SlideShare uma empresa Scribd logo
1 de 36
The Future of Using Money

Jonathan LeBlanc (@jcleblanc)
Head of Developer Evangelism
PayPal North America
Physical Shopping
Bluetooth Low Energy (BLE)
Bluetooth vs. BLE
Maintaining the Connection
Continuous vs. Intermittent

Throughput
0.7–2.1 Mbit/s vs 0.27 Mbit/s

Power Consumption
1 mW vs. 0.01-0.5 mW
A Few Technical Specs
• Range: ~50 meters

• Latency to send data: 3ms
• Connections: >2 billion
• Channels: 40 (3 advertising / 37 data)
• Devices can support both bluetooth and
BLE (dual mode), or just one
Uses for BLE
Connecting the Internet of Things
Things have data, web services want data

State Exposure
• What temperature it currently is
• Your flight is now boarding
• A network connection is now available
Proximity Detection
You have entered a store
A BLE Device Will Connect For…
Sending signed data to a previously
bonded device
Advertising their presence to a device
wanting to connect
Reconnecting asynchronously due to a
local event
How the Technology Works
A transparent bridge from device to IP

Central
Device

Peripheral
Bridge

IP Address
Endpoint
A BLE Use Case

PayPal Beacon
http://paypal.com/beacon
Commerce Identification
Two Facets of Identification
Device and personal
Device

Identity

Personal Identity
Digital Commerce
Digital Device Identification
The Challenges of the Model
Chargebacks and fraud

Copyright owner concerns

Tracking buyers
Device Fingerprinting
https://panopticlick.eff.org/
Browser characteristic

Bits of identifying
information

1 in x browsers with
same characterists

User Agent

12.01

4117.11

Browser Plugin Detail

6.8

111.13

Time Zone

21.6+

3178409

Screen Size / Color Depth

4.56

23.58

System Fonts

21.6+

3178409

Cookies Enabled?

0.44

1.35

Limited Supercookie Test

0.98

1.97
Identity for Personalization
Identity as a Mobile Foundation

Social Login Systems
Lots and Lots of Fake Data
Two Current Auth Specifications
Moving Identity Forward

Using Identity to Remove Login
Identity to Remove Registration
Identity is Mobile Foundation

Personalization for User Shortcuts
23% of customers abandoned carts when
asked to register (Forrester)

…At five questions, the drop-off rate is 2
percent; at 10 questions, 4 percent, and
so on. Only at about question 35 does the
correlation end (Kevin Hale, Wufoo)
Optimists consider that up to a 30% of
ecommerce sales increase is thanks to
cross-selling recommended products
fikobservatory

Personalized Recommendations
Hardware Prototyping
Hardware Toolbox
Arduino
Arduino / Raspberry Pi / Leap Motion / etc.

Rasperry Pi

Leap Motion
Arduino Payments
The Sketch
#include <Bridge.h>
#include <Temboo.h>
#include "TembooAccount.h"
TembooChoreo AcceptPayPalPaymentChoreo;

//invoke temboo client
AcceptPayPalPaymentChoreo.begin();
//temboo account credentials
AcceptPayPalPaymentChoreo.setAccountName(
TEMBOO_ACCOUNT);
AcceptPayPalPaymentChoreo.setAppKeyName(
TEMBOO_APP_KEY_NAME);
AcceptPayPalPaymentChoreo.setAppKey(
TEMBOO_APP_KEY);
AcceptPayPalPaymentChoreo.addInput("ClientID",
"AXrysRDeQOaGFm5UxSgdS7f-b4QTA-nhFmMp");
AcceptPayPalPaymentChoreo.addInput("ClientSecret",
"EHMH6gxjTn9zBocpTnFJoulKaNFprCcc9q7eh");

AcceptPayPalPaymentChoreo.addInput("CancelURL",
"http://www.jcleblanc.com/cancel");
AcceptPayPalPaymentChoreo.addInput("Currency",
"USD");
AcceptPayPalPaymentChoreo.addInput("ReturnURL",
"http://www.jcleblanc.com/return");
AcceptPayPalPaymentChoreo.addInput("Total", "5");
//run payment choreo
AcceptPayPalPaymentChoreo.setChoreo("/Library/
PayPal/Payments/AcceptPayPalPayment");
//run choreo and print to serial
AcceptPayPalPaymentChoreo.run();
while(AcceptPayPalPaymentChoreo.available()){
char c = AcceptPayPalPaymentChoreo.read();
Serial.print(c);
}
AcceptPayPalPaymentChoreo.close();
The End Result
Leap Motion Auctions
Gesture Controlled Auctions
The Future of Commerce
Bluetooth Low Energy
Physical Shopping

