagi...
dh gabra sgt, dia pun buat..
dia letak kt telinga ayah mertua dia dan dia pun cakap...

"MA ROBBUKA...."""
terkejut bini n mak mertua dia..
tiba2 ayah mertua dia sedar dan terus sound..
"OII..AKU TK MATI LAGI DEYY...'""
sambil ayah mertua dia tu urut2 dada dia..

sepatutnya dia ajar mengucap, gabra punya pasal..dia dah jadi malaikat..

Labels:

 
 

kalau gagal cuba lagi ya!

Sang ayah dan ibu sangat marah ketika mengetahui anak perempuan mereka, seorang penjual bunga telah hamil.

"Siapa si bedebah itu !" jerit sang ayah, sedang si ibu menangis.
"Suruh dia datang kesini!"

Si anak pun sms teman lelaki ( seorang wazir) yang menghamilinya.

Setengah jam kemudian sebuah Ferrari merah dengan lampu ambulan di atsnya berhenti di depan rumah. Seorang lelaki agak tua yang berbangsa cina keluar dari kereta, mengetuk pintu lalu masuk ke rumah. Lelaki itu berhadapan dengan ibu dan ayah perempuan yang telah dihamilinya. Dia berkata, "Sayalah orangnya…saya yang telah menghamilkan anak anda. Tapi terus terang saya katakan saya tidak dapat menikahi anak anda kerana isteri saya tak mengizinkan".

Namun bagaimanapun, saya akan bertanggung jawab. Sekiranya anak anda melahirkan seorang bayi perempuan saya akan wasiatkan untuknya dua buah supermarket, sebuah hotel dan wang tunai.

Sekiranya dia melahirkan anak lelaki saya akan wasiatkan untuknya dua buah kereta mewah, dua buah supermarket, dua buah hotel dan wang tunai.

Tapi sekiranya anak anda keguguran apakah yang harus saya lakukan?"

Sang ayah berfikir. Si ibu berhenti menangis.
Akhirnya sambil menepuk bahu lelaki itu, sang ayah berkata,
"Kalau keguguran, kamu cuba lagi ya !!"

Labels:

 
 

pesanan terakhir kapten..

Pada sebuah penerbangan dari Kuala Kumpur ke Australia.

"Ini Kapten Kamal berbicara".

"Atas nama seluruh anak kapal kami mengucapkan selamat datang dan
selamat menikmati perjalanan anda bersama Hebat Airlines nombor
penerbangan MH101 dari Kuala Lumpur menuju Australia".

"Saat ini kita berada pada ketinggian 35000 kaki ke arah timur".

"Jika anda melihat ke luar jendela pada sisi sayap,
maka anda akan
melihat bahwa kedua mesin sedang terbakar"

"Jika anda melihat ke luar jendela arah ke belakang, maka anda melihat
bahagian ekor sudah mulai tercabut"

"Jika anda melihat ke bawah ke laut, anda akan melihat perahu darurat
kecil berwarna kuning dengan tiga orang melambaikan tangan kepada anda"

"Mereka adalah saya iaitu kapten anda, beserta co-pilot dan seorang
pramugari. Anda sedang mendengarkan rakaman pesan saya"

Labels:

 
 

kalau semua....semua laaa...;p

Suatu hari, sebuah bas kilang yang
memuatkan pekerja wanita sahaja sedang
menuju kilang kayu yang terletak jauh
dari kawasan kampung. Dalam perjalanan
tu..mereka terpaksa melalui kebun getah
yang sangat luas..

Nak di jadikan cerita..ada seorang mamat
kat tepi jalan menahan bas tersebut..nak
mintak tumpang..jadi bas tu pun berhenti
la... Tetiba..lebih kurang 6 orang
perompak keluar nak merompak bas tersebut..

Sorang perompak berkata..
" Keluarkan dan bagi semua barang kemas
yang korang ada..!!Cepat..!!"

Sorang pekerja kilang tu membalas..
" ..tapi..kami tak bawak barang kemas
kalau gi keja..duit pun sikit je.."

Perompak berfikir seketika..
"Ha..gini la..sebab korang takder brang
kemas & duit..kami rogol korang
SEMUA..ahahhaa.."

Pekerja kilang yang muda berkata..
" Alalaa...takkan la makcik yang kat
belakang tu nak rogol jugak..tak kesian
ker.."

Tetiba..makcik tu berdiri..
" Weh..ko nie..tak paham ker..kalau dia
cakap SEMUA..SEMUA la.."

Labels:

 
 

Sumaat

Sepasang pengantin baru mengalami gangguan kesihatan. Setelah diperiksa
dengan teliti, doktor memberitahu perkara itu disebabkan oleh hubungan seks
yang terlalu kerap.

"Untuk sementara waktu ini, anda berdua dinasihatkan supaya menghadkan
kegiatan seks. Sebaiknya dua kali saja seminggu sahaja. Untuk memudahkan
mengingat, saya sarankan untuk melakukan hubungan ini hanya pada hari yang
bermula dengan huruf S, iaitu Selasa dan Sabtu," saran doktor.

Akan tetapi pada malam ketiga berpuasa dari membuat hubungan itu, sisuami
tidak dapat lagi menahan nafsunya lalu mencumbui isterinya yang sedang
tidur sehingga isterinya terjaga.

"Hari ini hari apa bang?" tanya si isteri.

"Sumaat"

Labels:

 
 

Analisis Kesuburan

Analisis Kesuburan

Pada satu hari, seorang lelaki tua berumur 75 tahun telah berjumpa dengan seorang doktor untuk membuat analisis kesuburan dan jumlah kandungan sperma yang ada dalam air maninya. Kemudian doktor itu pun memberikan sebuah botol lalau berkata,

" Pakcik ambil botol nie, esok datang balik jumpa saya bersama dengan contoh air mani pakcik kat dalam botol nie ye."

Pada keesokan harinya, lelaki tua datang kembali bersama botol yang diberikan oleh doktor itu semalam. Tapi doktor tu tengok takde apa pun yang terisi kat dalam botol tu, kosong jer. Doktor tu bertanya ler kat orang tua tu, "Apsal pakcik tak isi contoh air mani pakcik dalam botol nie??".

Lelaki tua tu pun menjawab, "Tuan doktor, ceritanya begini, pada mulanya tu, saya guna tangan kanan saya, tapi tak dapat jugak. Kemudian saya gunakan plak tangan kiri, pun tak dapat jugak. Kemudian saya suruh isteri saya tolong. Isteri saya guna tangan kanan pun tak dapat, tangan kiri pun tak dapat. Kemudian isteri saya pakai mulut plak, tak dapat jugak. Pas tu dier gunakan gigi, pun tak dapat. Susah betul, sebab kami dah habis ikhtiar, saya panggil anak perempuan jiran sebelah rumah kami, dier pakai tangan dengan mulut jugak, pun tak dapat-dapat jugak", terang lelaki tua tu.

"APA??? Awak mintak tolong dari anak perempuan jiran awak..Huh", tanya doktor tu terkejut beruk. Lelaki tua tu pun menjawab lagi,

"Ya., betul tuan doktor, bagaimana kuatnya kami cuba, tapi masih jugak tak dapat nak bukak TUTUP BOTOL nie!!!"...

Labels:

 
 

kianat pakar bahse

Sebuah kumpulan gangster menghadapi masalah untuk mengutip wang perlindungan
dari peniaga. Ini kerana pihak polis sering membuat intipan dan tangkapan.
Ketuanya mengambil seorang bisu untuk mengutip wang tersebut. Pada pendapatnya,
tentulah polis sukar untuk menyoal siasat si bisu tersebut.

Maka si bisu pun mula mengutip wang dan berjaya memperolehi RM50,000.
Walaubagaimana pun, dia menyembunyikan wang tersebut di suatu tempat rahsia.
Maka pada hari yang telah ditetapkan, ketua gangster mengarahkan orang-orangnya
memanggil si bisu. Apabila dipanggil, si bisu itu berpura-pura tidak dapat berkomunikasi
dengan mereka. Lalu mereka pergi berjumpa dengan seorang pakar bahasa isyarat.

Gangster : Mana wang tu?

Pakar menunjukkan isyarat kepada si bisu...
Sibisu menunjukkan isyarat untuk "Aku tak tahu apa yang mereka katakan."

Pakar bahasa isyarat memberitahu gangster tersebut. Dan gangster tersebut menghalakan
pistol ke arah kepala si bisu.

Gangster : Aku akan tembak kepala kau, bisu...

Sibisu menunjukkan isyarat "Duit RM50,000 tu aku telah sembunyikan di taman permainan
di bawah kerusi yang ketiga dari pintu masuk."

Pakar bahasa pun berkata kepada ketua gangster, "Dia tidak tahu dimana wang itu dan kalau kau nak tembak-tembaklah..."

Labels:

 
 

Pintu garage terbuka..

Alkisah ada seorang lelaki yang berusia lewat 50an dan bekerja sebagai CEO disebuah syarikat yang besar di KL... Pada suatu hari tu... Boss ni memanggil la dia punya seketeri masuk ke ofisnya... seperti biasa seketerinya pun masukla...

Tolong buatkan saya surat untuk kita punya client...

Si Boss ni pun mula la cakap dia punya mukadimahnya... biasa la Boss... malas nak tulis... cakap punya cakap... Boss ni pun bangun... dan berjalan-jalan pusing-pusing meja sambil tangan masuk dalam poket seluar... 10 minit kemudian acara mengarang ayat pun habis... si seketeri pun mula bersuara...

Seketeri : Boss... pagi tadi kan... masa saya nak datang ke Ofis...saya nampak pintu garage boss terbuka...

Boss : (Dalam keadaan kelam kabut) ye ke... tak apa, nanti saya call rumah... terima kasih...

Si seketeri pun blah balik ke meja dia... dan si Boss pun call rumah dia tanya wife dia...

Boss : Yang... tolong tengokkan garage rumah kita... pintu dia terbuka la...

Bini : Tak la bang... baru tadi saya tengok... mana ada terbuka...

Boss : Iye... terbuka... cuba pergi tengok semula.

Bini : Tidakkkkk, tertutup... saya tahu la bang...

Boss : Pergi la tengok... kalau tak terbuka macam mana orang boleh nampak??

