x Internet

56
Seminar Report 2015 – 16 1 X Internet ACKNOWLEDGEMENT I express my sincere gratitude to Mr. Venugopal. S. R. Head of the Department, Dept of Computer Hardware and Maintenance for all his help in presenting this Seminar. I express my heartfelt gratitude to all other staff members of Computer Hardware & Maintenance for their valuable advice and guidance in presenting this Seminar. Also I express my gratitude to my friends for all their help and cooperation. Finally I express my sincere gratitude to my parents for their valuable encouragement and also for their being a source of inspiration. Sneha U Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

description

Seminar report

Transcript of x Internet

Page 1: x Internet

Seminar Report 2015 – 16 1 X Internet

ACKNOWLEDGEMENTI express my sincere gratitude to Mr. Venugopal. S.

R. Head of the Department, Dept of Computer Hardware and Maintenance for all his help in presenting this Seminar.

I express my heartfelt gratitude to all other staff members of Computer Hardware & Maintenance for their valuable advice and guidance in presenting this Seminar.

Also I express my gratitude to my friends for all their help and cooperation.

Finally I express my sincere gratitude to my parents for their valuable encouragement and also for their being a source of inspiration.

Sneha U

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 2: x Internet

Seminar Report 2015 – 16 2 X Internet

ABSTRACTX INTERNET

The Web’s days are numbered. So what’s next? The X Internet, which boosts online users’ quality of experience and accelerates the number of connected devices. As the Internet expands, two new waves of innovation -- comprising the X Internet -- are already eclipsing the Web: an executable Net that greatly improves the online experience and an extended Net that connects the real world.

An executable Net that supplants today's Web will move code to user PCs and cause devices to captivate consumers in ways static pages never could. Today's news, sports, and weather offered on static Web pages is essentially the same content presented on paper, making the online experience more like reading in a dusty library than participating in a new medium.

The extended Internet is reshaping technology's role in business through Internet devices and applications which sense, analyze, and control data, therefore providing more real-time information than ever before about what is going on in the real world.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 3: x Internet

Seminar Report 2015 – 16 3 X Internet

CONTENTSPage No

1. Introduction 12. The mainstream internet

33. The web is fading fast

54. The root problems of today’s internet

75. The X internet looks beyond the web

86. The executable internet puts intelligence near

users 97. Executable internet applications get built in 4

pieces 118. Application of the X internet

149. The extended internet connects the real world

1710.Domination of the extended internet

1911.Characteristics of the X internet

2212.X internet security

26Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 4: x Internet

Seminar Report 2015 – 16 4 X Internet

13.Advantages 30

14.Conclusion32

15.Reference33

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 5: x Internet

Seminar Report 2015 – 16 5 X Internet

1. INTRODUCTION The X Internet will not be a new invention, but

rather the evolution of today's Internet of static Web pages and cumbersome e-commerce mechanisms into a Net that relies on executable software code to deliver more interactive experiences. Executable Internet applications use downloaded code like Java and XML to enhance the user experience with pop-up menus, pick lists, graphics and simple calculations, according to a recent Forrester report entitled "The X Internet." An easy way to understand how the X Internet will work is to imagine that a band wants to distribute a song over the Net. Rather than worrying about which audio player people want to use, an executable file will deliver the song and the audio player at the same time. "With an executable, you can distribute movies the same way you distribute songs," "It just makes the models work better." 1.1.Building the X-Net

The report also employs an example of a person building a house. With today's Internet, a builder would have to find, then try to follow, an article detailing how to frame a window. When it was time to install the bathroom, the would-be plumber would then have to find an article dealing with that topic. Executable Internet applications would demonstrate to a builder, step-by-step, how to frame a window. When it comes time to install the bathroom, the carpenter would simply be replaced by a plumber. "Instead of reading a book, you have a conversation about the work you're trying to do," 1.2.Speeding E-Commerce

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 6: x Internet

Seminar Report 2015 – 16 6 X Internet

The executable Internet will also speed e-commerce transactions, and create experiences that are comparable to video games and television. Glimmers of the executable Internet are already available, in applications like Napster, online gaming and SmartMoney.com's Map of the Market. But complete executable Internet apps are still several years away. One of the biggest barriers to executable applications is security.

"We've already seen one virus that was passed through Gnutella," That's a quite legitimate concern. I don't think it's a show-stopper, but anybody who addresses the X Internet market will have to be able to say, 'We've got that covered.'" 1.3.X-tended Net

Another prediction is the widespread adoption of another X Internet -- but this X stands for "extended." The extended Internet will include the widespread adoption of real-world appliances, like air conditioners or car tires, that communicate with owners or manufacturers via the Internet.

