SlideShare a Scribd company logo
1 of 36
The Future of Using Money

Jonathan LeBlanc (@jcleblanc)
Head of Developer Evangelism
PayPal North America
Physical Shopping
Bluetooth Low Energy (BLE)
Bluetooth vs. BLE
Maintaining the Connection
Continuous vs. Intermittent

Throughput
0.7–2.1 Mbit/s vs 0.27 Mbit/s

Power Consumption
1 mW vs. 0.01-0.5 mW
A Few Technical Specs
• Range: ~50 meters

• Latency to send data: 3ms
• Connections: >2 billion
• Channels: 40 (3 advertising / 37 data)
• Devices can support both bluetooth and
BLE (dual mode), or just one
Uses for BLE
Connecting the Internet of Things
Things have data, web services want data

State Exposure
• What temperature it currently is
• Your flight is now boarding
• A network connection is now available
Proximity Detection
You have entered a store
A BLE Device Will Connect For…
Sending signed data to a previously
bonded device
Advertising their presence to a device
wanting to connect
Reconnecting asynchronously due to a
local event
How the Technology Works
A transparent bridge from device to IP

Central
Device

Peripheral
Bridge

IP Address
Endpoint
A BLE Use Case

PayPal Beacon
http://paypal.com/beacon
Commerce Identification
Two Facets of Identification
Device and personal
Device

Identity

Personal Identity
Digital Commerce
Digital Device Identification
The Challenges of the Model
Chargebacks and fraud

Copyright owner concerns

Tracking buyers
Device Fingerprinting
https://panopticlick.eff.org/
Browser characteristic

Bits of identifying
information

1 in x browsers with
same characterists

User Agent

12.01

4117.11

Browser Plugin Detail

6.8

111.13

Time Zone

21.6+

3178409

Screen Size / Color Depth

4.56

23.58

System Fonts

21.6+

3178409

Cookies Enabled?

0.44

1.35

Limited Supercookie Test

0.98

1.97
Identity for Personalization
Identity as a Mobile Foundation

Social Login Systems
Lots and Lots of Fake Data
Two Current Auth Specifications
Moving Identity Forward

Using Identity to Remove Login
Identity to Remove Registration
Identity is Mobile Foundation

Personalization for User Shortcuts
23% of customers abandoned carts when
asked to register (Forrester)

…At five questions, the drop-off rate is 2
percent; at 10 questions, 4 percent, and
so on. Only at about question 35 does the
correlation end (Kevin Hale, Wufoo)
Optimists consider that up to a 30% of
ecommerce sales increase is thanks to
cross-selling recommended products
fikobservatory

Personalized Recommendations
Hardware Prototyping
Hardware Toolbox
Arduino
Arduino / Raspberry Pi / Leap Motion / etc.

Rasperry Pi

Leap Motion
Arduino Payments
The Sketch
#include <Bridge.h>
#include <Temboo.h>
#include "TembooAccount.h"
TembooChoreo AcceptPayPalPaymentChoreo;

//invoke temboo client
AcceptPayPalPaymentChoreo.begin();
//temboo account credentials
AcceptPayPalPaymentChoreo.setAccountName(
TEMBOO_ACCOUNT);
AcceptPayPalPaymentChoreo.setAppKeyName(
TEMBOO_APP_KEY_NAME);
AcceptPayPalPaymentChoreo.setAppKey(
TEMBOO_APP_KEY);
AcceptPayPalPaymentChoreo.addInput("ClientID",
"AXrysRDeQOaGFm5UxSgdS7f-b4QTA-nhFmMp");
AcceptPayPalPaymentChoreo.addInput("ClientSecret",
"EHMH6gxjTn9zBocpTnFJoulKaNFprCcc9q7eh");

AcceptPayPalPaymentChoreo.addInput("CancelURL",
"http://www.jcleblanc.com/cancel");
AcceptPayPalPaymentChoreo.addInput("Currency",
"USD");
AcceptPayPalPaymentChoreo.addInput("ReturnURL",
"http://www.jcleblanc.com/return");
AcceptPayPalPaymentChoreo.addInput("Total", "5");
//run payment choreo
AcceptPayPalPaymentChoreo.setChoreo("/Library/
PayPal/Payments/AcceptPayPalPayment");
//run choreo and print to serial
AcceptPayPalPaymentChoreo.run();
while(AcceptPayPalPaymentChoreo.available()){
char c = AcceptPayPalPaymentChoreo.read();
Serial.print(c);
}
AcceptPayPalPaymentChoreo.close();
The End Result
Leap Motion Auctions
Gesture Controlled Auctions
The Future of Commerce
Bluetooth Low Energy
Physical Shopping

