SlideShare uma empresa Scribd logo
1 de 175
Baixar para ler offline
The implications of

          Simon Willison
  Google Tech Talk, 25th June 2007
Who here has used
   OpenID?
Who uses it regularly?
What is OpenID?
OpenID is a
decentralised mechanism
   for Single Sign On
What problems
does it solve?
“Too many passwords!”
“Someone else already
grabbed my username”
“My online profile is
 scattered across
  dozens of sites”
What is an OpenID?
An OpenID is a URL
http://swillison.livejournal.com/
http://simonw.myopenid.com/
http://simonwillison.net/
http://openid.aol.com/simonwillison/
What can you do
with an OpenID?
You can claim
that you own it
You can prove
  that claim
Why is that useful?
You can use it for
 authentication
“Who the heck are you?!”
“I’m simonwillison.net”
“prove it!”
(magic happens)
“OK, you’re in!”
So it’s a bit like
Microsoft Passport,
        then?
Yes, but you don’t need
to ask their permission
    to implement it
And Microsoft
don’t get to own your
      credentials
Who does get to
  own them?
You, the user, decide.
You pick your own provider
(just like e-mail)
So I’m still giving
someone the keys
 to my kingdom?
Yes, but it can be
someone you trust
If you have the ability to
  run your own server
 software, you can do it
       for yourself.
OK, how do I use it?
Implications Of OpenID (Google Tech Talk)
Implications Of OpenID (Google Tech Talk)
Implications Of OpenID (Google Tech Talk)
Implications Of OpenID (Google Tech Talk)
Implications Of OpenID (Google Tech Talk)
So my users don’t
have to sign up for an
      account?
Not necessarily
An OpenID tells you
very little about a user
You don’t know
  their name
You don’t know
their e-mail address
You don’t know
if they’re a person
  or an evil robot
(or a dog)
Where do I get that
information from?
You ask them!
OpenID can even help
   them answer
Implications Of OpenID (Google Tech Talk)
Implications Of OpenID (Google Tech Talk)
Implications Of OpenID (Google Tech Talk)
Implications Of OpenID (Google Tech Talk)
How can I tell if they’re
  an evil spambot?
Same as usual: challenge
them with a CAPTCHA
So how does OpenID
    actually work?
Implications Of OpenID (Google Tech Talk)
Implications Of OpenID (Google Tech Talk)
<link rel=quot;openid.serverquot;
 href=quot;http://www.myopenid.com/serverquot; />
“I’m simonwillison.myopenid.com”
Site fetches HTML,
discovers identity provider
Establishes shared secret
 with identity provider
   (Using Diffie-Hellman key exchange)
Redirects you to the
 identity provider
If you’re logged in there,
you get redirected back
How does my identity
provider know who I am?
OpenID deliberately
  doesn’t specify
username/password
    is common
But providers can
use other methods if
    they want to
Client SSL certificates
Out of band
authentication via SMS,
   e-mail or Jabber
IP based login
 restrictions
(one guy set that up
  using DynDNS)
SecurID keyfobs
No authentication at all
   (just say “Yes”)
Just say “yes”?
Yup. That’s the OpenID
version of bugmenot.com
http://www.jkg.in/openid/
Users can give away
their passwords today -
this is just the OpenID
        equivalent
What if I decide I
hate my provider?
Use your own
domain name
Delegate to a
provider you trust
Implications Of OpenID (Google Tech Talk)
Implications Of OpenID (Google Tech Talk)
<link rel=quot;openid.serverquot;
 href=quot;http://www.livejournal.com/openid/server.bmlquot;>
<link rel=quot;openid.delegatequot;
 href=quot;http://swillison.livejournal.com/quot;>
Support for delegation
  is compulsory
This minimises lock in
So everyone will end up
 with one OpenID that
they use for everything?
Probably not
(I have half a dozen
 OpenIDs already)
People like maintaining
multiple online personas
professional
   social
   secret
     ...
OpenID makes it easier
 to manage multiple
   online personas
Three accounts is still
better than three dozen
If an OpenID is just a URL, is
there anything else interesting
       you can do with it?
Yes. Different OpenIDs can
  express different things
My AOL OpenID proves
 my AIM screen name
An OpenID from
 sun.com proves that
someone is a current
    Sun employee
A last.fm OpenID
could incorporate
my taste in music
My LiveJournal OpenID
tells you where to find
        my blog
... and a FOAF file
 listing my friends
doxory.com uses this
 for contact imports
Why is OpenID worth
implementing over all the
 other identity standards?
It’s simple
Unix philosophy:
 It solves one,
 tiny problem
It’s a dumb network
Many of the competing
standards are now on
        board
Isn’t putting all my
eggs in one basket
 a really bad idea?
Bad news: chances are
   you already do
“I forgot my password”
   means your e-mail
 account is already an
    SSO mechanism
OpenID just makes this
 a bit more obvious
What about phishing?
Phishing is a problem
I can has lolcats!?                          BETA