Bini : Okay la... okay la...


Setelah setengah jam kemudian... masa Boss ni tengah relek-relek... baru dia perasan yang zip seluar dia terbuka... (dah memang perangai dia tak suka pakai underware... ) maka nampaklah... mengelabahlah si Boss ni memikirkan mana macam nak cover malu kat seketeri dia tu... dan petang yang sama juga...

Boss : Errr... tadi pagi masa you nampak garage I terbuka... ada tak you nampak BMW kat dalam tu?

Seketeri : Tak... yang I nampak cuma ada 'Mini Cooper' dengan dua tayar depannya pancit!!!!!...

Labels:

 
 

SALOH PAHE.......

SALOH PAHE.......

Tersebutlah cerita yang dikatakan berlaku di sebuah pejabat Majlis Perbandaran di negeri utara pantai timur:

Kontraktor rumah : Ambo nok mitak kelulusan buat rumoh, lagu mano gak caro dia?

Pegawai Bangunan : Lagu ni..., mulo-mulo wat pele (pelan) dulu.

Kontraktor rumah : Pele? Ambo ado doh!

Pegawai bangunan : Mano? Kalu ado wat tubik lah, kawe nok tengok.

Kontraktor rumah : Errrr! Tak leh! Tak Leh!

Pegawai Bangunan : Bak po tak lehnyo!, cepatlah wat tubik!

Kontraktor rumah : Kalu tak tengok tak leh ko?

Pegawai Bangunan : Tok leh la!!! kawe nak luluh rano, kalu kawe tak tengok!

Kontraktor rumah : Eh! Ambo ghoyat doh, ambo malu nak tunjok.

Pegawai Bangunan : Malu bakpo pulak? Pah tu bawok pele wat gapo kalu tak sir tunjok?

Kontraktor rumah : Ehhh! malulah nak tunjok , pele ambo kecik!

Pegawai Bangunan : Laa! Kecik pun tak apo, kalu cukup syarat! Kalu tak tunjok, kawe nak sain luluh lagu mano?

Kontraktor rumah : Nak wat tubik nak tunjok kat mano?, orghe ramai ni! Malu ambo! Malu weh!

Pegawai bangunan : La!, tak apo! Nak malu ko gapo! Wat tubik letak atas meja kaunter ni pun buleh! Cepatlah! kawe
ado khijo lain lagi nih! Sibuk benar ni! Kena paham la!

Kontraktor rumah : hoh! Ambo wak tubik dah ni ! Cepatla... tengok!

Pegawai Bangunan : Laaa!(terkejut) , buke pele ni!

Kontraktor rumah : Tu la!, ambo ghoyak doh tadi ke? Pele ambo kecik! demo nok tengok jugak!

Pegawai Bangunan : Laaaaaa! Buke pasal kecik besarnyo!, maksud kawe Pele Bangune (Pelan Bangunan).

Kontraktor rumah : La! Ambo ingat pele nie! Kalu pele bangune, ado la dale beg nie! Tok ghoyak pun pele bangune!.Mano ambo tahu!

Pegawai Bangunan : Kawe ingat demo pahe! Hok dok mari doh pun tak penah jadi lagu nie! Demo dok mano?

Kontraktor rumah : Gua Muse!

Labels:

 
 

Bersenam Cara Baru

KISSING: Kissing can burn around 120-325 calories an hour, or around 2-5 calories a minute. Engaging in long make-out sessions with your partner is not only good for your relationship; it is also good for your waistline. A 10 minute make-out session with your partner each morning and each evening could burn up to 100 calories a day. That�s 36,500 calories a year, or just over 10 pounds worth of weight loss. When was the last time you made out with your partner.

UNDRESSING: According to an Italian professor, even undressing can burn off calories. Unclasping a bra with two hands burns 8 calories, while unclasping it with only one hand burns up 18 calories. Unclasping it with your mouth can burn 87 calories.

ORAL SEX: 15 minutes of oral sex can burn off the calories consumed in a long sip of wine. There are calories present in semen, though, so if you swallow, there are around 7 calories in a teaspoon of semen. Since the average volume of ejaculation is 1-2 teaspoons, you can expect an average of 7-14 calories per ejaculation. That will easily be burned off during the course of your lovemaking, though.

MASTURBATION: You don�t have to have a partner to enjoy the calorie-burning effects of sex. Masturbation can burn up the calories, as well. You can lose between 100-150 calories for each act of masturbation, according to the Young People�s Reproductive and Sexual Health & Rights Organization. You can raise that amount to around 300 calories, though, through a 5 minute vigorous masturbation session, according to Japanese scientist Dr. Shukan Tokuho.

calories burnt during sexINTERCOURSE: The average lovemaking session burns between 50 and 100 calories. Having sex 3 times a week burns 7500 calories per year. That�s the equivalent of jogging 75 miles. The more intense the sex, the more calories are burned: up to 15,000 calories annually (at a frequency of 3 times weekly). 15,000 calories wquals over 4 pounds of weight loss per year!

ORGASM: Experts estimate that an orgasm can burn between 60-100 calories.


selamat bersenam dgn cara yg betol Grin

Labels:

 
 

BOss Baru......

BOss Baru......

Ni kisah satu org makhluk yg dilantik menggantikan bos asal sebuah kompani besar. Disebabkan msalah pekerja2 yg agak kurang motivasi dan selalu cuai + pemalas, bos baru ni decide nak ajar mereka sikit firstday dia kat kompani tu. So, sape2 yg dia nampak paling pemalas, dia akan pecat on the spot. Mmg malang tidak berbau, dia ternampak seorg pekerja yg sedang dok nyandar kat tepi dinding.

"Yg berbaju biru tu" dia menjerit. Jeritan kuat nyebabkan semua perkerja tersentak dan memandang kepada lelaki berkenaan.
"Bape gaji awak?" dia bertanya dgn nada yg agak keras
"Dalam RM800" pekerja tu menjawap

Bos tu menjawap, "Nah amik ni Rm800,BERAMBUS DARI SINI. KALU NAK MALAS2 PEGI TEMPAT LAIN"
Pekerja tu amik duit tu, lalu terus blah camtu jek.
Bos tadi memandang kesemua pekerja2 nye, seperti mahu mereka paham, sape malas,sure kene pecat!
Merasakan pekerja2 memahami maksud kejadian tadi, bos itu merasa puas.Sebelum bos itu masuk semula ke dalam opis nye, dia bertanya kepada salah seorg pekerja disitu,"Mamat tadi tu kerja department mana?"

Jawap si pekerja,"Owh, dia tu anto pizza".

Labels:

 
 

Mr Satan

Labels:

 
 

Berus gigi si ayah

Pada satu hari, seorang ayah baru saja lepas mandi dan semasa tengah mengelap badannya, muncul anak perempuan dia yg berumur 7 tahun. anaknya itu bertanya.."apa benda kat celah kangkang ayah tu?"

Ayahnya pun terasa lah malu, dan terus mengatakan.."tak boleh tahu..ini rahsia ayah tau"..
Maka anaknya pun keluar dari bilik dan terus mendapatkan pengesahan dari ibunya..

Ibu, apa benda yg kat celah kangkang ayah tu?" tanya si anak pada ibu..

Yang si ibu pun tersipu sipu dgn soalah anaknya itu lalu menjawab.."ishhkk.. tu benda rahsia ayah..jgn tanya.."

Selang beberapa hari, si anak pun dgn gembira menerangkan kepada ibunya..
"ibu..saya dah tahu rahsia ayah tu...sebenarnya berus gigi, tau ibu.." terang si anak..

si ibu pun tersenyum lah dgn penjelasan anaknya itu..
"..ha..ye la pandai anak ibu ni..kenapa pulak benda tu berus gigi.."

si anak pun menjawab.."tadi pagi, saya nampak kak umy (tukang gaji indon) masukkan benda ayah tu dalam mulut dia..keluar masuk keluar masuk sampai
berbuih buih keluar dari mulut dia.."

Labels:

 
 

Saman fitnah: Penulis blog Raja Petra dan tiga defendan diperintah bayar RM7 juta kepada Naib Canselor UUM

Saman fitnah: Penulis blog Raja Petra dan tiga defendan diperintah bayar RM7 juta kepada Naib Canselor UUM

26/03/2008 7:17pm


Raja Petra Kamaruddin


ALOR STAR 26 Mac – Seorang penulis blog, Raja Petra Raja Kamarudin (gambar) dan tiga defendan hari ini diarah oleh Mahkamah Tinggi di sini membayar ganti rugi saman fitnah se banyak RM7 juta kepada Naib Canselor Univer siti Utara Malaysia (UUM), Tan Sri Dr. Nordin Kardi dan universiti berkenaan.

Keputusan tersebut dibuat oleh mahkamah itu dalam saman berhubung penyiaran artikel berunsur fitnah pada Disember 2006 melibat kan Raja Petra sebagai defendan pertama dan tiga defendan lain iaitu Parti Keadilan Rakyat (PKR), ketua pengarang akhbar Suara Keadilan dan editor akhbar Suara Keadilan.

Dalam tuntutan ganti rugi tersebut, Raja Petra, 57, diarahkan membayar RM2 juta kepada plaintif pertama, Dr. Nordin, dan RM2 juta lagi kepada plaintif kedua, UUM, berhubung penyiaran artikel bertajuk Dato Dr. Nordin Kardi Ciplak Karya Saya? Mohon Penjelasan dalam laman webnya, www.malaysia-today.net.

Timbalan Pendaftar Mahkamah Tinggi, Priscilla Gengadaran yang membuat keputusan itu turut menetapkan ketua pengarang akhbar Suara Keadilan dan editor akhbar itu membayar ganti rugi kepada Dr. Nordin dan UUM.

Perintah itu dibuat berikutan penyiaran satu artikel fitnah bertajuk NC UUM Penciplak di muka surat 26 akhbar Suara Keadilan bilangan 098 bertarikh 27 Disember 2006-10 Januari 2007.

Ketua pengarang akhbar Suara Keadilan diperintahkan membayar ganti rugi RM1 juta kepada Dr. Nordin dan RM500,000 kepada UUM manakala editor akhbar berkenaan juga diperintahkan membayar ganti rugi dalam jumlah yang sama kepada Dr. Nordin dan universiti tersebut. PKR ialah penerbit akhbar Suara Keadilan.