Identity and Personalization
Digital Shopping

Hardware Hacks
New Shopping Hardware Tech
Thanks! Questions?
http://www.slideshare.net/jcleblanc

Jonathan LeBlanc (@jcleblanc)
Head of Developer Evangelism
PayPal North America

Mais conteúdo relacionado

Destaque

Trust But Control: Managing Privileges without killing productivity
Trust But Control:  Managing Privileges without killing productivityTrust But Control:  Managing Privileges without killing productivity
Trust But Control: Managing Privileges without killing productivityScott Carlson
 
Creating a User-Centric Mobile Payment Architecture
Creating a User-Centric Mobile Payment ArchitectureCreating a User-Centric Mobile Payment Architecture
Creating a User-Centric Mobile Payment ArchitectureJonathan LeBlanc
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensJonathan LeBlanc
 
The Future of Mobile Payments
The Future of Mobile PaymentsThe Future of Mobile Payments
The Future of Mobile PaymentsJonathan LeBlanc
 

Destaque (6)

Trust But Control: Managing Privileges without killing productivity
Trust But Control:  Managing Privileges without killing productivityTrust But Control:  Managing Privileges without killing productivity
Trust But Control: Managing Privileges without killing productivity
 
Creating a User-Centric Mobile Payment Architecture
Creating a User-Centric Mobile Payment ArchitectureCreating a User-Centric Mobile Payment Architecture
Creating a User-Centric Mobile Payment Architecture
 
ES6 at PayPal
ES6 at PayPalES6 at PayPal
ES6 at PayPal
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web Tokens
 
Hackathon winning pitch
Hackathon winning pitchHackathon winning pitch
Hackathon winning pitch
 
The Future of Mobile Payments
The Future of Mobile PaymentsThe Future of Mobile Payments
The Future of Mobile Payments
 

Semelhante a The Future of Using Money

Kavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_finKavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_finPacSecJP
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Distil Networks
 
Beacon, BLE, and the Future of Commerce
Beacon, BLE, and the Future of CommerceBeacon, BLE, and the Future of Commerce
Beacon, BLE, and the Future of CommerceJonathan LeBlanc
 
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire MSDEVMTL
 
Blockchain project: e-voting system based upon blockchain technology
Blockchain project: e-voting system based upon blockchain technologyBlockchain project: e-voting system based upon blockchain technology
Blockchain project: e-voting system based upon blockchain technologyHarender Singh
 
The Hardware to Web Commerce Revolution
The Hardware to Web Commerce RevolutionThe Hardware to Web Commerce Revolution
The Hardware to Web Commerce RevolutionJonathan LeBlanc
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
How to Quantify the Value of Kafka in Your Organization
How to Quantify the Value of Kafka in Your Organization How to Quantify the Value of Kafka in Your Organization
How to Quantify the Value of Kafka in Your Organization confluent
 
Mobile Banking webinar, December 15, 2010 by Jouk Pleiter
Mobile Banking webinar, December 15, 2010 by Jouk PleiterMobile Banking webinar, December 15, 2010 by Jouk Pleiter
Mobile Banking webinar, December 15, 2010 by Jouk PleiterBackbase
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamInformaticaMarketplace
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentMicrosoft Technet France
 
Hyperledger Blockchain
Hyperledger BlockchainHyperledger Blockchain
Hyperledger BlockchainAfraz Khan
 
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...Online Marketing Summit
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)ecommerce
 
Information System Security Benchmark Dashboards
Information System Security Benchmark DashboardsInformation System Security Benchmark Dashboards
Information System Security Benchmark DashboardsSlideTeam
 
Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Duo Security
 

Semelhante a The Future of Using Money (20)

Kavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_finKavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_fin
 
JAM805 - Beyond the Device
JAM805 -  Beyond the DeviceJAM805 -  Beyond the Device
JAM805 - Beyond the Device
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?
 
Beacon, BLE, and the Future of Commerce
Beacon, BLE, and the Future of CommerceBeacon, BLE, and the Future of Commerce
Beacon, BLE, and the Future of Commerce
 
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
 
Blockchain project: e-voting system based upon blockchain technology
Blockchain project: e-voting system based upon blockchain technologyBlockchain project: e-voting system based upon blockchain technology
Blockchain project: e-voting system based upon blockchain technology
 
The Hardware to Web Commerce Revolution
The Hardware to Web Commerce RevolutionThe Hardware to Web Commerce Revolution
The Hardware to Web Commerce Revolution
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
How to Quantify the Value of Kafka in Your Organization
How to Quantify the Value of Kafka in Your Organization How to Quantify the Value of Kafka in Your Organization
How to Quantify the Value of Kafka in Your Organization
 
Mobile Banking webinar, December 15, 2010 by Jouk Pleiter
Mobile Banking webinar, December 15, 2010 by Jouk PleiterMobile Banking webinar, December 15, 2010 by Jouk Pleiter
Mobile Banking webinar, December 15, 2010 by Jouk Pleiter
 
Io t consumerlogo
Io t consumerlogoIo t consumerlogo
Io t consumerlogo
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data Stream
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligent
 
Hyperledger Blockchain
Hyperledger BlockchainHyperledger Blockchain
Hyperledger Blockchain
 
Digital trends
Digital trendsDigital trends
Digital trends
 
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)
 
Information System Security Benchmark Dashboards
Information System Security Benchmark DashboardsInformation System Security Benchmark Dashboards
Information System Security Benchmark Dashboards
 
Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...
 

