SlideShare uma empresa Scribd logo
1 de 71
 
By trodel,http://www.flickr.com/photos/trodel/3598488389
By yakobusan, http://www.flickr.com/photos/yakobusan/2436481628
By toehk, http://www.flickr.com/photos/toehk/3396501023
By frankyu, http://www.flickr.com/photos/frankyu/4595537936
 
 
#security
By Joi
 
By ralpe,http://www.flickr.com/photos/ralpe/3451402574
#privacy
 
 
 
#centralized
 
 
“ It would be very dangerous for anyone to be relying 100% on Twitter.” #choice
 
 
 
unlimited.status.net Petstatus.net 1.status.net Shitmydadsays.com evan.status.net rejon.status.net Identi.ca mozilla.status.net
a
#AGPL
 
#StatusNetPlugins
 
APIs are  NOT  Open. They are  FAUXpen .
 
=+
Google buzz Facebook Foursquare Twitter appleseed rejon.status.net Diaspora IDEAL
5 Billion People!
 
Blogging Standards
 
ActivityStreams
ActivityStreams
PubSubHubbub
Salmon
Webfinger
federatedsocialweb.net
 
 
 
Social Web Acid Test 0
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
TODO4U :) Implement  OStatus . Take the  SWAT0  Challenge.
HOWTO Enable OStatus ,[object Object]
PuSH-enable your feeds.
Provide Webfinger identities.
Model remote users.

Mais conteúdo relacionado

Mais procurados

Hands-on Experiences in Web Storytelling
Hands-on Experiences in Web StorytellingHands-on Experiences in Web Storytelling
Hands-on Experiences in Web Storytelling
Alan Levine
 
Web search and_evaluation-1
Web search and_evaluation-1Web search and_evaluation-1
Web search and_evaluation-1
mcrainwater
 
Digital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient TweetsDigital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient Tweets
martin255
 
5 resources for guide to the perplexed weadership te_dx2
5 resources for guide to the perplexed weadership te_dx25 resources for guide to the perplexed weadership te_dx2
5 resources for guide to the perplexed weadership te_dx2
Kristin Wolff
 

Mais procurados (20)

Connecting with Your Customers
Connecting with Your CustomersConnecting with Your Customers
Connecting with Your Customers
 
Hands-on Experiences in Web Storytelling
Hands-on Experiences in Web StorytellingHands-on Experiences in Web Storytelling
Hands-on Experiences in Web Storytelling
 
Being There...@ Maricopa
Being There...@ MaricopaBeing There...@ Maricopa
Being There...@ Maricopa
 
51 Blogging Communities For Getting Your Blog Discovered
51 Blogging Communities For Getting Your Blog Discovered51 Blogging Communities For Getting Your Blog Discovered
51 Blogging Communities For Getting Your Blog Discovered
 
Banish Your Inner Critic: Amplify Your Impact - Mind The Product SF 2019
Banish Your Inner Critic: Amplify Your Impact - Mind The Product SF 2019Banish Your Inner Critic: Amplify Your Impact - Mind The Product SF 2019
Banish Your Inner Critic: Amplify Your Impact - Mind The Product SF 2019
 
Location ... It's Moving On
Location ... It's Moving OnLocation ... It's Moving On
Location ... It's Moving On
 
Location & Privacy; from OMG! to WTF?
Location & Privacy; from OMG! to WTF?Location & Privacy; from OMG! to WTF?
Location & Privacy; from OMG! to WTF?
 
Moving LBS Beyond Mobile
Moving LBS Beyond MobileMoving LBS Beyond Mobile
Moving LBS Beyond Mobile
 
Brady Forrest, Ignite
Brady Forrest, IgniteBrady Forrest, Ignite
Brady Forrest, Ignite
 
Enquire Within Upon Everything
Enquire Within Upon EverythingEnquire Within Upon Everything
Enquire Within Upon Everything
 
Presentation on Web Standards and Open Data
Presentation on Web Standards and Open DataPresentation on Web Standards and Open Data
Presentation on Web Standards and Open Data
 
Composition Rules
Composition RulesComposition Rules
Composition Rules
 
Web search and_evaluation-1
Web search and_evaluation-1Web search and_evaluation-1
Web search and_evaluation-1
 