The extended Internet will come with the inclusion of cheap sensors in thousands of everyday products, an era that will begin around 2005, it is predicted. And despite the belief that the future Internet will be much more useful in everyday life than today's, it is acknowledged there is a bit of hype in the report's theme that the Web is dead. "The reality is there will be a lot more executable stuff. It may become the dominant way we interact, but the Web's still going to

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 7: x Internet

Seminar Report 2015 – 16 7 X Internet

be there," "The good news is the executables coexist very nicely with the Web." 1.4.Web-Centric Thinking Hinders the Internet

People are confused: Many think the Web is the Internet because the Web has been so successful. But the Web and the Internet are different -- andthe Web is only one step in the growth of the Internet.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 8: x Internet

Seminar Report 2015 – 16 8 X Internet

2.THE MAINSTREAM INTERNET The Internet has come a long way from its roots as

a government-sponsored, communications research project. As the year 2001 dawned, the Internet hosted more than 100 million computers and more than 400 million users worldwide. Some of the important advantages the Internet has provided to its users: Global reach. The Internet today connects users

and servers in every country in the world. Access to most companies. All US corporations

with more than 1,000 employees have some type of Internet connection today.

An abundance of content. Internet users today have access to everything from pictures of Egyptian artifacts to data from the International Space Station.

2.1.The Internet’s Killer App -- The Web A long string of Internet applications has fueled the

Internet’s boom (see Figure 1). Businesses and consumers first took notice of the Internet after Marc Andresen and Netscape put a point-and-click interface on the World Wide Web protocols that Tim Berners-Lee invented in 1989. With a user interface that schoolchildren and CEOs could understand, the Internet finally got attention outside the realm of computer geeks. The results:

2.2.More than 1 billion Web pages. Today, researchers at the University of California,

Berkeley, estimate that there are about 4 billion static Web pages and that’s just the surface. When we look at Internet information contained in databases

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 9: x Internet

Seminar Report 2015 – 16 9 X Internet

accessible via the Web, firms like BrightPlanet.com estimate that this dynamic Web content amounts to more than 600 billion pages or 7.5 petabytes of information.

Figure 1 The Web Is Just The Latest Internet Application

2.3.Booming eCommerce. In 2000, US eCommerce exceeded $480 billion -- and

it’s projected to grow to more than $3.1 trillion in 2004.

This phenomenon is not confined to the US -- global eCommerce will hit hyper growth this year, breaking the $1.2 trillion mark and reaching $6.8 trillion in 2004.3

2.4.A thriving job market.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 10: x Internet

Seminar Report 2015 – 16 10 X Internet

A recent study showed that the Internet is responsible for more than 3 million jobs today -- that’s 60,000 more jobs than the insurance industry and twice as many as real estate.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 11: x Internet

Seminar Report 2015 – 16 11 X Internet

3.THE WEB IS FADING FAST The 1990s euphoria built on an always-expanding

Web got a reality check in 2000. Despite booming Internet use, today’s New Economy still pales next to the size and scope of the real world (see Figure 2).5 Now that the novelty of reading People online has faded, business executives and consumers are returning to reading magazines, watching TV, and seeing plays. Why? Because they tire of the Web’s:

Figure 2 The Gap Between The Internet And The Real World

3.1.Unsatisfying sites. Today’s Web sites create terrible user experiences.

Of 117 B2C sites that Forrester reviewed in 1999 and 2000, the average user-experience score received was -3 on a scale of -50 to +50 -- where +25 represents a passing grade And B2B sites are no better -- of 30 B2B sites reviewed by Forrester, the average score received was -9

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 12: x Internet

Seminar Report 2015 – 16 12 X Internet

3.2.Content-free content. When Forrester surveyed more than 5,000 online

consumers regarding online content, we found there was no type that even 10% of the interviewees were willing to pay for. Across all content types, only a quarter of respondents said that online content was “good” or “very good.” The bottom line: Today’s Web isn’t good enough to pull money out of consumers’ pockets.

3.3.Flat experiences. Sock puppets and Super Bowl ads paid for with

venture capital couldn’t save the likes of Pets.com and eToys. Why? Because once the novelty of online shopping wore off, most Internet retailers couldn’t offer a rich enough experience to compete against the familiar experience of real-world shopping -- as the nearly 25,000 employees laid off by US dot-coms in the first two months of 2001 will attest.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 13: x Internet

Seminar Report 2015 – 16 13 X Internet

4.THE ROOT PROBLEMS OF TODAY’S INTERNET

The Internet still retains seeds of ongoing, sustained growth. But for it to reach this potential, the Net must overcome three root problems:1. It’s dumb. Static Web pages presenting news,

sports, and weather hardly improve the same content presented on paper -- nor do they take advantage of the powerful computing systems delivering them.