- Utusan

Labels: ,

 
 

Pakatan sulit reformasi -- Polis dedah rancangan cetus demonstrasi militan besar-besaran

Pakatan sulit reformasi -- Polis dedah rancangan cetus demonstrasi militan besar-besaran


NORIAN Mai menjawab soalan para wartawan sambil diperhatikan oleh Yusuf Rahaman pada sidang akhbar di Bukit Aman semalam. - GAMBAR ASWAD YAHYA

KUALA LUMPUR 11 April - Polis hari ini mendedahkan satu kumpulan sulit yang dianggotai oleh lebih 20 orang aktivis reformasi telah diwujudkan bagi mencetuskan demonstrasi jalanan besar-besaran bercorak militan menjelang pilihan raya umum 2004.

Kumpulan tersebut didapati telah mengadakan 12 perjumpaan sulit sejak 6 Januari tahun ini hingga 4 April lalu bagi merealisasikan perancangan mereka itu.

Ketua Polis Negara, Tan Sri Norian Mai berkata, tindakan yang bercanggah dengan perlembagaan itu adalah sebahagian daripada keputusan yang dibuat oleh aktivis reformasi tersebut pada akhir tahun lalu.

Selain tindakan tersebut, tegasnya, aktivis reformasi juga akan melibatkan diri dalam proses demokrasi yang normal dan sistem pilihan raya.

Beliau berkata demikian pada sidang akhbar di Bukit Aman petang ini. Turut hadir Pengarah Cawangan Khas, Datuk Yusuf Rahaman.

Norian menjelaskan, sehubungan itu polis setakat ini telah menahan tujuh aktivis reformasi terbabit di bawah Seksyen 73 (1) Akta Keselamatan Dalam Negeri (ISA) 1960, hari ini dan semalam.

Mereka ialah Ketua Pemuda Parti Keadilan Nasional (Keadilan), Mohamad Ezam Mohd. Noor, 34; Naib Presiden Keadilan, Chua Tian Chang (atau Tian Chua), 37; Hishamuddin Rais, 50, Saari Sungib, 43; N. Gobala Krisnan, 41; Raja Petra Raja Kamarudin, 49, dan Abdul Ghani Haroon, 36.

Norian menegaskan aktivis reformasi itu juga mempunyai perancangan terpenting dalam masa terdekat ini iaitu menganjurkan demonstrasi jalanan yang dipanggil `Black 14' secara besar-besaran di ibu negara pada hari Sabtu ini.

Bagaimanapun tegasnya bagi mengelirukan pihak keselamatan, perhimpunan tersebut dipanggil `Perhimpunan Penyerahan Memorandum Rakyat Mengenai Hak Asasi Manusia' dengan rancangan mengumpulkan lebih kurang 50,000 yang akan berhimpun di sekitar ibu negara.

``Perhimpunan serta perarakan ini berpotensi menjadi rusuhan,'' tegas Norian.

Ketua Polis Negara memberitahu kegiatan reformasi yang bermula pada bulan September 1998 adalah merancang untuk menggulingkan kerajaan melalui demonstrasi jalanan secara besar-besaran dan bersiap sedia untuk bertindak secara militan melalui beberapa pendekatan;

ûpi9016 Melaksanakan langkah-langkah tertentu untuk mendapatkan bahan letupan termasuk bom dan pelancar roket, menggunakan `molotov cocktail', `ball bearing' serta berbagai senjata berbahaya untuk menyerang pihak keselamatan bagi menimbulkan huru-hara semasa demonstrasi jalanan di ibu negara pada bulan Oktober 1998.

* Mendapatkan bantuan dan sokongan guru-guru silat serta mempengaruhi sebilangan bekas pegawai dan anggota keselamatan supaya menyertai gerakan mereka.

Norian berkata, bagi membendung trend militan gerakan reformasi tersebut, polis telah mengambil tindakan ke atas 28 orang aktivis reformasi di bawah Seksyen 73 (1) ISA 1960 antara 20 September 1998 hingga 24 Disember 1998.

``Tindakan-tindakan polis itu telah dapat meredakan keadaan buat sementara waktu,'' katanya.

Beliau menambah pada pertengahan tahun 1999, aktiviti gerakan reformasi muncul kembali dengan berselindung di sebalik platform sebuah parti politik.

Bagaimanapun, katanya, sebilangan daripada mereka telah menjalankan kegiatan-kegiatan yang boleh mewujudkan ketegangan kaum melalui isu-isu keagamaan dan perkauman.

Norian berkata, di antaranya ialah menyebarkan berita-berita palsu yang menggemparkan seperti dakwaan bahawa ramai orang Melayu telah dikristiankan semasa pilihan raya kecil Lunas yang lalu.

``Ciri-ciri militan semasa pilihan raya kecil itu juga dilakukan oleh aktivis reformasi melalui perbuatan ganas dengan mengancam, mengugut dan menakut-nakut para pengundi serta orang ramai,'' ujarnya.

Menyentuh mengenai penahanan ketujuh-tujuh aktivis reformasi itu Norian memberitahu ia dilakukan kerana terdapat maklumat-maklumat mengenai penglibatan mereka dalam kegiatan yang boleh memudaratkan keselamatan negara,''

``Pihak polis perlu menjalankan siasatan rapi di atas maklumat-maklumat tersebut,'' jelas beliau.

Norian berkata, pihak polis akan membuat beberapa lagi tangkapan untuk siasatan kes yang sama dan pihak polis juga sedang menyiasat mengenai kemungkinan penglibatan pihak luar negara dalam kumpulan ini dalam membantu merealisasikan rancangan mereka.

``Adalah jelas aktivis reformasi sanggup melaksanakan kegiatan-kegiatan di luar perlembagaan dan undang-undang demi mencapai matlamat mereka.

``Oleh itu tindakan di bawah Seksyen 73 (1) ISA diambil kerana pihak polis percaya ada alasan-alasan untuk menahan mereka di bawah Seksyen 8 ISA kerana telah bertindak dengan cara yang memudaratkan keselamatan negara,'' tegas beliau lagi.

Oleh: KAMARUZAMAN MOHAMAD dan AZIAN ABD. AZIZ

Labels: ,

 
 

Altantuya: Polis ambil keterangan Raja Petra

Altantuya: Polis ambil keterangan Raja Petra

KUALA LUMPUR 2 Mei - Polis hari ini mengambil keterangan pengendali dan editor laman blog, Malaysia Today, Raja Petra Raja Kamaruddin berhubung penyiaran sebuah artikel berbaur hasutan membabitkan mendiang, Altantuya Shaariibuu.

Polis menyoal siasat Raja Petra, 58, hampir dua jam berhubung komen sensitif yang disiarkan dalam blognya Let's send the Altantuya murderers to hell (Mari hantar pembunuh Altantuya ke neraka) pada 25 April lalu.

Tindakan polis itu difahamkan susulan daripada sepasukan polis pergi ke rumah Raja Petra, di Bukit Rahman Putra, Sungai Buloh dekat sini kira-kira pukul 9 pagi ini.

Pasukan yang diketuai Deputi Supritendan Victor Sanjos dari Jabatan Siasatan Jenayah Komersial (JSJK) Bukit Aman itu dikatakan telah mengambil sebuah komputer riba dan satu unit pemprosesan komputer (CPU), milik Raja Petra untuk membantu siasatan.

Raja Petra kemudiannya dipanggil polis untuk memberi keterangan kali kedua di JSJK petang ini.

Timbalan Ketua Polis Negara, Datuk Ismail Omar ketika dihubungi Utusan Malaysia mengesahkan siasatan ke atas penulis blog itu tetapi enggan mengulas lanjut.

Raja Petra memakai baju T berwarna kuning dengan ditemani isterinya, Marina Lee Abdullah tiba di pekarangan JSJK Bukit Aman, kira-kira pukul 4 petang menaiki kereta Honda City.

Beliau keluar dua jam kemudian dan ketika ditemui pemberita beliau menegaskan tidak memberi sebarang kerjasama kepada polis ketika diminta memberi keterangan.

"Kalau dia orang (polis) nak caj saya di bawah Seksyen 112 kerana tidak memberi kerjasama pun, saya tak kisah.

"Saya bagi tahu polis yang ambil keterangan saya itu, sama ada kamu (polis) menahan saya atau biarkan saya keluar dari tempat ini.

"Saya tahu ini semua permainan politik," katanya.

Ini merupakan kes keempat Raja Petra disiasat mengikut Akta Hasutan.

Keterangan Raja Petra itu direkod oleh Asisten Supritendan (ASP) Tan Kok Yang dan ASP Rajagopal.

sumber: utusan

Labels: ,

 
 

Raja Petra didakwa terbit artikel menghasut

Raja Petra didakwa terbit artikel menghasut

06/05/2008 4:28pm

PETALING JAYA 6 Mei - Pengendali dan editor laman blog Malaysia Today, Raja Petra Raja Kamarudin dituduh di bawah Akta Hasutan 1948 di Mahkamah Sesyen di sini hari ini kerana menerbitkan artikel berkaitan pembunuhan wanita Mongolia, Atantuya Shaariibuu di laman blognya, dua minggu lalu.

Raja Petra yang merupakan pengendali blog pertama didakwa atas kesalahan seumpama itu dilihat tenang sepanjang prosiding serta mengaku tidak bersalah selepas pertuduhan dibacakan di hadapan Hakim Nurmala Salim.

Mengikut pertuduhan, Raja Petra didakwa menerbitkan satu artikel bertajuk ``Let’s Send The Altantuya Murderers to Hell’’ yang mengandungi ayat-ayat menghasut di laman web Malaysia-Today yang mempunyai alamat web http://www.malaysia-today.net.

Raja Petra didakwa di bawah Seksyen 4(1)(c) Akta hasutan 1948 dan boleh dihukum di bawah Seksyen 4(1) akta yang sama iaitu denda tidak melebihi RM5,000 atau penjara maksimum lima tahun atau kedua-duanya jika disabitkan kesalahan.

