Internet Systems Development Software Technologies (Research Paper Sample)
Resource: Ch. 12, "Designing Distributed and Internet Systems".
Businesses and organizations are focusing on developing Internet systems to provide value to their customers and staff. There are many software technologies available to internet systems development teams including; SOAP, HTML, JSON, XML, CSS, ASP.NET, Objective C, php, JAVA [:tm:] , Python, Ruby, AJAX, Swift [:tm:] , AngularJS, Bootstrap, jQuery, R, and many more.
Write a 3-page paper that compares and contrasts at least three Internet systems development software technologies.
Explain why an Internet systems developer might choose one technology over another technology.
Explain how these technologies can bring value to the business or organization.
Incorporate additional research or academic information to support your paper.
Format your paper according to APA guidelines
Internet Systems Development Software Technologies
Internet Systems Technologies
Comparing Systems Technologies
The XML is a text based language defining a set of rules used to encode documents in a format that can be read by human and machine. XML is used in web services to facilitate sharing of data across electronic devices via the network. The tool is developed to transport and between applications and database as well as defining/describing markup languages. This language allows developers to create customized tags and facilitates definition, validation, transmission and interpretation of data across applications. The XML data is self-defining and self-describing because data structure is embedded within the data itself hence there is no need for pre-building the structure for storage of data. The XML format can be used by anybody or an organization to consistently share information and is also simple and easier to use language (Nordbotten, 2009).
On the other hand, HTML is a standard markup language for development of web pages and applications. It is basically the skeleton structure or the building block of web pages and web applications. It is a markup language used by web browsers to compose and interpret text and images among other materials into audible and visual web pages. The HTML is used to design web pages rendered on the side of the client and is all about displaying data (Anthes, 2012).
HTML and XML have a lot in common as well as some difference. The similarities are in terms of tags, values and attributes and they both enable developers to design customized tags thus facilitating definition, transmission, validation and interpretation of data between applications. Even though HTML has a set of fixed tags, it also allows designers to develop customized languages known as vocabulary for each type of XML application. Notably, the creation of customized languages is the key ability of XML, but this aspect comes at a cost. However, unlike in XML where formatting of tags is very strict, formatting of tags in HTML very forgiving. This means that tags used for marking and structuring HTML documents are pre-defined hence the author of these documents can only use previously defined HTML. On the other hand, tags used in XML are not predefined, hence allows the author of XML documents to define structures and tags to suit their needs (Oita & Senellart, 2011).
It is noted that contents of XML document do not have any formatted information; instead it simply describes the meaning of data. More importantly, XML cannot be substitute for HTML, but rather its compliment. On this basis, the future web development will widely utilize HTML language for displaying the data while XML will increasingly become a popular tool for defining and describing the web data and structure. It is important to note that XML is capable of storing data separately from HTML or inside HTML documents. Further to that, it can be used to store data in databases and files and also as a format for information exchange (Jiménez, Piattini & Vizcaíno, 2009).
- The Major Data Security Breaches That Have Happened In The Recent TimeDescription: The assignment discussed some of the major data security breaches that have happened in the recent time and identified the main reasons behind these security breaches and how it could have been avoided....7 pages/≈1925 words| 7 Sources | APA | IT & Computer Science | Research Paper |
- Cybercrime: The Corrective Measures Of Protecting Our ComputerDescription: Cybercrime can be avoided if we take the corrective measures of protecting our computer devices. Firstly one should ensure that his/her computer has a unique password which is complicated....2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Research Paper |
- An Analysis Of The Security Technology Deployment Plan For Company XYZDescription: The paper evaluates the security deployment plan for company XYZ, in a semi-conductor manufacturing industry. The paper is structured in 6 different phases. The paper sets out by discussing the IT system architecture, then plan of protection....12 pages/≈3300 words| 16 Sources | APA | IT & Computer Science | Research Paper |