2. It’s boring. With the bulk of Internet use coming from fetching static Web pages, today’s Internet experience is more like reading in a dusty library than basking in the birth of a new medium.

3. It’s isolated. Today’s Internet is so remote from the real world that the media calls it by a different name -- cyberspace.

4.1.The X Internet Will Overtake Today’s Web The Web was about connecting people to

computers through browsers. But two new waves of innovation will eclipse the Web: an executable Net that greatly improves the online experience, and an extended Net that connects the real world. The result? The Internet moves to a second round of expansion.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 14: x Internet

Seminar Report 2015 – 16 14 X Internet

5.THE X INTERNET LOOKS BEYOND THE WEB

The Web boom is dead, and users know it. But observers see two waves of Internet innovation that will supplant today’s dead Web and grow the Internet to billions of devices (see Figure 3). The two waves we see are:

1. An executable Net that supplants today’s Web. Code moved to user PCs and other devices will captivate people in ways that static Web pages never could.

2. An extended Net that connects to the real world. Smart devices will push the scale of the Internet far beyond today’s PC-based Net. These new applications will drive change in three areas:

How applications get built. The executable and extended Internet will rely on new combinations of hardware and software.

How people use the Net. These systems will change how users view the Internet and what they expect of it.

How firms do business. These changes will drive invention -- and the creation of new companies to profit from those inventions.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 15: x Internet

Seminar Report 2015 – 16 15 X Internet

6.THE EXECUTABLE INTERNET PUTS INTELLIGENCE NEAR USERS

The first stage of the X Internet is defined as:Intelligent applications that execute code near the

user to create rich, engaging conversations via the Net. The Web brought users pages to read. The executable Internet will deliver interactive experiences.

Figure 3 Two Waves Of Innovation Will Supplant Today’s Web

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 16: x Internet

Seminar Report 2015 – 16 16 X Internet

Imagine that you are building a house (see Figure 4). The Web would deliver documents to you that tell you how to build the house. Ask about framing a window, and you get an article telling you how to do that. But when you move on to installing a faucet, you have to ask for and read a different article about how to install plumbing. Now imagine building that same house, but this time with the executable Internet. When you want to frame a window, a carpenter shows you a level, a hammer, and a carpenter’s square, and guides you step by step through the process. Instead of reading a book, you have a conversation about the work you’re trying to do. When you move on to installing a faucet, the carpenter disappears, and a plumber appears with his tools. By having an intelligent conversation instead of reading a book, you can build your house faster, with higher quality and precision.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 17: x Internet

Seminar Report 2015 – 16 17 X Internet

7.EXECUTABLE INTERNET APPLICATIONS GET BUILT IN FOUR

PIECESThe executable Internet isn’t completely new -- it’s

a specific mix of software and standards available today. In fact, users can see glimpses of the executable Internet in applications like Napster or SmartMoney.com’s Map of the Market. But complete executable Internet apps will consist of four pieces:

1)Smart code. Software like Java allows users to download code from the Net and run it locally without security fears. Executable Internet apps will use downloaded code to enhance the user experience with pop-up menus, pick lists, graphics, and simple calculations. A sales manager at autodealer giant AutoNation might run an executable Internet application from Bank of America locally to evaluate whether she should extend her firm’s credit line to finance its growing auto inventory.

2)Data conversations. Code downloaded to user PCs will talk back and forth with services in the network using self-describing data in the eXtensible Markup Language (XML) standard. The benefit? The user’s PC can talk with any other computer on the Net, regardless of whether it’s a PC or a mainframe. When the AutoNation sales manager tries to forecast her credit needs for the upcoming year, her executable Internet app can fetch her dealers’ order histories from General

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 18: x Internet

Seminar Report 2015 – 16 18 X Internet

Motor’s IBM mainframe and Ford Motor Company’s Sun Microsystems server.

3)Service locators. Just as house builders might use a person-to-person referral system to find a plumber, executable Internet apps use online location services like search engines and peer-to-peer referrals to find new Net services. A location service at GM helps the AutoNation sales manager find GM services that might affect her planning process for the year.

Figure 4 The Web Versus The Executable Internet

4) Services in the network. Net-based services deliver new content -- and new executables -- to users when they need it. Once our sales manager discovers GM’s services, she can use GM’s executable sales modeling application to see how its new pricing and incentives will affect her forecast.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 19: x Internet

Seminar Report 2015 – 16 19 X Internet

5)People Use The Executable Internet For Better Experiences Forrester predicts that the executable Internet will become the dominant way users interact with the Net by 2005. Why? Because downloadable tools that assist users and allow Internet conversations will:

6)Eliminate the worldwide wait. An Amazon.com customer who wants to buy four CDs will no longer have to wait for eight pages of text and graphics to flow to his screen. Instead, users can employ the same drag-and-drop skills they learned on the Windows desktop -- and take seconds rather than minutes.