Identity and Personalization
Digital Shopping

Hardware Hacks
New Shopping Hardware Tech
Thanks! Questions?
http://www.slideshare.net/jcleblanc

Jonathan LeBlanc (@jcleblanc)
Head of Developer Evangelism
PayPal North America

More Related Content

Viewers also liked

Trust But Control: Managing Privileges without killing productivity
Trust But Control:  Managing Privileges without killing productivityTrust But Control:  Managing Privileges without killing productivity
Trust But Control: Managing Privileges without killing productivityScott Carlson
 
Creating a User-Centric Mobile Payment Architecture
Creating a User-Centric Mobile Payment ArchitectureCreating a User-Centric Mobile Payment Architecture
Creating a User-Centric Mobile Payment ArchitectureJonathan LeBlanc
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensJonathan LeBlanc
 
The Future of Mobile Payments
The Future of Mobile PaymentsThe Future of Mobile Payments
The Future of Mobile PaymentsJonathan LeBlanc
 

Viewers also liked (6)

Trust But Control: Managing Privileges without killing productivity
Trust But Control:  Managing Privileges without killing productivityTrust But Control:  Managing Privileges without killing productivity
Trust But Control: Managing Privileges without killing productivity
 
Creating a User-Centric Mobile Payment Architecture
Creating a User-Centric Mobile Payment ArchitectureCreating a User-Centric Mobile Payment Architecture
Creating a User-Centric Mobile Payment Architecture
 
ES6 at PayPal
ES6 at PayPalES6 at PayPal
ES6 at PayPal
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web Tokens
 
Hackathon winning pitch
Hackathon winning pitchHackathon winning pitch
Hackathon winning pitch
 
The Future of Mobile Payments
The Future of Mobile PaymentsThe Future of Mobile Payments
The Future of Mobile Payments
 

Similar to The Future of Using Money

Kavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_finKavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_finPacSecJP
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Distil Networks
 
Beacon, BLE, and the Future of Commerce
Beacon, BLE, and the Future of CommerceBeacon, BLE, and the Future of Commerce
Beacon, BLE, and the Future of CommerceJonathan LeBlanc
 
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire MSDEVMTL
 
Blockchain project: e-voting system based upon blockchain technology
Blockchain project: e-voting system based upon blockchain technologyBlockchain project: e-voting system based upon blockchain technology
Blockchain project: e-voting system based upon blockchain technologyHarender Singh
 
The Hardware to Web Commerce Revolution
The Hardware to Web Commerce RevolutionThe Hardware to Web Commerce Revolution
The Hardware to Web Commerce RevolutionJonathan LeBlanc
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
How to Quantify the Value of Kafka in Your Organization
How to Quantify the Value of Kafka in Your Organization How to Quantify the Value of Kafka in Your Organization
How to Quantify the Value of Kafka in Your Organization confluent
 
Mobile Banking webinar, December 15, 2010 by Jouk Pleiter
Mobile Banking webinar, December 15, 2010 by Jouk PleiterMobile Banking webinar, December 15, 2010 by Jouk Pleiter
Mobile Banking webinar, December 15, 2010 by Jouk PleiterBackbase
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamInformaticaMarketplace
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentMicrosoft Technet France
 
Hyperledger Blockchain
Hyperledger BlockchainHyperledger Blockchain
Hyperledger BlockchainAfraz Khan
 
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...Online Marketing Summit
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)ecommerce
 
Information System Security Benchmark Dashboards
Information System Security Benchmark DashboardsInformation System Security Benchmark Dashboards
Information System Security Benchmark DashboardsSlideTeam
 
Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Duo Security
 

Similar to The Future of Using Money (20)

Kavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_finKavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_fin
 
JAM805 - Beyond the Device
JAM805 -  Beyond the DeviceJAM805 -  Beyond the Device
JAM805 - Beyond the Device
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?
 
Beacon, BLE, and the Future of Commerce
Beacon, BLE, and the Future of CommerceBeacon, BLE, and the Future of Commerce
Beacon, BLE, and the Future of Commerce
 
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
 
Blockchain project: e-voting system based upon blockchain technology
Blockchain project: e-voting system based upon blockchain technologyBlockchain project: e-voting system based upon blockchain technology
Blockchain project: e-voting system based upon blockchain technology
 
The Hardware to Web Commerce Revolution
The Hardware to Web Commerce RevolutionThe Hardware to Web Commerce Revolution
The Hardware to Web Commerce Revolution
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
How to Quantify the Value of Kafka in Your Organization
How to Quantify the Value of Kafka in Your Organization How to Quantify the Value of Kafka in Your Organization
How to Quantify the Value of Kafka in Your Organization
 
Mobile Banking webinar, December 15, 2010 by Jouk Pleiter
Mobile Banking webinar, December 15, 2010 by Jouk PleiterMobile Banking webinar, December 15, 2010 by Jouk Pleiter
Mobile Banking webinar, December 15, 2010 by Jouk Pleiter
 
Io t consumerlogo
Io t consumerlogoIo t consumerlogo
Io t consumerlogo
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data Stream
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligent
 
Hyperledger Blockchain
Hyperledger BlockchainHyperledger Blockchain
Hyperledger Blockchain
 
Digital trends
Digital trendsDigital trends
Digital trends
 
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)
 
Information System Security Benchmark Dashboards
Information System Security Benchmark DashboardsInformation System Security Benchmark Dashboards
Information System Security Benchmark Dashboards
 
Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...
 

