SlideShare a Scribd company logo
1 of 103
Context Automation
Phillip J. Windley, Ph.D.
CTO, Kynetx
www.windley.com
What is it?
Connecting the dots
On the web, users connect the
 dots between Web sites in
         their heads
context automation
        ==
connecting the dots
Context is state
Context Examples
Intra-site Context
Single Purpose Context
Context with Data
Amazon and Your Local Library
Trends Driving Context Automation
Trends Driving Context Automation


         Cloud
       Computing
Trends Driving Context Automation


         Cloud     Extensible
       Computing   Browsers
Trends Driving Context Automation


         Cloud          Extensible
       Computing        Browsers




                Internet
               Identities
Trends Driving Context Automation


         Cloud          Extensible
       Computing        Browsers




                Internet
               Identities
The Browser as Platform
 Browsers tie Web sessions
 together
The Browser as Platform
 Browsers tie Web sessions
 together
   1B Firefox add-on
   downloads since 2005*
The Browser as Platform
 Browsers tie Web sessions
 together
   1B Firefox add-on
   downloads since 2005*

   That is about 17/sec*
The Browser as Platform
 Browsers tie Web sessions
 together
   1B Firefox add-on
   downloads since 2005*

   That is about 17/sec*

   Estimates are 2x-5x below
   actual
The Browser as Platform
 Browsers tie Web sessions
 together
      1B Firefox add-on
      downloads since 2005*

      That is about 17/sec*

      Estimates are 2x-5x below
      actual



 *Justin Scott, Mozilla
The Identity Shift
The Identity Shift
   Ad-hoc
     IP Address
     Machine
     Cookie
     Session
     SSL
The Identity Shift
   Ad-hoc
     IP Address
     Machine
     Cookie
     Session
     SSL

    Security & privacy at
    the expense of
    convenience

    Website dependent
    identity only
The Identity Shift
   Ad-hoc                   Structured
     IP Address                Browser
     Machine                  Individual
     Cookie                   Identity
     Session                  Relationships
     SSL                      Reputation

    Security & privacy at
    the expense of
    convenience

    Website dependent
    identity only
The Identity Shift
   Ad-hoc                   Structured
     IP Address                Browser
     Machine                  Individual
     Cookie                   Identity
     Session                  Relationships
     SSL                      Reputation

    Security & privacy at    Convenience with
    the expense of           privacy, security &
    convenience              relationships

    Website dependent        Consistent website
    identity only            independent identity
Information Cards
Information Cards
   Microsoft developed standard
Information Cards
   Microsoft developed standard
   Information Card Foundation
Information Cards
   Microsoft developed standard
   Information Card Foundation
   User participation
Information Cards
   Microsoft developed standard
   Information Card Foundation
   User participation
   Firm, technical foundation for
   security and privacy
Information Card Types
Information Card Types

   Personal cards
Information Card Types

   Personal cards
   Managed cards
Information Card Types

   Personal cards
   Managed cards
   Action cards
The Information Card Selector
Context automation rocks when
 supported by cloud services,
browser extensions, & internet
            identity
Context automation works by
augmenting Web sites with new
   information for the user
The Web Augmentation Spectrum




 Javascript in
 the browser
The Web Augmentation Spectrum




                  Media
                 Toolbars


 Javascript in
 the browser
The Web Augmentation Spectrum




                  Media
                 Toolbars
                            Search
                            Context
 Javascript in
 the browser
The Web Augmentation Spectrum




                                      Context
                                      Platform
                  Media
                 Toolbars
                            Search
                            Context
 Javascript in
 the browser
What you get from the cloud...
What you get from the cloud...

   Machine independence
What you get from the cloud...

   Machine independence
   Hassle-free updates
What you get from the cloud...

   Machine independence
   Hassle-free updates
   Increased security
What you get from the cloud...

   Machine independence
   Hassle-free updates
   Increased security
   Auditing & analytics
What you get from identity...
What you get from identity...

   Individualized
What you get from identity...

   Individualized
   Structured browsing
What you get from identity...

   Individualized
   Structured browsing
   Privacy
What you get from identity...

   Individualized
   Structured browsing
   Privacy
   Security
Kynetx
         &
Context Automation
How Kynetx Works
1




    How Kynetx Works
1
        2




    How Kynetx Works
1
        2



            3




    How Kynetx Works
4




1
        2



            3




    How Kynetx Works
Kynetx Rule Language (KRL)
Sometimes a layer of indirection helps...
Kynetx Rule Language (KRL)
Sometimes a layer of indirection helps...

   Domain specific language
Kynetx Rule Language (KRL)
Sometimes a layer of indirection helps...

   Domain specific language
   Browser and platform independent
Kynetx Rule Language (KRL)
Sometimes a layer of indirection helps...