Luke's Prosthetics Presentation, 5th
Luke's Prosthetics Presentation, 5thLuke's Prosthetics Presentation, 5th
Luke's Prosthetics Presentation, 5th
 
Digital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient TweetsDigital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient Tweets
 
5 resources for guide to the perplexed weadership te_dx2
5 resources for guide to the perplexed weadership te_dx25 resources for guide to the perplexed weadership te_dx2
5 resources for guide to the perplexed weadership te_dx2
 
Making Good Use of Your Company's Story
Making Good Use of Your Company's StoryMaking Good Use of Your Company's Story
Making Good Use of Your Company's Story
 
Haris Alisic, social media expert, Al Jazeera Balkans
Haris Alisic, social media expert, Al Jazeera BalkansHaris Alisic, social media expert, Al Jazeera Balkans
Haris Alisic, social media expert, Al Jazeera Balkans
 
Uutisraivaaja Open Source -esitys
Uutisraivaaja Open Source -esitysUutisraivaaja Open Source -esitys
Uutisraivaaja Open Source -esitys
 
Build Engagement, Not Websites: Part Two (the Execution)
Build Engagement, Not Websites: Part Two (the Execution)Build Engagement, Not Websites: Part Two (the Execution)
Build Engagement, Not Websites: Part Two (the Execution)
 

Semelhante a Connecting the Open Social Web with OStatus (#FOWA2010)

Disease Presentation
Disease PresentationDisease Presentation
Disease Presentation
16SanjanaS
 
Marketing throughpublishing
Marketing throughpublishingMarketing throughpublishing
Marketing throughpublishing
Rod Paddock
 
Diseases d co
Diseases d coDiseases d co
Diseases d co
16sammyb
 
Thefutureofnpos11 10 11_neff
Thefutureofnpos11 10 11_neffThefutureofnpos11 10 11_neff
Thefutureofnpos11 10 11_neff
Abila
 
Pro Tools vs Logic Pro
Pro Tools vs Logic ProPro Tools vs Logic Pro
Pro Tools vs Logic Pro
chache89
 
Reputation 2.0: Manage Your Online Reputation
Reputation 2.0: Manage Your Online ReputationReputation 2.0: Manage Your Online Reputation
Reputation 2.0: Manage Your Online Reputation
Mohammed Al-Taee
 
M learning
M learningM learning
M learning
lsaladic
 

Semelhante a Connecting the Open Social Web with OStatus (#FOWA2010) (20)

iCrocco
iCroccoiCrocco
iCrocco
 
Disease Presentation
Disease PresentationDisease Presentation
Disease Presentation
 
Anderson_Jamar_IgniteSlideShare
Anderson_Jamar_IgniteSlideShareAnderson_Jamar_IgniteSlideShare
Anderson_Jamar_IgniteSlideShare
 
Social Media Club - The Future of Nonprofits
Social Media Club - The Future of NonprofitsSocial Media Club - The Future of Nonprofits
Social Media Club - The Future of Nonprofits
 
Marketing throughpublishing
Marketing throughpublishingMarketing throughpublishing
Marketing throughpublishing
 
Re:build 2011: Passion -> Startup
Re:build 2011: Passion -> StartupRe:build 2011: Passion -> Startup
Re:build 2011: Passion -> Startup
 
Diseases d co
Diseases d coDiseases d co
Diseases d co
 
Thefutureofnpos11 10 11_neff
Thefutureofnpos11 10 11_neffThefutureofnpos11 10 11_neff
Thefutureofnpos11 10 11_neff
 
Artez Keynote on The Future of Fundraising
Artez Keynote on The Future of FundraisingArtez Keynote on The Future of Fundraising
Artez Keynote on The Future of Fundraising
 
The Future of Nonprofits : SXSW Presentation
The Future of Nonprofits : SXSW PresentationThe Future of Nonprofits : SXSW Presentation
The Future of Nonprofits : SXSW Presentation
 
The iGeneration & Identity
The iGeneration & IdentityThe iGeneration & Identity
The iGeneration & Identity
 
Pro Tools vs Logic Pro
Pro Tools vs Logic ProPro Tools vs Logic Pro
Pro Tools vs Logic Pro
 
Reputation 2.0: Manage Your Online Reputation
Reputation 2.0: Manage Your Online ReputationReputation 2.0: Manage Your Online Reputation
Reputation 2.0: Manage Your Online Reputation
 
Getting data "hackday ready".
Getting data "hackday ready".Getting data "hackday ready".
Getting data "hackday ready".
 