Mais de Jonathan LeBlanc

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJonathan LeBlanc
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsJonathan LeBlanc
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessJonathan LeBlanc
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with BoxJonathan LeBlanc
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer WorkshopJonathan LeBlanc
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security PracticesJonathan LeBlanc
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI ElementsJonathan LeBlanc
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingJonathan LeBlanc
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyJonathan LeBlanc
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data SecurityJonathan LeBlanc
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data SecurityJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 

Mais de Jonathan LeBlanc (20)

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the Client
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data Insights
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and Serverless
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with Box
 
Box Platform Overview
Box Platform OverviewBox Platform Overview
Box Platform Overview
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer Workshop
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security Practices
 
Box Authentication Types
Box Authentication TypesBox Authentication Types
Box Authentication Types
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI Elements
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scoping
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments Globally
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data Security
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data Security
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Kill All Passwords
Kill All PasswordsKill All Passwords
Kill All Passwords
 
BattleHack Los Angeles
BattleHack Los Angeles BattleHack Los Angeles
BattleHack Los Angeles
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

The Future of Using Money

Notas do Editor

  1. Uses BlueTooth Low Energy or card reader
  2. - Bluetooth opens up and maintains a connection, sniff mode allows sleeping a device for decrease battery use- Data throughput is not meaningful for BLE since it doesn&apos;t support streamingBLE has a data transfer rate of 1Mbpsboth devices can go to sleep in between transactions
  3. State Exposure:what temperature it currently is,Gate 6a boarding now,Network availableEnable proximity detection (when I&apos;m in the office, car, etc.) and perform some action. For us we determine proximity and check you in to a store
  4. - used for connecting the devices we carry with us (phone, pedometer, body sensors, car to car wheels / tires within a system)- the device works as a transparent pipe from a device (cell phone, etc.) and an ip address- both devices can go to sleep in between transactions
  5. - Person enters store with a BLE enabled device, and they are checked in automatically (if it&apos;s the first visit the app will ask them to check in. If ignored or declined, shop will not get any information about you)- Beacon sends out advertising beacons on a regular basis with a service UUID as well as a few bytes of advertising data.- If the phone understands the UUID (via PP app) it can establish a connection- Beacon maintains an attribute dictionary of requests / responses, and forwards requests it can&apos;t handle to PayPal (as a bridge). This allows it to handle sophisticated queries like getting location data, checking in, whether to auto-check in in the future- When a person comes in range of Beacon, the PP app wakes up, connects to beacon, and requests a beacon token. Beacon selects an unused token from its cache, and sends back a cryptographic nonce &amp; signature, and some metadata- Phone verifies the signature with a public key embedded in the app, and makes a check-in decision based on the metadata- The app encrypts some data for beacon to forward on, uninterpreted, to PP servers. Server decrypts the data and checks in consumer- The server then returns back encrypted message back to beacon, which forwards it back to the app. - App decrypts and verified the response and disconnects from Beacon- Beacon still works in places where cell phones have no network / wireless coverage, because it is in itself a wireless network bridge
  6. Digital Commerce
  7. I started out working at Y! with a lot of auth systems, you might know them better as these things (show buttons)
  8. I started realizing when I would build applications that besides a username, the rest of the info from these people was garbage, because of this… (show picture of a royalfetus profile)We’re in an age where are children have a social footprint before they are ever born…and that’s a much different world than the one I grew up in.
  9. It comes down to the difference between concrete user identity and socialized (curated) identity
  10. Removing the registration form
  11. Personalization allows you to take shortcuts for your users (signups, checkouts, etc.)
  12. Reduce dropoff ratesI’ve seen numbers as high as 71% during registration: http://www.optimizationtoday.com/web-analytics/what-is-abandonment-rate/23% of customers abandoned carts when asked to register (Forrester)…At five questions, the drop-off rate is 2 percent; at 10 questions, 4 percent, and so on. Only at about question 35 does the correlation end (Kevin Hale, Wufoo)
  13. Based onBrowsing habits,Time on page / time of year,LocationRecommendations + targeted advertising
  14. Hand movement up and down controls the bid price