More from Jonathan LeBlanc

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJonathan LeBlanc
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsJonathan LeBlanc
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessJonathan LeBlanc
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with BoxJonathan LeBlanc
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer WorkshopJonathan LeBlanc
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security PracticesJonathan LeBlanc
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI ElementsJonathan LeBlanc
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingJonathan LeBlanc
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyJonathan LeBlanc
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data SecurityJonathan LeBlanc
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data SecurityJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 

More from Jonathan LeBlanc (20)

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the Client
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data Insights
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and Serverless
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with Box
 
Box Platform Overview
Box Platform OverviewBox Platform Overview
Box Platform Overview
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer Workshop
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security Practices
 
Box Authentication Types
Box Authentication TypesBox Authentication Types
Box Authentication Types
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI Elements
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scoping
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments Globally
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data Security
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data Security
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Kill All Passwords
Kill All PasswordsKill All Passwords
Kill All Passwords
 
BattleHack Los Angeles
BattleHack Los Angeles BattleHack Los Angeles
BattleHack Los Angeles
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

The Future of Using Money

Editor's Notes

  1. Uses BlueTooth Low Energy or card reader
  2. - Bluetooth opens up and maintains a connection, sniff mode allows sleeping a device for decrease battery use- Data throughput is not meaningful for BLE since it doesn&apos;t support streamingBLE has a data transfer rate of 1Mbpsboth devices can go to sleep in between transactions
  3. State Exposure:what temperature it currently is,Gate 6a boarding now,Network availableEnable proximity detection (when I&apos;m in the office, car, etc.) and perform some action. For us we determine proximity and check you in to a store
  4. - used for connecting the devices we carry with us (phone, pedometer, body sensors, car to car wheels / tires within a system)- the device works as a transparent pipe from a device (cell phone, etc.) and an ip address- both devices can go to sleep in between transactions
  5. - Person enters store with a BLE enabled device, and they are checked in automatically (if it&apos;s the first visit the app will ask them to check in. If ignored or declined, shop will not get any information about you)- Beacon sends out advertising beacons on a regular basis with a service UUID as well as a few bytes of advertising data.- If the phone understands the UUID (via PP app) it can establish a connection- Beacon maintains an attribute dictionary of requests / responses, and forwards requests it can&apos;t handle to PayPal (as a bridge). This allows it to handle sophisticated queries like getting location data, checking in, whether to auto-check in in the future- When a person comes in range of Beacon, the PP app wakes up, connects to beacon, and requests a beacon token. Beacon selects an unused token from its cache, and sends back a cryptographic nonce &amp; signature, and some metadata- Phone verifies the signature with a public key embedded in the app, and makes a check-in decision based on the metadata- The app encrypts some data for beacon to forward on, uninterpreted, to PP servers. Server decrypts the data and checks in consumer- The server then returns back encrypted message back to beacon, which forwards it back to the app. - App decrypts and verified the response and disconnects from Beacon- Beacon still works in places where cell phones have no network / wireless coverage, because it is in itself a wireless network bridge
  6. Digital Commerce
  7. I started out working at Y! with a lot of auth systems, you might know them better as these things (show buttons)
  8. I started realizing when I would build applications that besides a username, the rest of the info from these people was garbage, because of this… (show picture of a royalfetus profile)We’re in an age where are children have a social footprint before they are ever born…and that’s a much different world than the one I grew up in.
  9. It comes down to the difference between concrete user identity and socialized (curated) identity
  10. Removing the registration form
  11. Personalization allows you to take shortcuts for your users (signups, checkouts, etc.)
  12. Reduce dropoff ratesI’ve seen numbers as high as 71% during registration: http://www.optimizationtoday.com/web-analytics/what-is-abandonment-rate/23% of customers abandoned carts when asked to register (Forrester)…At five questions, the drop-off rate is 2 percent; at 10 questions, 4 percent, and so on. Only at about question 35 does the correlation end (Kevin Hale, Wufoo)
  13. Based onBrowsing habits,Time on page / time of year,LocationRecommendations + targeted advertising
  14. Hand movement up and down controls the bid price