7)Create experiences comparable to video games and TV. User PCs will no longer sit idle while pictures download from remote servers. Technologies like Curl’s new executable content language will generate fluid animations on the user’s machine -- allowing a buyer to navigate a virtual marketplace like Enron’s energy trading market as easily as playing a game of Doom.

Figure 5 X Internet Vendors

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 20: x Internet

Seminar Report 2015 – 16 20 X Internet

8)• Simplify users’ technology burdens. Because it is downloaded as needed, executable Internet code can be updated and managed by professionals instead of relying on users to install it. So when Charles Schwab & Co. wants to introduce a new version of its executable online trading system, it just updates the server -- and every user gets the new version the next time she uses the service.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 21: x Internet

Seminar Report 2015 – 16 21 X Internet

8. APPLICATION OF THE X INTERNETIt’s too early to pick the sure winners and losers in

the executable Internet. But our bets ride on vendors that can market successfully to software developers (see Figure 5). Our picks follow the four components of executable Internet applications: Smart code: Sun and Hewlett-Packard. The only

cross-platform, executable environment in place today is Java. As the executable Internet takes off, millions of Java Virtual Machines like Sun’s HotSpot VM and HP’s chaiVM will pop up. Why not Windows executables? Some executable Internet apps will be piloted as Windows components -- but viruses and Trojan Horse software will drive developers to systems that have built-in security models like Java has.

Data conversations: startups like Altio, Curl, Droplet, and Eazel. These firms have created drag-and-drop tools that can turn data conversations into user experiences. Each of these firms has specific features, but it is expected that the successful ones to be bought by today’s software giants like IBM, iPlanet, Microsoft, and Oracle. Why? Because these big companies already have relationships with developers -- and the deep pockets needed to market to them.

Service locators: vertical industry eMarketplaces. IBM, Microsoft, and Ariba have already launched directories to locate online business services using an emerging standard called UDDI. But running business directories isn’t the core business of these technology companies. Instead, it

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 22: x Internet

Seminar Report 2015 – 16 22 X Internet

is expected that this function will become an industry-specific service run by vertical hubs like e2open or CheMatch.com as the eMarketplace business consolidates.

Services in the network: businesses specializing in Internet transactions. Companies like Dun & Bradstreet, eCredit.com, and American International Group are already creating business-based services like real-time financing and credit that are priced per transaction -- and they’ll work better with executable Internet technology. Expect downloadable apps that mirror D&B’s Risk Assessment Manager or ClearCross’ Landed Cost solution to spark business use of executable Internet apps -- and to convince firms that they don’t have to buy software to use these services.

8.1. Business Applications Will Dominate Extended Internet Use

The big users of the extended Internet will be businesses, not people. Why? Because corporations have the capital necessary for extended Internet deployments -- and will spend that capital if they can forecast a large return on their investment. Some examples:

1)Extended Internet apps will allow executives to optimize assets. Companies like iVita already have software that helps firms optimize capital assets based on where they are -- all without people having to type in data. For example, radio ID tags allow hospitals to track high-value assets like infusion pumps. iVita’s app can alert the

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 23: x Internet

Seminar Report 2015 – 16 23 X Internet

hospital’s CFO if 50% of those pumps are unavailable simply because they’re waiting to be cleaned -- and save thousands of dollars by not buying additional, unneeded pumps.

2)Suppliers will instrument customer sites to boost sales. Motorola is building agricultural sensors that can collect data on soil properties like moisture and pH. But it will be firms like Dupont that put them on farms. Why? Because with continuous monitoring, Dupont can ensure a near-perfect corn crop to farmers using microcustomized fertilizer -- and charge a higher price for that service

3)Telematics will collect mobile data beyond cars. More than 1 million cars today already provide users with enhanced safety, navigation, and entertainment services using telematics. Companies like OnStar and Networkcar will start aggregating this data to create entirely new applications. For example, Infotrafic’s traffic monitoring service will buy the aggregated, real-time feed from OnStar systems to provide up-to-the-minute traffic information -- all without adding a single traffic helicopter.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 24: x Internet

Seminar Report 2015 – 16 24 X Internet

9. THE EXTENDED INTERNET CONNECTS THE REAL WORLD

The X Internet is not just executable -- it’s also extended. Definition of the extended Internet is: Internet devices and applications that sense, analyze, and control the real world. Let’s return to building our house. In cold coutries we try not to leave our houses unattended in the winter. Why? Because if the furnace ever goes out, the house freezes, the water pipes burst, and the house floods when the ice melts. But what if houses had Internet-connected thermostats? When the weather gets cold, homeowners could check and adjust their house temperatures from thousands of miles away any time they were on the Internet. Both homeowners’ and service providers’ computers could monitor house temperatures and optimize comfort and energy use. Some electric utilities might even offer lower rates to Internet-controlled homes if they get permission to adjust the home energy consumption during peak usage periods.Figure 6 The X Internet Connects More Than People And

Computers

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 25: x Internet

Seminar Report 2015 – 16 25 X Internet

These capabilities aren’t just an early adopter dream -- the same economics that drove chips into most everyday devices will also extend the Internet to them (see Figure 6).