Nurmala membenarkan Raja Petra dibebaskan dengan ikat jamin RM5,000 dengan seorang penjamin serta menetapkan perbicaraan selama lima hari bermula 6 Oktober depan. Bagaimanapun, Raja Petra memilih untuk tidak membayar wang ikat jamin dan dia telah dibawa ke Penjara Sungai Buloh pada kira-kira pukul 3.15 petang ini. - Utusan.

Labels: ,

 
 

Web 2.0 Page 1/5

What Is Web 2.0
Design Patterns and Business Models for the Next Generation of Software

by Tim O'Reilly
09/30/2005

The bursting of the dot-com bubble in the fall of 2001 marked a turning point for the web. Many people concluded that the web was overhyped, when in fact bubbles and consequent shakeouts appear to be a common feature of all technological revolutions. Shakeouts typically mark the point at which an ascendant technology is ready to take its place at center stage. The pretenders are given the bum's rush, the real success stories show their strength, and there begins to be an understanding of what separates one from the other.

The concept of "Web 2.0" began with a conference brainstorming session between O'Reilly and MediaLive International. Dale Dougherty, web pioneer and O'Reilly VP, noted that far from having "crashed", the web was more important than ever, with exciting new applications and sites popping up with surprising regularity. What's more, the companies that had survived the collapse seemed to have some things in common. Could it be that the dot-com collapse marked some kind of turning point for the web, such that a call to action such as "Web 2.0" might make sense? We agreed that it did, and so the Web 2.0 Conference was born.

In the year and a half since, the term "Web 2.0" has clearly taken hold, with more than 9.5 million citations in Google. But there's still a huge amount of disagreement about just what Web 2.0 means, with some people decrying it as a meaningless marketing buzzword, and others accepting it as the new conventional wisdom.

This article is an attempt to clarify just what we mean by Web 2.0.

In our initial brainstorming, we formulated our sense of Web 2.0 by example:

Web 1.0 Web 2.0
DoubleClick --> Google AdSense
Ofoto --> Flickr
Akamai --> BitTorrent
mp3.com --> Napster
Britannica Online --> Wikipedia
personal websites --> blogging
evite --> upcoming.org and EVDB
domain name speculation --> search engine optimization
page views --> cost per click
screen scraping --> web services
publishing --> participation
content management systems --> wikis
directories (taxonomy) --> tagging ("folksonomy")
stickiness --> syndication

The list went on and on. But what was it that made us identify one application or approach as "Web 1.0" and another as "Web 2.0"? (The question is particularly urgent because the Web 2.0 meme has become so widespread that companies are now pasting it on as a marketing buzzword, with no real understanding of just what it means. The question is particularly difficult because many of those buzzword-addicted startups are definitely not Web 2.0, while some of the applications we identified as Web 2.0, like Napster and BitTorrent, are not even properly web applications!) We began trying to tease out the principles that are demonstrated in one way or another by the success stories of web 1.0 and by the most interesting of the new applications.

1. The Web As Platform

Like many important concepts, Web 2.0 doesn't have a hard boundary, but rather, a gravitational core. You can visualize Web 2.0 as a set of principles and practices that tie together a veritable solar system of sites that demonstrate some or all of those principles, at a varying distance from that core.

Web2MemeMap

Figure 1 shows a "meme map" of Web 2.0 that was developed at a brainstorming session during FOO Camp, a conference at O'Reilly Media. It's very much a work in progress, but shows the many ideas that radiate out from the Web 2.0 core.

For example, at the first Web 2.0 conference, in October 2004, John Battelle and I listed a preliminary set of principles in our opening talk. The first of those principles was "The web as platform." Yet that was also a rallying cry of Web 1.0 darling Netscape, which went down in flames after a heated battle with Microsoft. What's more, two of our initial Web 1.0 exemplars, DoubleClick and Akamai, were both pioneers in treating the web as a platform. People don't often think of it as "web services", but in fact, ad serving was the first widely deployed web service, and the first widely deployed "mashup" (to use another term that has gained currency of late). Every banner ad is served as a seamless cooperation between two websites, delivering an integrated page to a reader on yet another computer. Akamai also treats the network as the platform, and at a deeper level of the stack, building a transparent caching and content delivery network that eases bandwidth congestion.

Nonetheless, these pioneers provided useful contrasts because later entrants have taken their solution to the same problem even further, understanding something deeper about the nature of the new platform. Both DoubleClick and Akamai were Web 2.0 pioneers, yet we can also see how it's possible to realize more of the possibilities by embracing additional Web 2.0 design patterns.

Let's drill down for a moment into each of these three cases, teasing out some of the essential elements of difference.

Netscape vs. Google

If Netscape was the standard bearer for Web 1.0, Google is most certainly the standard bearer for Web 2.0, if only because their respective IPOs were defining events for each era. So let's start with a comparison of these two companies and their positioning.

Netscape framed "the web as platform" in terms of the old software paradigm: their flagship product was the web browser, a desktop application, and their strategy was to use their dominance in the browser market to establish a market for high-priced server products. Control over standards for displaying content and applications in the browser would, in theory, give Netscape the kind of market power enjoyed by Microsoft in the PC market. Much like the "horseless carriage" framed the automobile as an extension of the familiar, Netscape promoted a "webtop" to replace the desktop, and planned to populate that webtop with information updates and applets pushed to the webtop by information providers who would purchase Netscape servers.

In the end, both web browsers and web servers turned out to be commodities, and value moved "up the stack" to services delivered over the web platform.

Google, by contrast, began its life as a native web application, never sold or packaged, but delivered as a service, with customers paying, directly or indirectly, for the use of that service. None of the trappings of the old software industry are present. No scheduled software releases, just continuous improvement. No licensing or sale, just usage. No porting to different platforms so that customers can run the software on their own equipment, just a massively scalable collection of commodity PCs running open source operating systems plus homegrown applications and utilities that no one outside the company ever gets to see.

At bottom, Google requires a competency that Netscape never needed: database management. Google isn't just a collection of software tools, it's a specialized database. Without the data, the tools are useless; without the software, the data is unmanageable. Software licensing and control over APIs--the lever of power in the previous era--is irrelevant because the software never need be distributed but only performed, and also because without the ability to collect and manage the data, the software is of little use. In fact, the value of the software is proportional to the scale and dynamism of the data it helps to manage.

Google's service is not a server--though it is delivered by a massive collection of internet servers--nor a browser--though it is experienced by the user within the browser. Nor does its flagship search service even host the content that it enables users to find. Much like a phone call, which happens not just on the phones at either end of the call, but on the network in between, Google happens in the space between browser and search engine and destination content server, as an enabler or middleman between the user and his or her online experience.

While both Netscape and Google could be described as software companies, it's clear that Netscape belonged to the same software world as Lotus, Microsoft, Oracle, SAP, and other companies that got their start in the 1980's software revolution, while Google's fellows are other internet applications like eBay, Amazon, Napster, and yes, DoubleClick and Akamai.

taken from http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html?page=1

Labels: ,

 
 

Web 2.0 Page 2/5

DoubleClick vs. Overture and AdSense

Like Google, DoubleClick is a true child of the internet era. It harnesses software as a service, has a core competency in data management, and, as noted above, was a pioneer in web services long before web services even had a name. However, DoubleClick was ultimately limited by its business model. It bought into the '90s notion that the web was about publishing, not participation; that advertisers, not consumers, ought to call the shots; that size mattered, and that the internet was increasingly being dominated by the top websites as measured by MediaMetrix and other web ad scoring companies.

As a result, DoubleClick proudly cites on its website "over 2000 successful implementations" of its software. Yahoo! Search Marketing (formerly Overture) and Google AdSense, by contrast, already serve hundreds of thousands of advertisers apiece.

Overture and Google's success came from an understanding of what Chris Anderson refers to as "the long tail," the collective power of the small sites that make up the bulk of the web's content. DoubleClick's offerings require a formal sales contract, limiting their market to the few thousand largest websites. Overture and Google figured out how to enable ad placement on virtually any web page. What's more, they eschewed publisher/ad-agency friendly advertising formats such as banner ads and popups in favor of minimally intrusive, context-sensitive, consumer-friendly text advertising.

The Web 2.0 lesson: leverage customer-self service and algorithmic data management to reach out to the entire web, to the edges and not just the center, to the long tail and not just the head.

A Platform Beats an Application Every Time

In each of its past confrontations with rivals, Microsoft has successfully played the platform card, trumping even the most dominant applications. Windows allowed Microsoft to displace Lotus 1-2-3 with Excel, WordPerfect with Word, and Netscape Navigator with Internet Explorer.

This time, though, the clash isn't between a platform and an application, but between two platforms, each with a radically different business model: On the one side, a single software provider, whose massive installed base and tightly integrated operating system and APIs give control over the programming paradigm; on the other, a system without an owner, tied together by a set of protocols, open standards and agreements for cooperation.

Windows represents the pinnacle of proprietary control via software APIs. Netscape tried to wrest control from Microsoft using the same techniques that Microsoft itself had used against other rivals, and failed. But Apache, which held to the open standards of the web, has prospered. The battle is no longer unequal, a platform versus a single application, but platform versus platform, with the question being which platform, and more profoundly, which architecture, and which business model, is better suited to the opportunity ahead.

Windows was a brilliant solution to the problems of the early PC era. It leveled the playing field for application developers, solving a host of problems that had previously bedeviled the industry. But a single monolithic approach, controlled by a single vendor, is no longer a solution, it's a problem. Communications-oriented systems, as the internet-as-platform most certainly is, require interoperability. Unless a vendor can control both ends of every interaction, the possibilities of user lock-in via software APIs are limited.

Any Web 2.0 vendor that seeks to lock in its application gains by controlling the platform will, by definition, no longer be playing to the strengths of the platform.

This is not to say that there are not opportunities for lock-in and competitive advantage, but we believe they are not to be found via control over software APIs and protocols. There is a new game afoot. The companies that succeed in the Web 2.0 era will be those that understand the rules of that game, rather than trying to go back to the rules of the PC software era.

Not surprisingly, other web 2.0 success stories demonstrate this same behavior. eBay enables occasional transactions of only a few dollars between single individuals, acting as an automated intermediary. Napster (though shut down for legal reasons) built its network not by building a centralized song database, but by architecting a system in such a way that every downloader also became a server, and thus grew the network.