Make your own lolcats! lol
Sign in with your OpenID:
OpenID:                                  Sign in




                    http://icanhascheezburger.com/2007/05/16/i-has-a-backpack/
Fake edition
Your identity provider
Username and password, please!
 Username:
 Password:
                         Log in
Identity theft :(
An untrusted site
redirects you to your
  trusted provider
Sound familiar?
PayPal
 Yahoo! BBAuth
  Google Auth
Google Checkout
You guys already need
to solve that problem!
One solution: don’t let
the user log in on the
  identity provider
    “landing page”
Implications Of OpenID (Google Tech Talk)
Better solutions
CardSpace
Native browser support
for OpenID (e.g. SeatBelt)
Competition between
    providers
Permanent cookie set
using out-of-band token
Best practices for
OpenID consumers?
“I forgot my password”
becomes “I can’t sign in
    with my OpenID”
Allow multiple OpenIDs
to be associated with a
     single account
People can still sign
  in if one of their
 providers is down
People can un-associate
  an OpenID without
locking themselves out
You can take advantage
of site-specific services
 around each of their
        OpenIDs
Any other neat tricks?
Portable contact lists
Facebook (and others)
  currently ask for the
user’s Google username
      and password
I don’t need to tell you
why that’s a horrible idea
Lightweight accounts
Pre-approved accounts
Social whitelists
OpenID and
microformats
Decentralised social
    networks?
“People keep asking me to join
 the LinkedIn network, but I’m
 already part of a network, it’s
      called the Internet.”
     Gary McGraw, via Jon Udell, via Gavin Bell
Doesn’t this outsource the
 security of my users to
 untrusted third parties?
Yes it does. But...
... so do “forgotten
password” e-mails!
If e-mail is secure
enough for your user’s
 authentication, so is
       OpenID
Password e-mails are
essentially SSO with a
deliberately bad user
     experience
What are the privacy
  implications?
Cross correlation of
     accounts
Don’t publish a user’s
OpenID without making
it clear that you’re going
        to do that
Allow users to opt-out
of sharing their OpenID
The online equivalent of a
 credit reporting agency?
This could be built today
  by sites conspiring to
 share e-mail addresses
IANAL, but legal
protections against this
     already exist
“Directed identity” in
 OpenID 2.0 makes it
easy to use a different
OpenID for every site
Patents?
Sun and VeriSign have
  both announced
 “patent covenants”
They won’t smack you
down with their patents
 for using OpenID 1.1
They will smack down
 anyone else who asserts
their own patents against
        OpenID
Who else is involved?
(Slide borrowed from David Recordon)
AOL - provider, full
consumer by end of July
Microsoft: Bill Gates
expressed their interest
 at the RSA conference
(mainly as good PR
 for CardSpace?)
Sun: Patent Covenant,
  33,000 employees
Six Apart
VeriSign
JanRain
Yahoo! - indirectly
Implications Of OpenID (Google Tech Talk)
Google?
http://openid.net/

  http://www.openidenabled.com/

http://simonwillison.net/tags/openid/
Thank you

Mais conteúdo relacionado

Destaque

The Open, Social Web
The Open, Social WebThe Open, Social Web
The Open, Social WebChris Messina
 
OpenID Foundation Retail Advisory Committee Webinar
OpenID Foundation Retail Advisory Committee WebinarOpenID Foundation Retail Advisory Committee Webinar
OpenID Foundation Retail Advisory Committee WebinarMatterport
 
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009Jyri Engeström
 
Web 2.0 Expo Berlin: OpenID Emerging from Web 2.0
Web 2.0 Expo Berlin: OpenID Emerging from Web 2.0Web 2.0 Expo Berlin: OpenID Emerging from Web 2.0
Web 2.0 Expo Berlin: OpenID Emerging from Web 2.0David Recordon
 
Implementing OpenID
Implementing OpenIDImplementing OpenID
Implementing OpenIDUri Levanon
 
Stateless Auth using OAUTH2 & JWT
Stateless Auth using OAUTH2 & JWTStateless Auth using OAUTH2 & JWT
Stateless Auth using OAUTH2 & JWTMobiliya
 
JWT Authentication with AngularJS
JWT Authentication with AngularJSJWT Authentication with AngularJS
JWT Authentication with AngularJSrobertjd
 