9.1.Extended Internet Applications Exploit Embedded Chips

Ever-cheaper integrated circuits will drive Internet connections into everyday devices by 2005 -- $1 chips will have all the power and networking capabilities of a circa-1990 PC. But once the executable Internet has connected users with Net-based services, firms will use the same technology to talk with networked chips. These chips will have:

9.2.Silicon eyes and hands. Chip makers like Analog Devices, Dallas

Semiconductor, and Texas Instruments already make miniature sensors, microelectromechanical systems (MEMS), and actuators that work via the Internet. By 2005, manufacturers will build MEMS into most electronic devices. Why? Because these tiny chips will let Internet users locate, measure, and adjust

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 26: x Internet

Seminar Report 2015 – 16 26 X Internet

everything from fuel injectors to earthmovers -- and do it from across the room or across the country.

9.3.Opportunistic communications. Collecting information from these cheap sensors

won’t require a $19.95 per month wire from the phone company. Instead, data will be collected via wireless Ethernet links or piggyback on existing connections like power lines and cellular links. Already, companies like Cambridge Silicon Radio make chips that speak both Ethernet and Bluetooth wireless protocols. By 2005, these chips will cost only a few dollars.

9.4.Self-configuring networks. These new Internet sensors will locate services just

as the executable Internet did. Technologies like Sun’s Jini and Microsoft’s Universal Plug and Play will remove the need for users to do anything to connect these chips to the network. So when BP Amoco installs a new Internet-enabled gasoline pump at a filling station, it will start logging maintenance information to the station and to BP Amoco operations without the owner lifting a finger.

10. DOMINATION OF THE EXTENDED INTERNET

Were the executable Internet was largely about software companies, the extended Internet will create more opportunities around hardware, data collection, and analysis. Observers see the extended Internet businesses getting started with:

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 27: x Internet

Seminar Report 2015 – 16 27 X Internet

1)Instrument builders like HP, Motorola, GARMIN, and NetBotz. These innovators will create X-Internet smart devices that gather up real-world data like soil conditions, GPS locations, and data center temperatures. Firms will jump into these businesses when they realize that the volumes of devices they can sell will range easily into the billions.

2)Sensor-network owners like OnStar and Networkcar. OnStar already has a million cars outfitted with its mobile phone and location sensor systems. NetworkCar is attaching devices to post-1996 US automobile engines through the emissions-control interface -- and using that data to collect maintenance information. Firms like these -- which deploy and operate sensors -- will be the Microsoft monopolies of the extended Internet. Why? Because their sensor deployments will create big barriers to entry for competitors -- and their revenue streams will grow with their always-increasing reach.

3)Data farmers like SAS Institute and Tilion. These companies collect, sift, grade, and organize the data that comes from X Internet devices -- then sell it to other firms. SAS will sell its analytical tools to the sensor network operators in order to understand the real-world data gathered through the extended Internet. Tilion, which has its roots in the Web analytics business, will sell analytics as a service. All analytical companies will thrive by preventing companies from drowning in the data

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 28: x Internet

Seminar Report 2015 – 16 28 X Internet

that the X Internet provides -- and help them understand what it means.

4) Action. The evolution of the X Internet will usher in a new phase of technology change. The good news? Most firms already have their Internet connections. The bad news? These changes will require deeper knowledge of technology than the Web did.

5) Don’t try to pick X Internet winners this early. Many companies are already jumping on technologies like Microsoft’s .NET, assuming that an early decision will help them win in the X Internet. Don’t -- it’s too soon in the X Internet’s evolution. Instead, invest your time and money in X Internet experiments that yield business value today. For example, you might want to add an XML interface to your customer data to ease partner data access today -- and prepare for executable apps to mine that data tomorrow.

6) Start looking beyond the Web. Most firms are still trying to satisfy customers with Web HTML and animated GIFs. But delighting customers in the executable Internet will require better user interfaces. Start using Scenario Design -- a methodology through which you identify your users, discover their goals, and observe how they can achieve those goals. Then prototype some executable code that makes those goals easier to reach. You’ll satisfy more customers and get a jump on the executable Internet.