   Domain specific language
   Browser and platform independent
   Mental leverage via abstractions
KRL Rulesets
KRL Rulesets

  Select page via URL class
KRL Rulesets

  Select page via URL class
  Declare and access data sources
KRL Rulesets

  Select page via URL class
  Declare and access data sources
  Conditionally fire action
KRL Rulesets

  Select page via URL class
  Declare and access data sources
  Conditionally fire action
  Process callbacks
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
Information cards advantages
Information cards advantages
   Signed
Information cards advantages
   Signed
   Uniquely identified
Information cards advantages
   Signed
   Uniquely identified
   Protect user data
Information cards advantages
   Signed
   Uniquely identified
   Protect user data
   Hidden security
Information cards advantages
   Signed
   Uniquely identified
   Protect user data
   Hidden security
   Nice metaphor
Can we hack a card?
Can we hack a card?
RE
   JEC
       T
ED
    !!
Malicious apps can be
identified and disabled
Kynetx Developer Beta
Kynetx Developer Beta
Kynetx Developer Beta
 Free (under quota)
Kynetx Developer Beta
 Free (under quota)
 Limited number
Kynetx Developer Beta
 Free (under quota)
 Limited number
 See me for signup card
Cloud          Extensible
Computing        Browsers




         Internet
        Identities
Cloud          Extensible
Computing        Browsers




         Internet
        Identities
Cloud          Extensible
Computing        Browsers



                              Safe
         Internet
        Identities
Cloud          Extensible
Computing        Browsers



                              Safe
         Internet
                              Secure
        Identities
Cloud          Extensible
Computing        Browsers



                              Safe
         Internet
                              Secure
        Identities
                              Individualized
Cloud          Extensible
Computing        Browsers



                              Safe
         Internet
                              Secure
        Identities
                              Individualized
                              Flexible
Cloud          Extensible
Computing        Browsers



                              Safe
         Internet
                              Secure
        Identities
                              Individualized
                              Flexible
                              Powerful
More information...

   Read the white paper:
    http://www.kynetx.com
   Our developer site
    http://code.kynetx.com/
Context
Automation


?
     Contact info:
    phil@windley.org
    www.windley.com
        @windley
Context Automation (with video demos)

More Related Content

What's hot

Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
IndicThreads
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
Nick Owen
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Michael Noel
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
OKsystem
 
P hallam baker_keynote
P hallam baker_keynoteP hallam baker_keynote
P hallam baker_keynote
shindeshekhar
 
Leveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsLeveraging SharePoint for Extranets
Leveraging SharePoint for Extranets
Avtex
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
Olivier Potonniée
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
Eduserv
 

What's hot (20)

Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
How Does Code Signing Works?
How Does Code Signing Works?How Does Code Signing Works?
How Does Code Signing Works?
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsUsing Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
SSL Certificate and Code Signing
SSL Certificate and Code SigningSSL Certificate and Code Signing
SSL Certificate and Code Signing
 
P hallam baker_keynote
P hallam baker_keynoteP hallam baker_keynote
P hallam baker_keynote
 
Leveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsLeveraging SharePoint for Extranets
Leveraging SharePoint for Extranets
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
Authentication Concepts
Authentication ConceptsAuthentication Concepts
Authentication Concepts
 
Reinforcing Your Enterprise With Security Architectures
Reinforcing Your Enterprise With Security ArchitecturesReinforcing Your Enterprise With Security Architectures
Reinforcing Your Enterprise With Security Architectures
 
Planning Your Cloud Strategy
Planning Your Cloud StrategyPlanning Your Cloud Strategy
Planning Your Cloud Strategy
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications Overview
 
Certification Authority - Sergio Lietti
Certification Authority - Sergio LiettiCertification Authority - Sergio Lietti
Certification Authority - Sergio Lietti
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
 

Similar to Context Automation (with video demos)

HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010
Michael Noel
 
Oscon anatomy of_os_cloud_ecosystem
Oscon anatomy of_os_cloud_ecosystemOscon anatomy of_os_cloud_ecosystem
Oscon anatomy of_os_cloud_ecosystem
htdvul
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App Fabric
Spiffy
 

Similar to Context Automation (with video demos) (20)

Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017
Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017
Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
 
Cybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something biggerCybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something bigger
 
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the Cloud
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
 
Blockchain Cybersecurity Development
Blockchain Cybersecurity DevelopmentBlockchain Cybersecurity Development
Blockchain Cybersecurity Development
 
Blockchain Cybersecurity
Blockchain CybersecurityBlockchain Cybersecurity
Blockchain Cybersecurity
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010
 
Oscon anatomy of_os_cloud_ecosystem
Oscon anatomy of_os_cloud_ecosystemOscon anatomy of_os_cloud_ecosystem
Oscon anatomy of_os_cloud_ecosystem
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App Fabric
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
ekey+ Presentation
ekey+ Presentationekey+ Presentation
ekey+ Presentation
 
Ad fs
Ad fsAd fs
Ad fs
 
TechNet Event: August 2011 Cloud Essentials
TechNet Event: August 2011 Cloud EssentialsTechNet Event: August 2011 Cloud Essentials
TechNet Event: August 2011 Cloud Essentials
 