Akamai vs. BitTorrent

Like DoubleClick, Akamai is optimized to do business with the head, not the tail, with the center, not the edges. While it serves the benefit of the individuals at the edge of the web by smoothing their access to the high-demand sites at the center, it collects its revenue from those central sites.

BitTorrent, like other pioneers in the P2P movement, takes a radical approach to internet decentralization. Every client is also a server; files are broken up into fragments that can be served from multiple locations, transparently harnessing the network of downloaders to provide both bandwidth and data to other users. The more popular the file, in fact, the faster it can be served, as there are more users providing bandwidth and fragments of the complete file.

BitTorrent thus demonstrates a key Web 2.0 principle: the service automatically gets better the more people use it. While Akamai must add servers to improve service, every BitTorrent consumer brings his own resources to the party. There's an implicit "architecture of participation", a built-in ethic of cooperation, in which the service acts primarily as an intelligent broker, connecting the edges to each other and harnessing the power of the users themselves.

2. Harnessing Collective Intelligence

The central principle behind the success of the giants born in the Web 1.0 era who have survived to lead the Web 2.0 era appears to be this, that they have embraced the power of the web to harness collective intelligence:

  • Hyperlinking is the foundation of the web. As users add new content, and new sites, it is bound in to the structure of the web by other users discovering the content and linking to it. Much as synapses form in the brain, with associations becoming stronger through repetition or intensity, the web of connections grows organically as an output of the collective activity of all web users.
  • Yahoo!, the first great internet success story, was born as a catalog, or directory of links, an aggregation of the best work of thousands, then millions of web users. While Yahoo! has since moved into the business of creating many types of content, its role as a portal to the collective work of the net's users remains the core of its value.
  • Google's breakthrough in search, which quickly made it the undisputed search market leader, was PageRank, a method of using the link structure of the web rather than just the characteristics of documents to provide better search results.
  • eBay's product is the collective activity of all its users; like the web itself, eBay grows organically in response to user activity, and the company's role is as an enabler of a context in which that user activity can happen. What's more, eBay's competitive advantage comes almost entirely from the critical mass of buyers and sellers, which makes any new entrant offering similar services significantly less attractive.
  • Amazon sells the same products as competitors such as Barnesandnoble.com, and they receive the same product descriptions, cover images, and editorial content from their vendors. But Amazon has made a science of user engagement. They have an order of magnitude more user reviews, invitations to participate in varied ways on virtually every page--and even more importantly, they use user activity to produce better search results. While a Barnesandnoble.com search is likely to lead with the company's own products, or sponsored results, Amazon always leads with "most popular", a real-time computation based not only on sales but other factors that Amazon insiders call the "flow" around products. With an order of magnitude more user participation, it's no surprise that Amazon's sales also outpace competitors.

Now, innovative companies that pick up on this insight and perhaps extend it even further, are making their mark on the web:

  • Wikipedia, an online encyclopedia based on the unlikely notion that an entry can be added by any web user, and edited by any other, is a radical experiment in trust, applying Eric Raymond's dictum (originally coined in the context of open source software) that "with enough eyeballs, all bugs are shallow," to content creation. Wikipedia is already in the top 100 websites, and many think it will be in the top ten before long. This is a profound change in the dynamics of content creation!
  • Sites like del.icio.us and Flickr, two companies that have received a great deal of attention of late, have pioneered a concept that some people call "folksonomy" (in contrast to taxonomy), a style of collaborative categorization of sites using freely chosen keywords, often referred to as tags. Tagging allows for the kind of multiple, overlapping associations that the brain itself uses, rather than rigid categories. In the canonical example, a Flickr photo of a puppy might be tagged both "puppy" and "cute"--allowing for retrieval along natural axes generated user activity.
  • Collaborative spam filtering products like Cloudmark aggregate the individual decisions of email users about what is and is not spam, outperforming systems that rely on analysis of the messages themselves.
  • It is a truism that the greatest internet success stories don't advertise their products. Their adoption is driven by "viral marketing"--that is, recommendations propagating directly from one user to another. You can almost make the case that if a site or product relies on advertising to get the word out, it isn't Web 2.0.
  • Even much of the infrastructure of the web--including the Linux, Apache, MySQL, and Perl, PHP, or Python code involved in most web servers--relies on the peer-production methods of open source, in themselves an instance of collective, net-enabled intelligence. There are more than 100,000 open source software projects listed on SourceForge.net. Anyone can add a project, anyone can download and use the code, and new projects migrate from the edges to the center as a result of users putting them to work, an organic software adoption process relying almost entirely on viral marketing.

The lesson: Network effects from user contributions are the key to market dominance in the Web 2.0 era.


taken from http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html?page=2

Labels: ,

 
 

Web 2.0 Page 3/5

Blogging and the Wisdom of Crowds

One of the most highly touted features of the Web 2.0 era is the rise of blogging. Personal home pages have been around since the early days of the web, and the personal diary and daily opinion column around much longer than that, so just what is the fuss all about?

At its most basic, a blog is just a personal home page in diary format. But as Rich Skrenta notes, the chronological organization of a blog "seems like a trivial difference, but it drives an entirely different delivery, advertising and value chain."

One of the things that has made a difference is a technology called RSS. RSS is the most significant advance in the fundamental architecture of the web since early hackers realized that CGI could be used to create database-backed websites. RSS allows someone to link not just to a page, but to subscribe to it, with notification every time that page changes. Skrenta calls this "the incremental web." Others call it the "live web".

Now, of course, "dynamic websites" (i.e., database-backed sites with dynamically generated content) replaced static web pages well over ten years ago. What's dynamic about the live web are not just the pages, but the links. A link to a weblog is expected to point to a perennially changing page, with "permalinks" for any individual entry, and notification for each change. An RSS feed is thus a much stronger link than, say a bookmark or a link to a single page.

The Architecture of Participation

Some systems are designed to encourage participation. In his paper, The Cornucopia of the Commons, Dan Bricklin noted that there are three ways to build a large database. The first, demonstrated by Yahoo!, is to pay people to do it. The second, inspired by lessons from the open source community, is to get volunteers to perform the same task. The Open Directory Project, an open source Yahoo competitor, is the result. But Napster demonstrated a third way. Because Napster set its defaults to automatically serve any music that was downloaded, every user automatically helped to build the value of the shared database. This same approach has been followed by all other P2P file sharing services.

One of the key lessons of the Web 2.0 era is this: Users add value. But only a small percentage of users will go to the trouble of adding value to your application via explicit means. Therefore, Web 2.0 companies set inclusive defaults for aggregating user data and building value as a side-effect of ordinary use of the application. As noted above, they build systems that get better the more people use them.

Mitch Kapor once noted that "architecture is politics." Participation is intrinsic to Napster, part of its fundamental architecture.

This architectural insight may also be more central to the success of open source software than the more frequently cited appeal to volunteerism. The architecture of the internet, and the World Wide Web, as well as of open source software projects like Linux, Apache, and Perl, is such that users pursuing their own "selfish" interests build collective value as an automatic byproduct. Each of these projects has a small core, well-defined extension mechanisms, and an approach that lets any well-behaved component be added by anyone, growing the outer layers of what Larry Wall, the creator of Perl, refers to as "the onion." In other words, these technologies demonstrate network effects, simply through the way that they have been designed.

These projects can be seen to have a natural architecture of participation. But as Amazon demonstrates, by consistent effort (as well as economic incentives such as the Associates program), it is possible to overlay such an architecture on a system that would not normally seem to possess it.

RSS also means that the web browser is not the only means of viewing a web page. While some RSS aggregators, such as Bloglines, are web-based, others are desktop clients, and still others allow users of portable devices to subscribe to constantly updated content.

RSS is now being used to push not just notices of new blog entries, but also all kinds of data updates, including stock quotes, weather data, and photo availability. This use is actually a return to one of its roots: RSS was born in 1997 out of the confluence of Dave Winer's "Really Simple Syndication" technology, used to push out blog updates, and Netscape's "Rich Site Summary", which allowed users to create custom Netscape home pages with regularly updated data flows. Netscape lost interest, and the technology was carried forward by blogging pioneer Userland, Winer's company. In the current crop of applications, we see, though, the heritage of both parents.

But RSS is only part of what makes a weblog different from an ordinary web page. Tom Coates remarks on the significance of the permalink:

It may seem like a trivial piece of functionality now, but it was effectively the device that turned weblogs from an ease-of-publishing phenomenon into a conversational mess of overlapping communities. For the first time it became relatively easy to gesture directly at a highly specific post on someone else's site and talk about it. Discussion emerged. Chat emerged. And - as a result - friendships emerged or became more entrenched. The permalink was the first - and most successful - attempt to build bridges between weblogs.

In many ways, the combination of RSS and permalinks adds many of the features of NNTP, the Network News Protocol of the Usenet, onto HTTP, the web protocol. The "blogosphere" can be thought of as a new, peer-to-peer equivalent to Usenet and bulletin-boards, the conversational watering holes of the early internet. Not only can people subscribe to each others' sites, and easily link to individual comments on a page, but also, via a mechanism known as trackbacks, they can see when anyone else links to their pages, and can respond, either with reciprocal links, or by adding comments.

Interestingly, two-way links were the goal of early hypertext systems like Xanadu. Hypertext purists have celebrated trackbacks as a step towards two way links. But note that trackbacks are not properly two-way--rather, they are really (potentially) symmetrical one-way links that create the effect of two way links. The difference may seem subtle, but in practice it is enormous. Social networking systems like Friendster, Orkut, and LinkedIn, which require acknowledgment by the recipient in order to establish a connection, lack the same scalability as the web. As noted by Caterina Fake, co-founder of the Flickr photo sharing service, attention is only coincidentally reciprocal. (Flickr thus allows users to set watch lists--any user can subscribe to any other user's photostream via RSS. The object of attention is notified, but does not have to approve the connection.)

If an essential part of Web 2.0 is harnessing collective intelligence, turning the web into a kind of global brain, the blogosphere is the equivalent of constant mental chatter in the forebrain, the voice we hear in all of our heads. It may not reflect the deep structure of the brain, which is often unconscious, but is instead the equivalent of conscious thought. And as a reflection of conscious thought and attention, the blogosphere has begun to have a powerful effect.