7) Start using wireless networks. While wireless extended Internet systems will be cheap,

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 29: x Internet

Seminar Report 2015 – 16 29 X Internet

wireless carrier fees won’t be. To make internal extended Internet apps less expensive to deploy, start piggybacking 802.11b wireless Ethernet from companies like 3Com or Lucent onto your corporate network. Corporate road warriors can get started by using the wireless network now for email and intranet apps -- then, when you want to roll out an extended Internet app like production or supply chain monitoring, the network will already be in place.

8)Identify high-value extended opportunities. Look for places within the corporation where sensing the physical world in the business would decrease costs or increase revenue. For example, Michelin and Bridgestone have already started building smart tires with embedded processors that measure tire pressure, heat, and other factors. With early detection of excessive wear conditions, commercial operators can change out tires before they blow -- and the tire companies will sell more tires.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 30: x Internet

Seminar Report 2015 – 16 30 X Internet

11. CHARACTERISTICS OF THE X INTERNET The Web’s decline amid the rise of the executable

Internet will throw firms off balance. Just when many CEOs have written off the Web as last year’s news, early executable Internet apps will get attention as:

1)IT starts working on X intranets. The executable Internet will invade corporations the same way the Internet did: without IT’s permission. Despite most companies mandating Web-only internal applications, some high-level executives will break their own rules and launch executable intranet functions. Why? Because once an enterprising VP discovers that he can model his 401(k) investments faster using an executable Internet app from Schwab, he’ll see that the same technology can boost his division’s productivity -- and he’ll allocate budget for Altio’s Designer tool to do that.

2)Corporate executable skills evolve toward open source. Java and XML are already two of the most in-demand skills for IT professionals in corporations.15 But executable Internet applications will require similarly big investments in understanding user behavior and building graphical user interfaces (GUIs), something only firms like Microsoft, Apple, and Palm do today. Instead of rolling their own, firms will tap into the open source movement and grab code from sites like Eazel.com and OpenOffice.org -- and slash their development times in the process.

3)Microsoft’s .Net promotes X Internet -- but delivers late. Bill Gates is selling corporations on

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 31: x Internet

Seminar Report 2015 – 16 31 X Internet

intelligent Web services now, and Redmond already owns the minds and tools of developers. So why won’t Microsoft dominate the executable Internet? Because the firm has so many products in the pipeline targeted at today’s Web, it will be 2003 before it has complete solutions for the X Internet -- putting the firm two years behind startups like Altio, Droplet, and Fourbit that don’t have that distraction. But the executable Internet is still PC-centric -- and the world only has about 450 million PCs. The extended Internet will push applications to embedded chips and increase the Internet population by billions of nodes. The result? Today’s Internet devices and services market of $600 billion annually will grow to more than $2.7 trillion worldwide by 2010 (see Figure 7). But in the process:

Figure 7 Forecast: Worldwide Internet Devices And Spending, 2001 To 2010

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 32: x Internet

Seminar Report 2015 – 16 32 X Internet

4. Cost per device will drop throughout the decade. Manufacturers, consumers, and service providers spend more than $4,000 per year for each computer on the Internet today. But with the X Internet’s opportunistic connectivity and cheap devices, that number will drop to slightly less than $200 per year in 2010. The X Internet market booms to 14 billion devices by 2010, but with the unrelenting cost pressure on every device and connection, the boom will feel like a never-ending price war.

5. The X Internet will create an energy crisis for chips. With network interfaces embedded in everything from tires to clothing and billions of devices being deployed, power consumption will continue to soar. Chip makers like Intel and Motorola will get a new religion about power consumption – and companies like IBM that have patents on low-power techniques like silicon-oninsulator will profit. Corporate users, on the other hand, will see power-saving programs like Energy Star make a comeback as governments try to stem everrising national energy use by Internet devices.

6. Cleaning up with today’s extended Internet. The Internet has installed Internet-connected washing machines in one of MIT’s dormitories. It’s not as silly as one might think -- students can check on the Web for available washing machines, and when someone’s laundry is done, the washing machine sends the student an email.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 33: x Internet

Seminar Report 2015 – 16 33 X Internet

7. Converting Internet-connected machines into disconnected appliances. Have you ever wondered what to do with those extremely expensive but hopelessly obsolete servers in your data center? We came across a solution at http://home.planet.nl/~mourits/koelkast/ that helps firms recycle Silicon Graphics Indy Challenge servers and turn them into -- refrigerators. Observers think recycling like this is wonderful -- and nearly as elegant as turning swords into plowshares.

8. Ring . . . “Do you want to play a game?” Online gamers have been the vanguard users of the executable Internet to date with games like WarBirds and EverQuest. But now video game giant Electronic Arts has started demonstrating a new game called Majestic, which incorporates some extended Internet concepts. While the game doesn’t wire up players with sensors, it does intrude into real-world life by calling players on the telephone, sending them faxes, and interacting via instant messenger. Shades of the old movie “War Games” -- except the characters in this computer game, thankfully, don’t play with thermonuclear weapons.