Client & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit SplunkClient & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit Splunk
 

More from Phil Windley

Introducing Personal Event Networks
Introducing Personal Event NetworksIntroducing Personal Event Networks
Introducing Personal Event Networks
Phil Windley
 

More from Phil Windley (20)

Trust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityTrust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn Identity
 
A University API
A University APIA University API
A University API
 
Rule Language for IoT
Rule Language for IoTRule Language for IoT
Rule Language for IoT
 
Events, Picos, and Microservices
Events, Picos, and MicroservicesEvents, Picos, and Microservices
Events, Picos, and Microservices
 
Picos, CloudOS, and Connecting Things
Picos, CloudOS, and Connecting ThingsPicos, CloudOS, and Connecting Things
Picos, CloudOS, and Connecting Things
 
Events, Picos, and Microservices
Events, Picos, and MicroservicesEvents, Picos, and Microservices
Events, Picos, and Microservices
 
Relationships: Modeling the Vehicle Ecosystem with Fuse
Relationships: Modeling the Vehicle Ecosystem with FuseRelationships: Modeling the Vehicle Ecosystem with Fuse
Relationships: Modeling the Vehicle Ecosystem with Fuse
 
Fuse 2
Fuse 2Fuse 2
Fuse 2
 
Connecting Things
Connecting ThingsConnecting Things
Connecting Things
 
Persistent Compute Objects and the Fabric of Cyberspace
Persistent Compute Objects and the Fabric of CyberspacePersistent Compute Objects and the Fabric of Cyberspace
Persistent Compute Objects and the Fabric of Cyberspace
 
Persistent Compute Objects - Picos
Persistent Compute Objects - PicosPersistent Compute Objects - Picos
Persistent Compute Objects - Picos
 
Fuse Technical Presentation
Fuse Technical PresentationFuse Technical Presentation
Fuse Technical Presentation
 
Personal Cloud Application Architectures
Personal Cloud Application ArchitecturesPersonal Cloud Application Architectures
Personal Cloud Application Architectures
 
Why Personal Clouds
Why Personal CloudsWhy Personal Clouds
Why Personal Clouds
 
Personal Cloud Operating Systems
Personal Cloud Operating SystemsPersonal Cloud Operating Systems
Personal Cloud Operating Systems
 
Introducing Personal Event Networks
Introducing Personal Event NetworksIntroducing Personal Event Networks
Introducing Personal Event Networks
 
The Live Web #SCITDA11 Keynote
The Live Web #SCITDA11 KeynoteThe Live Web #SCITDA11 Keynote
The Live Web #SCITDA11 Keynote
 
Shaping strategies and Startups
Shaping strategies and StartupsShaping strategies and Startups
Shaping strategies and Startups
 
Shaping Strategies and the Live Web - Kynetx Impact 2011
Shaping Strategies and the Live Web - Kynetx Impact 2011Shaping Strategies and the Live Web - Kynetx Impact 2011
Shaping Strategies and the Live Web - Kynetx Impact 2011
 
The Evented Web Makes Users Happy
The Evented Web Makes Users HappyThe Evented Web Makes Users Happy
The Evented Web Makes Users Happy
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Context Automation (with video demos)

Editor's Notes

  1. imagine that the dots are Web sites and the user is going from web site to web site to accomplish some task.
  2. existing browsers offer little help with this task Nearly everything we do only involves multiple Web sites, but there’s no help in connecting them.
  3. context is: - relevant data to the Web task - links multiple sites - what the user cares about CA generates a browsing experience that links together formerly disconnected experiences and ven modifies individual sites.
  4. Cookies and sessions are a way of creating context within a single site HTTP is designed to be stateless. Each page stands alone.
  5. Single sign on is an example of cross-site context - single purpose: authentication context - still not leveraging this as we could. Having a single login that works on multiple sites isn’t the same as having a single authentication context for a given Web episode.
  6. TrustWatch is a browser extension that provides a security context for users that uses a could-based service for site verification.
  7. FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  8. FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  9. FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  10. FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  11. - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  12. - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  13. - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  14. - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  15. Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  16. Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  17. Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  18. Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  19. Greasemonkey - scripts on the browser not the cloud
  20. Greasemonkey - scripts on the browser not the cloud
  21. Greasemonkey - scripts on the browser not the cloud
  22. Structure browsing - connects the dots and threads the experience opt-in, user controlled
  23. Structure browsing - connects the dots and threads the experience opt-in, user controlled
  24. Structure browsing - connects the dots and threads the experience opt-in, user controlled
  25. Structure browsing - connects the dots and threads the experience opt-in, user controlled
  26. No one’s ever surprised me with a GUI
  27. No one’s ever surprised me with a GUI
  28. No one’s ever surprised me with a GUI
  29. The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  30. The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  31. The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  32. The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  33. The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  34. The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...