Scrum of scrums is a bluff! How to scale scrum and survive.
Scrum of scrums is a bluff! How to scale scrum and survive. Scrum of scrums is a bluff! How to scale scrum and survive.
Scrum of scrums is a bluff! How to scale scrum and survive.
 
M learning
M learningM learning
M learning
 
Science Vocabulary
Science VocabularyScience Vocabulary
Science Vocabulary
 
Tots Too Hot : The Good, The Bad and the Ugly of Pediatric Fever
Tots Too Hot : The Good, The Bad and the Ugly of Pediatric FeverTots Too Hot : The Good, The Bad and the Ugly of Pediatric Fever
Tots Too Hot : The Good, The Bad and the Ugly of Pediatric Fever
 
M learning
M learningM learning
M learning
 
The Impact of Technology on Dementia Care Services
The Impact of Technology on Dementia Care ServicesThe Impact of Technology on Dementia Care Services
The Impact of Technology on Dementia Care Services
 

Mais de Jon Phillips

Mais de Jon Phillips (20)

Aiki Framework in 32 Slides
Aiki Framework in 32 SlidesAiki Framework in 32 Slides
Aiki Framework in 32 Slides
 
Aiki Framework in 32 Slides
Aiki Framework in 32 SlidesAiki Framework in 32 Slides
Aiki Framework in 32 Slides
 
Sharism and the Freedom Stack
Sharism and the Freedom StackSharism and the Freedom Stack
Sharism and the Freedom Stack
 
Statusnet bwe2010 Short Slides for non-profits
Statusnet bwe2010 Short Slides for non-profitsStatusnet bwe2010 Short Slides for non-profits
Statusnet bwe2010 Short Slides for non-profits
 
Sharism: The more you share, the more you receive...
Sharism: The more you share, the more you receive...Sharism: The more you share, the more you receive...
Sharism: The more you share, the more you receive...
 
Building an Autonomous Federated Social Web: OStatus, Status.Net, and Identi....
Building an Autonomous Federated Social Web: OStatus, Status.Net, and Identi....Building an Autonomous Federated Social Web: OStatus, Status.Net, and Identi....
Building an Autonomous Federated Social Web: OStatus, Status.Net, and Identi....
 
Openclipart + Aiki Framework Lightning Talk 1.0
Openclipart + Aiki Framework Lightning Talk 1.0Openclipart + Aiki Framework Lightning Talk 1.0
Openclipart + Aiki Framework Lightning Talk 1.0
 
Openclipart + Aiki Framework Lightning Talk 1.0
Openclipart + Aiki Framework Lightning Talk 1.0Openclipart + Aiki Framework Lightning Talk 1.0
Openclipart + Aiki Framework Lightning Talk 1.0
 
Sharism: Banking on Sharing, The New Economy Pays
Sharism: Banking on Sharing, The New Economy PaysSharism: Banking on Sharing, The New Economy Pays
Sharism: Banking on Sharing, The New Economy Pays
 
StatusNet Love You!
StatusNet Love You!StatusNet Love You!
StatusNet Love You!
 
What's Your StatusNet? (Can you copyright a Tweet SXSW2010 panel) 2.1
What's Your StatusNet? (Can you copyright a Tweet SXSW2010 panel) 2.1What's Your StatusNet? (Can you copyright a Tweet SXSW2010 panel) 2.1
What's Your StatusNet? (Can you copyright a Tweet SXSW2010 panel) 2.1
 
Whats Your Status Net 2.0 (Updates like Identi.ca)
Whats Your Status Net 2.0 (Updates like Identi.ca)Whats Your Status Net 2.0 (Updates like Identi.ca)
Whats Your Status Net 2.0 (Updates like Identi.ca)
 
Open Font Web 1.0
Open Font Web 1.0Open Font Web 1.0
Open Font Web 1.0
 
What's Your StatusNet? Lightning Talk 1.0
What's Your StatusNet? Lightning Talk 1.0What's Your StatusNet? Lightning Talk 1.0
What's Your StatusNet? Lightning Talk 1.0
 