Performance Implications of Mobile Design
Performance Implications of Mobile DesignPerformance Implications of Mobile Design
Performance Implications of Mobile DesignGuy Podjarny
 
Coding on the Shoulders of Giants
Coding on the Shoulders of GiantsCoding on the Shoulders of Giants
Coding on the Shoulders of GiantsMatt Biddulph
 
OpenID Authentication by example
OpenID Authentication by exampleOpenID Authentication by example
OpenID Authentication by exampleChris Vertonghen
 
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry BuzdinModern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry BuzdinJava User Group Latvia
 
Gerer son identite numerique et surveiller sa e-reputation à l'heure du Web 2.0
Gerer son identite numerique et surveiller sa e-reputation à l'heure du Web 2.0Gerer son identite numerique et surveiller sa e-reputation à l'heure du Web 2.0
Gerer son identite numerique et surveiller sa e-reputation à l'heure du Web 2.0Emilie Marquois
 
Microservices for the Masses with Spring Boot, JHipster, and JWT - Rich Web 2016
Microservices for the Masses with Spring Boot, JHipster, and JWT - Rich Web 2016Microservices for the Masses with Spring Boot, JHipster, and JWT - Rich Web 2016
Microservices for the Masses with Spring Boot, JHipster, and JWT - Rich Web 2016Matt Raible
 
"What Users Want from Mobile - A study of consumers’ mobile web and applicati...
"What Users Want from Mobile - A study of consumers’ mobile web and applicati..."What Users Want from Mobile - A study of consumers’ mobile web and applicati...
"What Users Want from Mobile - A study of consumers’ mobile web and applicati...Compuware APM
 
SXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksSXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksCharlene Li
 
OpenID Connect: An Overview
OpenID Connect: An OverviewOpenID Connect: An Overview
OpenID Connect: An OverviewPat Patterson
 
Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015Alvaro Sanchez-Mariscal
 
Importance of Mobile Applications
Importance of Mobile ApplicationsImportance of Mobile Applications
Importance of Mobile ApplicationsFutuready Media
 

Destaque (20)

The Open, Social Web
The Open, Social WebThe Open, Social Web
The Open, Social Web
 
OpenID Foundation Retail Advisory Committee Webinar
OpenID Foundation Retail Advisory Committee WebinarOpenID Foundation Retail Advisory Committee Webinar
OpenID Foundation Retail Advisory Committee Webinar
 
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
 
Web 2.0 Expo Berlin: OpenID Emerging from Web 2.0
Web 2.0 Expo Berlin: OpenID Emerging from Web 2.0Web 2.0 Expo Berlin: OpenID Emerging from Web 2.0
Web 2.0 Expo Berlin: OpenID Emerging from Web 2.0
 
JWT Agile Framework
JWT Agile FrameworkJWT Agile Framework
JWT Agile Framework
 
Implementing OpenID
Implementing OpenIDImplementing OpenID
Implementing OpenID
 
Stateless Auth using OAUTH2 & JWT
Stateless Auth using OAUTH2 & JWTStateless Auth using OAUTH2 & JWT
Stateless Auth using OAUTH2 & JWT
 
CRMpartners_Complete
CRMpartners_CompleteCRMpartners_Complete
CRMpartners_Complete
 
JWT Authentication with AngularJS
JWT Authentication with AngularJSJWT Authentication with AngularJS
JWT Authentication with AngularJS
 
Performance Implications of Mobile Design
Performance Implications of Mobile DesignPerformance Implications of Mobile Design
Performance Implications of Mobile Design
 
Coding on the Shoulders of Giants
Coding on the Shoulders of GiantsCoding on the Shoulders of Giants
Coding on the Shoulders of Giants
 
OpenID Authentication by example
OpenID Authentication by exampleOpenID Authentication by example
OpenID Authentication by example
 
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry BuzdinModern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
 
Gerer son identite numerique et surveiller sa e-reputation à l'heure du Web 2.0
Gerer son identite numerique et surveiller sa e-reputation à l'heure du Web 2.0Gerer son identite numerique et surveiller sa e-reputation à l'heure du Web 2.0
Gerer son identite numerique et surveiller sa e-reputation à l'heure du Web 2.0
 
Microservices for the Masses with Spring Boot, JHipster, and JWT - Rich Web 2016
Microservices for the Masses with Spring Boot, JHipster, and JWT - Rich Web 2016Microservices for the Masses with Spring Boot, JHipster, and JWT - Rich Web 2016
Microservices for the Masses with Spring Boot, JHipster, and JWT - Rich Web 2016
 
"What Users Want from Mobile - A study of consumers’ mobile web and applicati...
"What Users Want from Mobile - A study of consumers’ mobile web and applicati..."What Users Want from Mobile - A study of consumers’ mobile web and applicati...
"What Users Want from Mobile - A study of consumers’ mobile web and applicati...
 
SXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksSXSW09: The Future Of Social Networks
SXSW09: The Future Of Social Networks
 
OpenID Connect: An Overview
OpenID Connect: An OverviewOpenID Connect: An Overview
OpenID Connect: An Overview
 
Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015
 
Importance of Mobile Applications
Importance of Mobile ApplicationsImportance of Mobile Applications
Importance of Mobile Applications
 

Semelhante a Implications Of OpenID (Google Tech Talk)

OpenID and decentralised social networks
OpenID and decentralised social networksOpenID and decentralised social networks
OpenID and decentralised social networksSimon Willison
 
Identity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric IdentityIdentity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric IdentityMartin Strandbygaard
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityChristian Heilmann
 
openid-pres
openid-presopenid-pres
openid-presxlight
 
FOSSwire3 + OpenID
FOSSwire3 + OpenIDFOSSwire3 + OpenID
FOSSwire3 + OpenIDcvanp
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterIT-oLogy
 
social engineering
social engineeringsocial engineering
social engineeringHarri Levo
 
Open id & OAuth
Open id & OAuthOpen id & OAuth
Open id & OAuthPaul Fryer
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
OpenID: An Executive Briefing
OpenID: An Executive BriefingOpenID: An Executive Briefing
OpenID: An Executive BriefingDavid Leip
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
 
Web site sign-on using VeriSign PIP
Web site sign-on using VeriSign PIP Web site sign-on using VeriSign PIP
Web site sign-on using VeriSign PIP clive boulton
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and ConcernsPINT Inc
 

Semelhante a Implications Of OpenID (Google Tech Talk) (20)

OpenID and decentralised social networks
OpenID and decentralised social networksOpenID and decentralised social networks
OpenID and decentralised social networks
 
Identity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric IdentityIdentity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric Identity
 
Open ID
Open IDOpen ID
Open ID
 
Identity toolkit
Identity toolkitIdentity toolkit
Identity toolkit
 
Risks With OpenID
Risks With OpenIDRisks With OpenID
Risks With OpenID
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
openid-pres
openid-presopenid-pres
openid-pres
 
FOSSwire3 + OpenID
FOSSwire3 + OpenIDFOSSwire3 + OpenID
FOSSwire3 + OpenID
 
Openid Fossconf
Openid FossconfOpenid Fossconf
Openid Fossconf
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
 
social engineering
social engineeringsocial engineering
social engineering
 
Open id & OAuth
Open id & OAuthOpen id & OAuth
Open id & OAuth
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
OpenID: An Executive Briefing
OpenID: An Executive BriefingOpenID: An Executive Briefing
OpenID: An Executive Briefing
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Web site sign-on using VeriSign PIP
Web site sign-on using VeriSign PIP Web site sign-on using VeriSign PIP
Web site sign-on using VeriSign PIP
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 

Mais de Simon Willison

Cheap tricks for startups
Cheap tricks for startupsCheap tricks for startups
Cheap tricks for startupsSimon Willison
 
The Django Web Framework (EuroPython 2006)
The Django Web Framework (EuroPython 2006)The Django Web Framework (EuroPython 2006)
The Django Web Framework (EuroPython 2006)Simon Willison
 
How we bootstrapped Lanyrd using Twitter's social graph
How we bootstrapped Lanyrd using Twitter's social graphHow we bootstrapped Lanyrd using Twitter's social graph
How we bootstrapped Lanyrd using Twitter's social graphSimon Willison
 
Web Services for Fun and Profit
Web Services for Fun and ProfitWeb Services for Fun and Profit
Web Services for Fun and ProfitSimon Willison
 
Tricks & challenges developing a large Django application
Tricks & challenges developing a large Django applicationTricks & challenges developing a large Django application
Tricks & challenges developing a large Django applicationSimon Willison
 
Advanced Aspects of the Django Ecosystem: Haystack, Celery & Fabric
Advanced Aspects of the Django Ecosystem: Haystack, Celery & FabricAdvanced Aspects of the Django Ecosystem: Haystack, Celery & Fabric
Advanced Aspects of the Django Ecosystem: Haystack, Celery & FabricSimon Willison
 
How Lanyrd uses Twitter
How Lanyrd uses TwitterHow Lanyrd uses Twitter
How Lanyrd uses TwitterSimon Willison
 