First, because search engines use link structure to help predict useful pages, bloggers, as the most prolific and timely linkers, have a disproportionate role in shaping search engine results. Second, because the blogging community is so highly self-referential, bloggers paying attention to other bloggers magnifies their visibility and power. The "echo chamber" that critics decry is also an amplifier.

If it were merely an amplifier, blogging would be uninteresting. But like Wikipedia, blogging harnesses collective intelligence as a kind of filter. What James Suriowecki calls "the wisdom of crowds" comes into play, and much as PageRank produces better results than analysis of any individual document, the collective attention of the blogosphere selects for value.

While mainstream media may see individual blogs as competitors, what is really unnerving is that the competition is with the blogosphere as a whole. This is not just a competition between sites, but a competition between business models. The world of Web 2.0 is also the world of what Dan Gillmor calls "we, the media," a world in which "the former audience", not a few people in a back room, decides what's important.

3. Data is the Next Intel Inside

Every significant internet application to date has been backed by a specialized database: Google's web crawl, Yahoo!'s directory (and web crawl), Amazon's database of products, eBay's database of products and sellers, MapQuest's map databases, Napster's distributed song database. As Hal Varian remarked in a personal conversation last year, "SQL is the new HTML." Database management is a core competency of Web 2.0 companies, so much so that we have sometimes referred to these applications as "infoware" rather than merely software.

This fact leads to a key question: Who owns the data?

In the internet era, one can already see a number of cases where control over the database has led to market control and outsized financial returns. The monopoly on domain name registry initially granted by government fiat to Network Solutions (later purchased by Verisign) was one of the first great moneymakers of the internet. While we've argued that business advantage via controlling software APIs is much more difficult in the age of the internet, control of key data sources is not, especially if those data sources are expensive to create or amenable to increasing returns via network effects.

Look at the copyright notices at the base of every map served by MapQuest, maps.yahoo.com, maps.msn.com, or maps.google.com, and you'll see the line "Maps copyright NavTeq, TeleAtlas," or with the new satellite imagery services, "Images copyright Digital Globe." These companies made substantial investments in their databases (NavTeq alone reportedly invested $750 million to build their database of street addresses and directions. Digital Globe spent $500 million to launch their own satellite to improve on government-supplied imagery.) NavTeq has gone so far as to imitate Intel's familiar Intel Inside logo: Cars with navigation systems bear the imprint, "NavTeq Onboard." Data is indeed the Intel Inside of these applications, a sole source component in systems whose software infrastructure is largely open source or otherwise commodified.

The now hotly contested web mapping arena demonstrates how a failure to understand the importance of owning an application's core data will eventually undercut its competitive position. MapQuest pioneered the web mapping category in 1995, yet when Yahoo!, and then Microsoft, and most recently Google, decided to enter the market, they were easily able to offer a competing application simply by licensing the same data.

Contrast, however, the position of Amazon.com. Like competitors such as Barnesandnoble.com, its original database came from ISBN registry provider R.R. Bowker. But unlike MapQuest, Amazon relentlessly enhanced the data, adding publisher-supplied data such as cover images, table of contents, index, and sample material. Even more importantly, they harnessed their users to annotate the data, such that after ten years, Amazon, not Bowker, is the primary source for bibliographic data on books, a reference source for scholars and librarians as well as consumers. Amazon also introduced their own proprietary identifier, the ASIN, which corresponds to the ISBN where one is present, and creates an equivalent namespace for products without one. Effectively, Amazon "embraced and extended" their data suppliers.

Imagine if MapQuest had done the same thing, harnessing their users to annotate maps and directions, adding layers of value. It would have been much more difficult for competitors to enter the market just by licensing the base data.

The recent introduction of Google Maps provides a living laboratory for the competition between application vendors and their data suppliers. Google's lightweight programming model has led to the creation of numerous value-added services in the form of mashups that link Google Maps with other internet-accessible data sources. Paul Rademacher's housingmaps.com, which combines Google Maps with Craigslist apartment rental and home purchase data to create an interactive housing search tool, is the pre-eminent example of such a mashup.

At present, these mashups are mostly innovative experiments, done by hackers. But entrepreneurial activity follows close behind. And already, one can see that for at least one class of developer, Google has taken the role of data source away from Navteq and inserted themselves as a favored intermediary. We expect to see battles between data suppliers and application vendors in the next few years, as both realize just how important certain classes of data will become as building blocks for Web 2.0 applications.

The race is on to own certain classes of core data: location, identity, calendaring of public events, product identifiers and namespaces. In many cases, where there is significant cost to create the data, there may be an opportunity for an Intel Inside style play, with a single source for the data. In others, the winner will be the company that first reaches critical mass via user aggregation, and turns that aggregated data into a system service.

For example, in the area of identity, PayPal, Amazon's 1-click, and the millions of users of communications systems, may all be legitimate contenders to build a network-wide identity database. (In this regard, Google's recent attempt to use cell phone numbers as an identifier for Gmail accounts may be a step towards embracing and extending the phone system.) Meanwhile, startups like Sxip are exploring the potential of federated identity, in quest of a kind of "distributed 1-click" that will provide a seamless Web 2.0 identity subsystem. In the area of calendaring, EVDB is an attempt to build the world's largest shared calendar via a wiki-style architecture of participation. While the jury's still out on the success of any particular startup or approach, it's clear that standards and solutions in these areas, effectively turning certain classes of data into reliable subsystems of the "internet operating system", will enable the next generation of applications.

A further point must be noted with regard to data, and that is user concerns about privacy and their rights to their own data. In many of the early web applications, copyright is only loosely enforced. For example, Amazon lays claim to any reviews submitted to the site, but in the absence of enforcement, people may repost the same review elsewhere. However, as companies begin to realize that control over data may be their chief source of competitive advantage, we may see heightened attempts at control.

Much as the rise of proprietary software led to the Free Software movement, we expect the rise of proprietary databases to result in a Free Data movement within the next decade. One can see early signs of this countervailing trend in open data projects such as Wikipedia, the Creative Commons, and in software projects like Greasemonkey, which allow users to take control of how data is displayed on their computer.

taken from http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html?page=3

Labels: ,

 
 

Web 2.0 Page 4/5

4. End of the Software Release Cycle

As noted above in the discussion of Google vs. Netscape, one of the defining characteristics of internet era software is that it is delivered as a service, not as a product. This fact leads to a number of fundamental changes in the business model of such a company:

  1. Operations must become a core competency. Google's or Yahoo!'s expertise in product development must be matched by an expertise in daily operations. So fundamental is the shift from software as artifact to software as service that the software will cease to perform unless it is maintained on a daily basis. Google must continuously crawl the web and update its indices, continuously filter out link spam and other attempts to influence its results, continuously and dynamically respond to hundreds of millions of asynchronous user queries, simultaneously matching them with context-appropriate advertisements.

    It's no accident that Google's system administration, networking, and load balancing techniques are perhaps even more closely guarded secrets than their search algorithms. Google's success at automating these processes is a key part of their cost advantage over competitors.

    It's also no accident that scripting languages such as Perl, Python, PHP, and now Ruby, play such a large role at web 2.0 companies. Perl was famously described by Hassan Schroeder, Sun's first webmaster, as "the duct tape of the internet." Dynamic languages (often called scripting languages and looked down on by the software engineers of the era of software artifacts) are the tool of choice for system and network administrators, as well as application developers building dynamic systems that require constant change.

  2. Users must be treated as co-developers, in a reflection of open source development practices (even if the software in question is unlikely to be released under an open source license.) The open source dictum, "release early and release often" in fact has morphed into an even more radical position, "the perpetual beta," in which the product is developed in the open, with new features slipstreamed in on a monthly, weekly, or even daily basis. It's no accident that services such as Gmail, Google Maps, Flickr, del.icio.us, and the like may be expected to bear a "Beta" logo for years at a time.

    Real time monitoring of user behavior to see just which new features are used, and how they are used, thus becomes another required core competency. A web developer at a major online service remarked: "We put up two or three new features on some part of the site every day, and if users don't adopt them, we take them down. If they like them, we roll them out to the entire site."

    Cal Henderson, the lead developer of Flickr, recently revealed that they deploy new builds up to every half hour. This is clearly a radically different development model! While not all web applications are developed in as extreme a style as Flickr, almost all web applications have a development cycle that is radically unlike anything from the PC or client-server era. It is for this reason that a recent ZDnet editorial concluded that Microsoft won't be able to beat Google: "Microsoft's business model depends on everyone upgrading their computing environment every two to three years. Google's depends on everyone exploring what's new in their computing environment every day."

While Microsoft has demonstrated enormous ability to learn from and ultimately best its competition, there's no question that this time, the competition will require Microsoft (and by extension, every other existing software company) to become a deeply different kind of company. Native Web 2.0 companies enjoy a natural advantage, as they don't have old patterns (and corresponding business models and revenue sources) to shed.

A Web 2.0 Investment Thesis

Venture capitalist Paul Kedrosky writes: "The key is to find the actionable investments where you disagree with the consensus". It's interesting to see how each Web 2.0 facet involves disagreeing with the consensus: everyone was emphasizing keeping data private, Flickr/Napster/et al. make it public. It's not just disagreeing to be disagreeable (pet food! online!), it's disagreeing where you can build something out of the differences. Flickr builds communities, Napster built breadth of collection.

Another way to look at it is that the successful companies all give up something expensive but considered critical to get something valuable for free that was once expensive. For example, Wikipedia gives up central editorial control in return for speed and breadth. Napster gave up on the idea of "the catalog" (all the songs the vendor was selling) and got breadth. Amazon gave up on the idea of having a physical storefront but got to serve the entire world. Google gave up on the big customers (initially) and got the 80% whose needs weren't being met. There's something very aikido (using your opponent's force against them) in saying "you know, you're right--absolutely anyone in the whole world CAN update this article. And guess what, that's bad news for you."

--Nat Torkington

5. Lightweight Programming Models

Once the idea of web services became au courant, large companies jumped into the fray with a complex web services stack designed to create highly reliable programming environments for distributed applications.

But much as the web succeeded precisely because it overthrew much of hypertext theory, substituting a simple pragmatism for ideal design, RSS has become perhaps the single most widely deployed web service because of its simplicity, while the complex corporate web services stacks have yet to achieve wide deployment.