9. Intel employs executable Internet tools to fight cancer. Intel recently held an event to enlist users’ PCs to fight cancer using peer-to-peer software from United Devices. The goal of this first effort is to analyze 250 million chemical molecules for their cancer-fighting potentials. The science comes from the American Cancer Society, Oxford

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 34: x Internet

Seminar Report 2015 – 16 34 X Internet

University, and the National Foundation for Cancer Research. Forrester thinks this project is a great use of executable Internet technologies. Just promise us that these executables won’t put Blue Man Group ads touting Pentium 4s on our PCs.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 35: x Internet

Seminar Report 2015 – 16 35 X Internet

12. X-INTERNET SECURITY The REBOL programming language makes X-

Internet a reality but there are a few risks to think about when planing for an X-Internet implementation. This section presents a few security issues related to executing content received remotely. It is especially relevent when providing service such as that enabled by Rugby or indeed any other web service software.

12.1. The reality Unfortunately some unscrupulous people will

attempt to find and exploit any security weaknesses in our systems. For this reason we must learn how to avoid creating such weaknesses. Security is a large and complex topic - too big to cover here. It is sufficient that we draw our attention to some security issues and a couple of things we can do to manage the risks.

12.2. Opening a port These days just opening a port on our machine

visible on the internet is enough to have the baddies sniffing around our machine for a way in. Opening a port occurs when for example we issue the SERVE command of Rugby. It also occurs when we run any type of "listening" service such as a web server or sometimes even a chat client. Vulnerabilities will likely always exist in software. They might exist at the operating system level, a user program, or in application libraries. Software is complex, bugs can live in any layer of software. In the context of Rugby this means, there could be so far unknown security weaknesses in the programs we publish with Rugby, in Rugby itself, in the REBOL interpreter, etc.

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 36: x Internet

Seminar Report 2015 – 16 36 X Internet

Publishing a Rugby service or any other web service, means knowing that we are taking the risk of exposing such vulnerabilities to the world, and there's plenty of people in the world looking to exploit such vulnerabilties. For this reason publishing web services etc on a machine that either contains confidential information or has access to such information carries high risks. Yet this is the way the world is moving so be prepared to learn more than we ever wanted to know about such vulnerabilities.

Also note that some internet service providers explicitly prohibit providing internet facing server ports. If we do open a port on an ISP with this policy in place, we might find ourselves without an internet service in short order.

12.3. Untrusted code Probably first off, unthinkingly using other peoples

scripts is a recipe for problems. Exposing functions defined in these scripts as Rugby services or other types of web services is not a good idea at all. The following sections will show why this is so.

12.4. LOAD It is just too easy to unwittingly leave open our

system to attack. One likely cause for opening a security weakness is not understanding the behaviour of the code we are publishing well enough. Here's one example:LOAD

Many people did not realise that in earlier versions of REBOL, LOAD evaluates (to an extent) the value it is given. LOAD by default would evaluate any REBOL header it finds in the value we are loading. People

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 37: x Internet

Seminar Report 2015 – 16 37 X Internet

normally only put simple values in the header of their REBOL scripts, but actually we could put any sort of function in there. With newer versions of REBOL this security weakness has been removed and LOAD does not evaluate the header any longer.

12.5. DO and related It might seem cool, to process arbitrary input as

executable code but it is not. I hope it obvious, but serving up DO as an unprotected internet enabled web service is really a very bad idea.

What is not so obvious is that the logic of DO exists in many REBOL functions. Here are some examples:

REDUCE - should be pretty obvious. JOIN - the second parameter has REDUCE

applied to it. REPEND - the second parameter has REDUCE

applied to it. REFORM - the second parameter has REDUCE

applied to it. Don't assume that is a complete list.

12.6. BIND and dialects Dialecting is a good thing. It is part of REBOL's

grand future. There are traps though in how dialects are implemented. Imaging some script/data in the form of an unevaluated block, received as an request via Rugby or perhaps delivered as the body of an email. We have a program ready and willing to accept this input and our program expects that the script/data conforms to specific dialect.How do we bind our program functions to the script/data - BIND?

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 38: x Internet

Seminar Report 2015 – 16 38 X Internet

BIND is powerful and could make some dialects as simple as evaluating a block that has been bound to a specific context. But what are the effects? How do we know that the input does not contain some malicious code or data?

This problem is really part of a general problem in how to deal with input. In the "x-internet" age input must always be considered in some way executable.

12.7. Validate our input A more secure way to deal with the problem of

input containing unexpected behaviour is to define exactly what we are expecting, and then to check that the input we receive conforms to the rules we defined. To do this use PARSE.