Building Things Fast - and getting approval
Building Things Fast - and getting approvalBuilding Things Fast - and getting approval
Building Things Fast - and getting approvalSimon Willison
 
Rediscovering JavaScript: The Language Behind The Libraries
Rediscovering JavaScript: The Language Behind The LibrariesRediscovering JavaScript: The Language Behind The Libraries
Rediscovering JavaScript: The Language Behind The LibrariesSimon Willison
 
Building crowdsourcing applications
Building crowdsourcing applicationsBuilding crowdsourcing applications
Building crowdsourcing applicationsSimon Willison
 
Evented I/O based web servers, explained using bunnies
Evented I/O based web servers, explained using bunniesEvented I/O based web servers, explained using bunnies
Evented I/O based web servers, explained using bunniesSimon Willison
 
Cowboy development with Django
Cowboy development with DjangoCowboy development with Django
Cowboy development with DjangoSimon Willison
 
Crowdsourcing with Django
Crowdsourcing with DjangoCrowdsourcing with Django
Crowdsourcing with DjangoSimon Willison
 
Class-based views with Django
Class-based views with DjangoClass-based views with Django
Class-based views with DjangoSimon Willison
 
Web App Security Horror Stories
Web App Security Horror StoriesWeb App Security Horror Stories
Web App Security Horror StoriesSimon Willison
 
Web Security Horror Stories
Web Security Horror StoriesWeb Security Horror Stories
Web Security Horror StoriesSimon Willison
 

Mais de Simon Willison (20)

How Lanyrd does Geo
How Lanyrd does GeoHow Lanyrd does Geo
How Lanyrd does Geo
 
Cheap tricks for startups
Cheap tricks for startupsCheap tricks for startups
Cheap tricks for startups
 
The Django Web Framework (EuroPython 2006)
The Django Web Framework (EuroPython 2006)The Django Web Framework (EuroPython 2006)
The Django Web Framework (EuroPython 2006)
 
Building Lanyrd
Building LanyrdBuilding Lanyrd
Building Lanyrd
 
How we bootstrapped Lanyrd using Twitter's social graph
How we bootstrapped Lanyrd using Twitter's social graphHow we bootstrapped Lanyrd using Twitter's social graph
How we bootstrapped Lanyrd using Twitter's social graph
 
Web Services for Fun and Profit
Web Services for Fun and ProfitWeb Services for Fun and Profit
Web Services for Fun and Profit
 
Tricks & challenges developing a large Django application
Tricks & challenges developing a large Django applicationTricks & challenges developing a large Django application
Tricks & challenges developing a large Django application
 
Advanced Aspects of the Django Ecosystem: Haystack, Celery & Fabric
Advanced Aspects of the Django Ecosystem: Haystack, Celery & FabricAdvanced Aspects of the Django Ecosystem: Haystack, Celery & Fabric
Advanced Aspects of the Django Ecosystem: Haystack, Celery & Fabric
 
How Lanyrd uses Twitter
How Lanyrd uses TwitterHow Lanyrd uses Twitter
How Lanyrd uses Twitter
 
ScaleFail
ScaleFailScaleFail
ScaleFail
 
Building Things Fast - and getting approval
Building Things Fast - and getting approvalBuilding Things Fast - and getting approval
Building Things Fast - and getting approval
 
Rediscovering JavaScript: The Language Behind The Libraries
Rediscovering JavaScript: The Language Behind The LibrariesRediscovering JavaScript: The Language Behind The Libraries
Rediscovering JavaScript: The Language Behind The Libraries
 
Building crowdsourcing applications
Building crowdsourcing applicationsBuilding crowdsourcing applications
Building crowdsourcing applications
 
Evented I/O based web servers, explained using bunnies
Evented I/O based web servers, explained using bunniesEvented I/O based web servers, explained using bunnies
Evented I/O based web servers, explained using bunnies
 
Cowboy development with Django
Cowboy development with DjangoCowboy development with Django
Cowboy development with Django
 
Crowdsourcing with Django
Crowdsourcing with DjangoCrowdsourcing with Django
Crowdsourcing with Django
 
Django Heresies
Django HeresiesDjango Heresies
Django Heresies
 
Class-based views with Django
Class-based views with DjangoClass-based views with Django
Class-based views with Django
 
Web App Security Horror Stories
Web App Security Horror StoriesWeb App Security Horror Stories
Web App Security Horror Stories
 
Web Security Horror Stories
Web Security Horror StoriesWeb Security Horror Stories
Web Security Horror Stories
 

Último

Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 

Último (20)

20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 

Implications Of OpenID (Google Tech Talk)