Similarly, Amazon.com's web services are provided in two forms: one adhering to the formalisms of the SOAP (Simple Object Access Protocol) web services stack, the other simply providing XML data over HTTP, in a lightweight approach sometimes referred to as REST (Representational State Transfer). While high value B2B connections (like those between Amazon and retail partners like ToysRUs) use the SOAP stack, Amazon reports that 95% of the usage is of the lightweight REST service.

This same quest for simplicity can be seen in other "organic" web services. Google's recent release of Google Maps is a case in point. Google Maps' simple AJAX (Javascript and XML) interface was quickly decrypted by hackers, who then proceeded to remix the data into new services.

Mapping-related web services had been available for some time from GIS vendors such as ESRI as well as from MapQuest and Microsoft MapPoint. But Google Maps set the world on fire because of its simplicity. While experimenting with any of the formal vendor-supported web services required a formal contract between the parties, the way Google Maps was implemented left the data for the taking, and hackers soon found ways to creatively re-use that data.

There are several significant lessons here:

  1. Support lightweight programming models that allow for loosely coupled systems. The complexity of the corporate-sponsored web services stack is designed to enable tight coupling. While this is necessary in many cases, many of the most interesting applications can indeed remain loosely coupled, and even fragile. The Web 2.0 mindset is very different from the traditional IT mindset!
  2. Think syndication, not coordination. Simple web services, like RSS and REST-based web services, are about syndicating data outwards, not controlling what happens when it gets to the other end of the connection. This idea is fundamental to the internet itself, a reflection of what is known as the end-to-end principle.
  3. Design for "hackability" and remixability. Systems like the original web, RSS, and AJAX all have this in common: the barriers to re-use are extremely low. Much of the useful software is actually open source, but even when it isn't, there is little in the way of intellectual property protection. The web browser's "View Source" option made it possible for any user to copy any other user's web page; RSS was designed to empower the user to view the content he or she wants, when it's wanted, not at the behest of the information provider; the most successful web services are those that have been easiest to take in new directions unimagined by their creators. The phrase "some rights reserved," which was popularized by the Creative Commons to contrast with the more typical "all rights reserved," is a useful guidepost.

Innovation in Assembly

Lightweight business models are a natural concomitant of lightweight programming and lightweight connections. The Web 2.0 mindset is good at re-use. A new service like housingmaps.com was built simply by snapping together two existing services. Housingmaps.com doesn't have a business model (yet)--but for many small-scale services, Google AdSense (or perhaps Amazon associates fees, or both) provides the snap-in equivalent of a revenue model.

These examples provide an insight into another key web 2.0 principle, which we call "innovation in assembly." When commodity components are abundant, you can create value simply by assembling them in novel or effective ways. Much as the PC revolution provided many opportunities for innovation in assembly of commodity hardware, with companies like Dell making a science out of such assembly, thereby defeating companies whose business model required innovation in product development, we believe that Web 2.0 will provide opportunities for companies to beat the competition by getting better at harnessing and integrating services provided by others.

6. Software Above the Level of a Single Device

One other feature of Web 2.0 that deserves mention is the fact that it's no longer limited to the PC platform. In his parting advice to Microsoft, long time Microsoft developer Dave Stutz pointed out that "Useful software written above the level of the single device will command high margins for a long time to come."

Of course, any web application can be seen as software above the level of a single device. After all, even the simplest web application involves at least two computers: the one hosting the web server and the one hosting the browser. And as we've discussed, the development of the web as platform extends this idea to synthetic applications composed of services provided by multiple computers.

But as with many areas of Web 2.0, where the "2.0-ness" is not something new, but rather a fuller realization of the true potential of the web platform, this phrase gives us a key insight into how to design applications and services for the new platform.

To date, iTunes is the best exemplar of this principle. This application seamlessly reaches from the handheld device to a massive web back-end, with the PC acting as a local cache and control station. There have been many previous attempts to bring web content to portable devices, but the iPod/iTunes combination is one of the first such applications designed from the ground up to span multiple devices. TiVo is another good example.

iTunes and TiVo also demonstrate many of the other core principles of Web 2.0. They are not web applications per se, but they leverage the power of the web platform, making it a seamless, almost invisible part of their infrastructure. Data management is most clearly the heart of their offering. They are services, not packaged applications (although in the case of iTunes, it can be used as a packaged application, managing only the user's local data.) What's more, both TiVo and iTunes show some budding use of collective intelligence, although in each case, their experiments are at war with the IP lobby's. There's only a limited architecture of participation in iTunes, though the recent addition of podcasting changes that equation substantially.

This is one of the areas of Web 2.0 where we expect to see some of the greatest change, as more and more devices are connected to the new platform. What applications become possible when our phones and our cars are not consuming data but reporting it? Real time traffic monitoring, flash mobs, and citizen journalism are only a few of the early warning signs of the capabilities of the new platform.

taken from http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html?page=4

Labels: ,

 
 

Web 2.0 Page 5/5

7. Rich User Experiences

As early as Pei Wei's Viola browser in 1992, the web was being used to deliver "applets" and other kinds of active content within the web browser. Java's introduction in 1995 was framed around the delivery of such applets. JavaScript and then DHTML were introduced as lightweight ways to provide client side programmability and richer user experiences. Several years ago, Macromedia coined the term "Rich Internet Applications" (which has also been picked up by open source Flash competitor Laszlo Systems) to highlight the capabilities of Flash to deliver not just multimedia content but also GUI-style application experiences.

However, the potential of the web to deliver full scale applications didn't hit the mainstream till Google introduced Gmail, quickly followed by Google Maps, web based applications with rich user interfaces and PC-equivalent interactivity. The collection of technologies used by Google was christened AJAX, in a seminal essay by Jesse James Garrett of web design firm Adaptive Path. He wrote:

"Ajax isn't a technology. It's really several technologies, each flourishing in its own right, coming together in powerful new ways. Ajax incorporates:

Web 2.0 Design Patterns

In his book, A Pattern Language, Christopher Alexander prescribes a format for the concise description of the solution to architectural problems. He writes: "Each pattern describes a problem that occurs over and over again in our environment, and then describes the core of the solution to that problem, in such a way that you can use this solution a million times over, without ever doing it the same way twice."

  1. The Long Tail
    Small sites make up the bulk of the internet's content; narrow niches make up the bulk of internet's the possible applications. Therefore: Leverage customer-self service and algorithmic data management to reach out to the entire web, to the edges and not just the center, to the long tail and not just the head.
  2. Data is the Next Intel Inside
    Applications are increasingly data-driven. Therefore: For competitive advantage, seek to own a unique, hard-to-recreate source of data.
  3. Users Add Value
    The key to competitive advantage in internet applications is the extent to which users add their own data to that which you provide. Therefore: Don't restrict your "architecture of participation" to software development. Involve your users both implicitly and explicitly in adding value to your application.
  4. Network Effects by Default
    Only a small percentage of users will go to the trouble of adding value to your application. Therefore: Set inclusive defaults for aggregating user data as a side-effect of their use of the application.
  5. Some Rights Reserved. Intellectual property protection limits re-use and prevents experimentation. Therefore: When benefits come from collective adoption, not private restriction, make sure that barriers to adoption are low. Follow existing standards, and use licenses with as few restrictions as possible. Design for "hackability" and "remixability."
  6. The Perpetual Beta
    When devices and programs are connected to the internet, applications are no longer software artifacts, they are ongoing services. Therefore: Don't package up new features into monolithic releases, but instead add them on a regular basis as part of the normal user experience. Engage your users as real-time testers, and instrument the service so that you know how people use the new features.
  7. Cooperate, Don't Control
    Web 2.0 applications are built of a network of cooperating data services. Therefore: Offer web services interfaces and content syndication, and re-use the data services of others. Support lightweight programming models that allow for loosely-coupled systems.
  8. Software Above the Level of a Single Device
    The PC is no longer the only access device for internet applications, and applications that are limited to a single device are less valuable than those that are connected. Therefore: Design your application from the get-go to integrate services across handheld devices, PCs, and internet servers.

AJAX is also a key component of Web 2.0 applications such as Flickr, now part of Yahoo!, 37signals' applications basecamp and backpack, as well as other Google applications such as Gmail and Orkut. We're entering an unprecedented period of user interface innovation, as web developers are finally able to build web applications as rich as local PC-based applications.

Interestingly, many of the capabilities now being explored have been around for many years. In the late '90s, both Microsoft and Netscape had a vision of the kind of capabilities that are now finally being realized, but their battle over the standards to be used made cross-browser applications difficult. It was only when Microsoft definitively won the browser wars, and there was a single de-facto browser standard to write to, that this kind of application became possible. And while Firefox has reintroduced competition to the browser market, at least so far we haven't seen the destructive competition over web standards that held back progress in the '90s.

We expect to see many new web applications over the next few years, both truly novel applications, and rich web reimplementations of PC applications. Every platform change to date has also created opportunities for a leadership change in the dominant applications of the previous platform.

Gmail has already provided some interesting innovations in email, combining the strengths of the web (accessible from anywhere, deep database competencies, searchability) with user interfaces that approach PC interfaces in usability. Meanwhile, other mail clients on the PC platform are nibbling away at the problem from the other end, adding IM and presence capabilities. How far are we from an integrated communications client combining the best of email, IM, and the cell phone, using VoIP to add voice capabilities to the rich capabilities of web applications? The race is on.

It's easy to see how Web 2.0 will also remake the address book. A Web 2.0-style address book would treat the local address book on the PC or phone merely as a cache of the contacts you've explicitly asked the system to remember. Meanwhile, a web-based synchronization agent, Gmail-style, would remember every message sent or received, every email address and every phone number used, and build social networking heuristics to decide which ones to offer up as alternatives when an answer wasn't found in the local cache. Lacking an answer there, the system would query the broader social network.

A Web 2.0 word processor would support wiki-style collaborative editing, not just standalone documents. But it would also support the rich formatting we've come to expect in PC-based word processors. Writely is a good example of such an application, although it hasn't yet gained wide traction.

Nor will the Web 2.0 revolution be limited to PC applications. Salesforce.com demonstrates how the web can be used to deliver software as a service, in enterprise scale applications such as CRM.