By using PARSE we can verify that the input is acceptable to process further and contains no un-expected/un-welcome executable code.

PARSE by itself is not a silver bullet though. We need to carefully check our parse rules to ensure that we do not accidentally allow executable code. This can only meaningfully be done by considering how the input will be used in our function.

So before we unleash our wonderful new web service on the world ensure we have defined the grammar of our input. If the grammar is simple (only ever a string) simple testing in our web service should suffice. If the grammar is more sophisticated we should consider PARSE as our gatekeeper.

In a way our grammar becomes a contract - our function should only supply service if the input it is presented with conforms to the grammar.

12.8. Using SECURE

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 39: x Internet

Seminar Report 2015 – 16 39 X Internet

Another measure we can implement is to learn and apply the SECURE function. This function configures how the REBOL interpreter will handle access to network and disk resources. SECURE ensures that the REBOL interpreter becomes an active part of our security plan. To use SECURE effectively, we should adopt the old security policy from the era of mainframes and mini-computers - only grant those permissions actually required to achieve the task we want performed. This requires analysing the functions we will be serving up for the minimum permission required for their successful completion. A good idea would be to then document these requirements for future reference. Having performed this security analysis we are better equipped to set SECURE with confidence.

12.9. Other security measures and defaults If we are making a web service using Rugby or

some other software, we might find that the software contains extra security features.

For example, Rugby offers encrypted communications and the ability to restrict connections to specific IP addresses.

So check out the features that the software we use offers. It is important that we do it and pay particular attention to what the default settings are. Some software notably Microsoft's has been notorious in the past for having default security settings equivalent to "wide open". There are lots of complicated security issues. The best defense is to learn as much as you can about what the problems are and then to devise and

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 40: x Internet

Seminar Report 2015 – 16 40 X Internet

implement a plan that minimises your exposure to the risks.

13. ADVANTAGES X Internet incorporates Internet’s advantage with

C/S’s advantage

X internet provides easy to develop, C/S-like User Interface.

X Internet reduces data transfer Processing logic is distributed between the server and client, and this smart client device can process code locally

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 41: x Internet

Seminar Report 2015 – 16 41 X Internet

Downloaded executable applications are tiny as the size of a graphic file (approximately 15 Kilobytes) X Internet can overcome these bandwidth limits Connects physical objects to the Internet via RFID, sensors and wireless networks Radio frequency identification (RFID) tags are used to identify product location Wireless sensors detect and send condition information of the surroundings Biometrics help to identify trusted individuals

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 42: x Internet

Seminar Report 2015 – 16 42 X Internet

14. CONCLUSION A posse of visionaries think that they've cornered

the culprit who is responsible for the Internet's stalled growth and narrowed sense of opportunity: It's the "reload" button on your browser. You click "reload" in the last few minutes of an eBay auction when you want to find out if someone else is about to outbid you. You click it when the E*Trade server fails to respond to your "buy" order, and you need to start over again. "Today's Web isn't well suited for such transactions," "Hitting the reload key over and over again is just brain-dead."

"X Internet" is the label that Forrester Research founder George F. Colony has given to what he thinks will replace the reload-and-wait Internet. The X stands for "executable."

This new model will be about applications -- executables -- talking to each other. It will be about conducting transactions in real time, rather than through a succession of static Web pages. "Think of how much time it takes to reserve a rental car on the Web," Colony says. "X Internet will be more intelligent, more seamless. It will anticipate what you want to do next."

AOL Instant Messenger and Napster are examples of X Internet apps. Charles Schwab's Velocity trading software is also an X Internet app. Eventually, X Internet will touch not just PCs but all sorts of devices. A coterie of companies provide tools for creating X Internet applications, including Altio, Avaki Corp., Curl Corp., and Kenamea Inc. Big players such as Sun Microsystems, with its Project JXTA and Sun ONE initiatives, and Microsoft, with .NET and Windows XP,

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad

Page 43: x Internet

Seminar Report 2015 – 16 43 X Internet

are eager to establish a foundation for future X Internet construction. It is doubtful that X Internet will result in a boom like we saw with the Web in the late 1990s, because I don't think anybody is dumb enough to fall for that again. But it will set off another cycle of new and innovative development. "The X Internet will enable companies to deliver an experience that's more alluring, more interesting, and more dynamic than the Web is today."

15. REFERENCE 1. http://www.fastcompany.com/magazine/51/

future_xinternet.html2. http://www.newsfactor.com/perl/story/10012.html3. http://www.forrester.com/Marketing/InFocus/

0,5713,11,00.html4. http://www.codeconscious.com/rebol/articles/x-

internet-security.html

Dept if Computer Hardware & Maintenance Govt Polytechnic College, Palakkad