Shanzhai vs. Qi Inside: Making Legal Open Source Hardware in China
Shanzhai vs. Qi Inside: Making Legal Open Source Hardware in ChinaShanzhai vs. Qi Inside: Making Legal Open Source Hardware in China
Shanzhai vs. Qi Inside: Making Legal Open Source Hardware in China
 
Creative Commons Casestudies, Featuring Status.Net
Creative Commons Casestudies, Featuring Status.NetCreative Commons Casestudies, Featuring Status.Net
Creative Commons Casestudies, Featuring Status.Net
 
What's Your StatusNet? Updates like Identi.ca
What's Your StatusNet? Updates like Identi.caWhat's Your StatusNet? Updates like Identi.ca
What's Your StatusNet? Updates like Identi.ca
 
Overlap Salon Melbourne 2009 Light
Overlap Salon Melbourne 2009 LightOverlap Salon Melbourne 2009 Light
Overlap Salon Melbourne 2009 Light
 
Laoban Speaker Workshop Melbourne 2009 Light
Laoban Speaker Workshop Melbourne 2009 LightLaoban Speaker Workshop Melbourne 2009 Light
Laoban Speaker Workshop Melbourne 2009 Light
 
Making Computing Real
Making Computing RealMaking Computing Real
Making Computing Real
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Connecting the Open Social Web with OStatus (#FOWA2010)

Notas do Editor

  1. On January 12, 2010, Google announced that it was "no longer willing to continue censoring" results on Google.cn, citing a breach of Gmail accounts of Chinese human rights activists. The company found that the hackers had breached two Gmail accounts but were only able to access 'from' and 'to' information and subject headers of emails in these accounts.[29] The company's investigation into the attack showed that at least 34 other companies had been similarly targeted. Among the companies that were attacked were Adobe Systems, Symantec, Yahoo, Northrop Grumman and Dow Chemical. Experts claim the aim of the attacks was to gain information on weapon systems, political dissidents, and valuable source code that powers software applications.[30] Additionally, dozens of Gmail accounts in China, Europe, and the United States had been regularly accessed by third parties, due to phishing or malware on the users' computers rather than a security breach at Google. Although Google did not explicitly accuse the Chinese government of the breach, it said it was no longer willing to censor results on google.cn, and that it will discuss over the next few weeks "the basis on which we could run an unfiltered search engine within the law, if at all. We recognize that this may well mean having to shut down Google.cn, and potentially our offices in China."[31][32] Google.cn transiently turned off its search result filtering. However, the filtering was later re-enabled without any acknowledgment or explanation; search queries in Chinese on the keywords Tiananmen or June 4, 1989 returned censored results with the standard censorship footnote.[33] On January 13, 2010, the news agency AHN reported that the U.S. Congress plans to investigate Google's allegations that the Chinese government used the company's service to spy on human rights activists.[34] In a major speech by the US Secretary of State Hillary Clinton, analogies were drawn between the Berlin Wall and the free and unfree Internet.[35] Chinese articles came back saying that the U.S. uses the internet as a means to create worldwide hegemony based on western values. [36] The issue of Google's changed policy toward China has been cited as a potentially major development in world affairs, marking a split between authoritarian capitalism and the Western model of free capitalism and Internet access.[37] The Chinese government has since made numerous standard and general statements on the matter, but has taken no real actions. It also criticized Google for failing to provide any evidence of its accusation.[38] Accusations were made by Baidu, a Chinese search engine with close ties to the government, that Google was pulling out for financial rather than humanitarian reasons. Baidu is the market leader in China with about 60% of the market share compared to Google's 31%, Yahoo placing third with less than 10%.[39] The state-run China Daily published a scathing op-ed on Google which criticized western leaders for politicizing the way in which China controls citizen's access to the Internet, saying "implementing monitoring according to a country's national context is what any government has to do," and that China's need to censor the internet is greater than that of developed countries, "The Chinese society has generally less information bearing capacity than developed countries such as the U.S. ..."[40]
  2. Twitter goes down Send out an email to launch CC, RWW, TechCrunch, Slashdot, Mashable, Winer 10K users in 36 hours