The competitive opportunity for new entrants is to fully embrace the potential of Web 2.0. Companies that succeed will create applications that learn from their users, using an architecture of participation to build a commanding advantage not just in the software interface, but in the richness of the shared data.

Core Competencies of Web 2.0 Companies

In exploring the seven principles above, we've highlighted some of the principal features of Web 2.0. Each of the examples we've explored demonstrates one or more of those key principles, but may miss others. Let's close, therefore, by summarizing what we believe to be the core competencies of Web 2.0 companies:

  • Services, not packaged software, with cost-effective scalability
  • Control over unique, hard-to-recreate data sources that get richer as more people use them
  • Trusting users as co-developers
  • Harnessing collective intelligence
  • Leveraging the long tail through customer self-service
  • Software above the level of a single device
  • Lightweight user interfaces, development models, AND business models

The next time a company claims that it's "Web 2.0," test their features against the list above. The more points they score, the more they are worthy of the name. Remember, though, that excellence in one area may be more telling than some small steps in all seven.

Tim O'Reilly
O’Reilly Media, Inc., tim@oreilly.com
President and CEO

taken from http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html?page=5

Labels: ,

 
 

Web 3.0

Google, with the cooperation of prestigious libraries, has been digitizing books to make them findable. The practice excites futurists but angers some publishers. Of necessity, digitization creates virtual copies. The publishers claim that such duplication violates copyright, even if the book’s content is hidden from the public. The New York Public Library, one of Google’s partners in the project, recently hosted a public debate on the subject.

It was while attending that debate that my discomfort with the hype surrounding an emerging genre of web development turned into a full-blown hate-on.

The big room was packed. There were more ticket holders than chairs. Yet the seat in front of me remained empty. Each time a hopeful standee approached the empty chair—and this happened every few nanoseconds—the poor schmoe seated next to it had to apologetically explain, “Sorry, the seat is occupied.”

It soon became clear that the kindly schmoe was reserving the seat, not for a friend or colleague, but for a stranger who had imposed that duty on him. While the kindly fellow defended the other man’s throne against a steady stream of resentful ticket holders, the stranger was off somewhere knocking back the library’s free champagne. I wondered what kind of jackass would ask someone he didn’t know to save his seat for thirty minutes at an oversold event. When he finally arrived, I found out.

A taste of ass

“Were you at the Web 2.0 conference?” the arriving man asked, by way of thanking the other for saving his place. The kindly schmoe signified in the negative. This was all the encouragement our man needed to launch into an adjective-rich and fact-poor monologue that was loud enough for half the room to hear.

It soon appeared that “Web 2.0” was not only bigger than the Apocalypse but also more profitable. Profitable, that is, for investors like the speaker. Yet the new gold rush must not be confused with the dot-com bubble of the 1990s:

“Web 1.0 was not disruptive. You understand? Web 2.0 is totally disruptive. You know what XML is? You’ve heard about well-formedness? Okay. So anyway—”

And on it ran, like a dentist’s drill in the Gulag.

At first I tolerated the pain by mentally modifying the famous scene from Annie Hall:

HIM: “I teach a venture capitalist workshop, so I think my insights into XML have a great deal of validity.”

ME: “Oh, really? Because I happen to have Mr. Bray right here.”

Later I gnawed my knuckles. At some point, in a kind of fever, I may have moaned. Blessedly, at last the lights dimmed and the night’s real speakers redeemed the evening.

But the ass whose braying I’d endured left a bad taste.

Less noise, more signal

Let us now define and disclaim.

The jerk at the library event was in love with his own noise, and the problem with noise is that it interferes with signals. What is the signal? What, if anything, does “Web 2.0” mean? What is the good thing that the hype risks obscuring?

Well, there are several good things, it seems to me.

Some small teams of sharp people—people who once, perhaps, worked for those with dimmer visions—are now following their own muses and designing smart web applications. Products like Flickr and Basecamp are fun and well-made and easy to use.

That may not sound like much. But ours is a medium in which, more often than not, big teams have slowly and expensively labored to produce overly complex web applications whose usability was near nil on behalf of clients with at best vague goals. The realization that small, self-directed teams powered by Pareto’s Principle can quickly create sleeker stuff that works better is not merely bracing but dynamic. As 100 garage bands sprang from every Velvet Underground record sold, so the realization that one small team can make good prompts 100 others to try.

The best and most famous of these new web products (i.e. the two I just mentioned) foster community and collaboration, offering new or improved modes of personal and business interaction. By virtue of their virtues, they own their categories, which is good for the creators, because they get paid.

It is also good for our industry, because the prospect of wealth inspires smart developers who once passively took orders to start thinking about usability and design, and to try to solve problems in a niche they can own. In so doing, some of them may create jobs and wealth. And even where the payday is smaller, these developers can raise the design and usability bar. This is good for everyone. If consumers can choose better applications that cost less or are free, then the web works better, and clients are more likely to request good (usable, well-designed) work instead of the usual schlock.

Of this they spin

In addition to favoring simpler solutions built by leaner teams, the stuff labeled “Web 2.0” tends to have technological commonalities.

On the back end, it is most often powered by open source technologies like PHP or (especially) Ruby on Rails.

On the front end, it is mainly built with web standards—CSS for layout, XML for data, XHTML for markup, JavaScript and the DOM for behavior—with a little Microsoft stuff thrown in.

When web standards with a little Microsoft stuff thrown in are used to create pages that can interact with the server without refreshing, the result is web apps that feel peppy and, dare we say it, Flash-like. In a white paper that actually got read, writer/consultant Jesse James Garrett named what I’ve just described. He called it AJAX, and the acronym not only took, it helped interactivity powered by these technologies gain traction in the marketplace.

Here is where the spinners bedazzle the easily confused. Consider this scenario:

Steven, a young web wiz, has just celebrated his bar mitzvah. He received a dozen gifts and must write a dozen thank-you notes. Being webbish, he creates an on-line “Thank-You Note Generator.” Steven shows the site to his friends, who show it to their friends, and soon the site is getting traffic from recipients of all sorts of gifts, not just bar mitzvah stuff.

If Steven created the site with CGI and Perl and used tables for layout, this is the story of a boy who made a website for his own amusement, perhaps gaining social points in the process. He might even contribute to a SXSW Interactive panel.

But if Steven used AJAX and Ruby on Rails, Yahoo will pay millions and Tim O’Reilly will beg him to keynote.

Who weeps for AJAX?

We pause but a moment to consider two AJAX-related headaches.

The first afflicts people who make websites. Wireframing AJAX is a bitch. The best our agency has come up with is the Chuck Jones approach: draw the key frames. Chuck Jones had an advantage: he knew what Bugs Bunny was going to do. We have to determine all the things a user might do, and wireframe the blessed moments of each possibility.

The second problem affects all who use an AJAX-powered site. If web signifiers and conventions are still in their infancy, then AJAX-related signifiers and conventions are in utero. I am still discovering features of Flickr. Not new features—old ones. You find some by clicking in empty white space. This is like reading the news by pouring ACME Invisible Ink Detector on all pieces of paper that cross your path until you find one that has words on it.

I am not knocking Flickr. I love Flickr. I wish I were as gifted as the people who created it. I’m merely pointing out complex design problems that will not be solved overnight or by a single group. In Ma.gnolia, which is now in beta, we used small icons to indicate that additional actions could be taken and to hint at what those actions might be. We succeeded to the extent that 16px by 16px drawings can communicate such concepts as “you may edit these words by clicking on them.”

These problems and others will be solved, most likely by someone reading this page. One points to these issues mainly to dent a swelling of unthinking euphoria. We have been down this road before.

Bubble, bubble

When I started designing websites, if the guy on the plane next to me asked what I did, I had to say something like “digital marketing” if I wanted to avoid the uncomprehending stare.

A few years later, if I told the passenger beside me I was a web designer, he or she would regard me with a reverence typically reserved for Stanley-Cup-winning Nobel Laureate rock stars.

Then the bubble burst, and the same answer to the same question provoked looks of pity and barely concealed disgust. I remember meeting a high-rolling entrepreneur in the early 2000s who asked what I did. I should have told him I hung around playgrounds, stealing children’s lunch money. He would have had more respect for that answer.

I hated the bubble. I hated it when Vanity Fair or New York Magazine treated web agency founders like celebrities. I hated that mainstream media and the society it informs either ignored the web or mistook it for a high-stakes electronic version of the fashion industry.

When the bubble burst, these same geniuses decided the web was of no interest at all. Funny, to me it was more interesting than ever. To me it was people and organizations publishing content that might not otherwise have seen light. It was small businesses with realistic goals delivering value and growing. It was traditional publishers finding their way into a new digital medium, helped by folks like you and me. It was new ways of talking and sharing and loving and selling and healing and being. Hardly dull.

Eventually the uninformed stopped seeing a wasteland and started seeing bloggers, by which they meant only those bloggers who wrote about politics, most often from the extreme left or right. The web was “back” even though it had never left. (Of course, the fifth time you hear Wolf Blitzer say “blogger” or ask, “what do the bloggers have to tell us about these still-unfolding events?” the joke is stale and you wish those who don’t get the web would go back to ignoring it.)

But nothing, not even the rants of political bloggers, was as exciting as the scent of money. As the first properly valued “Web 2.0” properties began to find buyers, a frenzy like the old one popped hideously back to life. Yahoo spent how much? Google bought what? Here was real blood in the water.

But how to persuade the other sharks in the tank that this blood feast was different from the previous boom-and-bust? Easy: Dismiss everything that came before as “Web 1.0.”

It’s only castles burning

To you who are toiling over an AJAX- and Ruby-powered social software product, good luck, God bless, and have fun. Remember that 20 other people are working on the same idea. So keep it simple, and ship it before they do, and maintain your sense of humor whether you get rich or go broke. Especially if you get rich. Nothing is more unsightly than a solemn multi-millionaire.

To you who feel like failures because you spent last year honing your web skills and serving clients, or running a business, or perhaps publishing content, you are special and lovely, so hold that pretty head high, and never let them see the tears.


As for me, I’m cutting out the middleman and jumping right to Web 3.0. Why wait?

taken from http://www.alistapart.com/articles/web3point0

Labels: ,