Context Automation (with video demos)
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Context Automation (with video demos)

  • 2,793 views
Uploaded on

Presentation delivered at the 2009 Gluecon on May 13, 2009 in Denver CO

Presentation delivered at the 2009 Gluecon on May 13, 2009 in Denver CO

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
2,793
On Slideshare
2,613
From Embeds
180
Number of Embeds
5

Actions

Shares
Downloads
10
Comments
0
Likes
0

Embeds 180

http://www.windley.com 175
http://www.slideshare.net 2
http://www.hanrss.com 1
http://www.mefeedia.com 1
http://74.125.155.132 1

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide


  • imagine that the dots are Web sites and the user is going from web site to web site to accomplish some task.
  • existing browsers offer little help with this task
    Nearly everything we do only involves multiple Web sites, but there’s no help in connecting them.
  • context is:
    - relevant data to the Web task
    - links multiple sites
    - what the user cares about
    CA generates a browsing experience that links together formerly disconnected experiences and ven modifies individual sites.


  • Cookies and sessions are a way of creating context within a single site
    HTTP is designed to be stateless. Each page stands alone.
  • Single sign on is an example of cross-site context
    - single purpose: authentication context
    - still not leveraging this as we could. Having a single login that works on multiple sites isn’t the same as having a single authentication context for a given Web episode.

  • TrustWatch is a browser extension that provides a security context for users that uses a could-based service for site verification.





  • FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms.
    Still some work to do here. Safari not very open. Especially on iPhone.
  • FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms.
    Still some work to do here. Safari not very open. Especially on iPhone.
  • FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms.
    Still some work to do here. Safari not very open. Especially on iPhone.
  • FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms.
    Still some work to do here. Safari not very open. Especially on iPhone.
  • - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.






  • Greasemonkey - scripts on the browser not the cloud
  • Greasemonkey - scripts on the browser not the cloud
  • Greasemonkey - scripts on the browser not the cloud




  • Structure browsing - connects the dots and threads the experience
    opt-in, user controlled
  • Structure browsing - connects the dots and threads the experience
    opt-in, user controlled
  • Structure browsing - connects the dots and threads the experience
    opt-in, user controlled
  • Structure browsing - connects the dots and threads the experience
    opt-in, user controlled





  • No one’s ever surprised me with a GUI
  • No one’s ever surprised me with a GUI
  • No one’s ever surprised me with a GUI

























  • The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...



Transcript

  • 1. Context Automation Phillip J. Windley, Ph.D. CTO, Kynetx www.windley.com
  • 2. What is it?
  • 3. Connecting the dots
  • 4. On the web, users connect the dots between Web sites in their heads
  • 5. context automation == connecting the dots
  • 6. Context is state
  • 7. Context Examples
  • 8. Intra-site Context
  • 9. Single Purpose Context
  • 10. Context with Data
  • 11. Amazon and Your Local Library
  • 12. Trends Driving Context Automation
  • 13. Trends Driving Context Automation Cloud Computing
  • 14. Trends Driving Context Automation Cloud Extensible Computing Browsers
  • 15. Trends Driving Context Automation Cloud Extensible Computing Browsers Internet Identities
  • 16. Trends Driving Context Automation Cloud Extensible Computing Browsers Internet Identities
  • 17. The Browser as Platform Browsers tie Web sessions together
  • 18. The Browser as Platform Browsers tie Web sessions together 1B Firefox add-on downloads since 2005*
  • 19. The Browser as Platform Browsers tie Web sessions together 1B Firefox add-on downloads since 2005* That is about 17/sec*
  • 20. The Browser as Platform Browsers tie Web sessions together 1B Firefox add-on downloads since 2005* That is about 17/sec* Estimates are 2x-5x below actual
  • 21. The Browser as Platform Browsers tie Web sessions together 1B Firefox add-on downloads since 2005* That is about 17/sec* Estimates are 2x-5x below actual *Justin Scott, Mozilla
  • 22. The Identity Shift
  • 23. The Identity Shift Ad-hoc IP Address Machine Cookie Session SSL
  • 24. The Identity Shift Ad-hoc IP Address Machine Cookie Session SSL Security & privacy at the expense of convenience Website dependent identity only
  • 25. The Identity Shift Ad-hoc Structured IP Address Browser Machine Individual Cookie Identity Session Relationships SSL Reputation Security & privacy at the expense of convenience Website dependent identity only
  • 26. The Identity Shift Ad-hoc Structured IP Address Browser Machine Individual Cookie Identity Session Relationships SSL Reputation Security & privacy at Convenience with the expense of privacy, security & convenience relationships Website dependent Consistent website identity only independent identity
  • 27. Information Cards
  • 28. Information Cards Microsoft developed standard
  • 29. Information Cards Microsoft developed standard Information Card Foundation
  • 30. Information Cards Microsoft developed standard Information Card Foundation User participation
  • 31. Information Cards Microsoft developed standard Information Card Foundation User participation Firm, technical foundation for security and privacy
  • 32. Information Card Types
  • 33. Information Card Types Personal cards
  • 34. Information Card Types Personal cards Managed cards
  • 35. Information Card Types Personal cards Managed cards Action cards
  • 36. The Information Card Selector
  • 37. Context automation rocks when supported by cloud services, browser extensions, & internet identity
  • 38. Context automation works by augmenting Web sites with new information for the user
  • 39. The Web Augmentation Spectrum Javascript in the browser
  • 40. The Web Augmentation Spectrum Media Toolbars Javascript in the browser
  • 41. The Web Augmentation Spectrum Media Toolbars Search Context Javascript in the browser
  • 42. The Web Augmentation Spectrum Context Platform Media Toolbars Search Context Javascript in the browser
  • 43. What you get from the cloud...
  • 44. What you get from the cloud... Machine independence
  • 45. What you get from the cloud... Machine independence Hassle-free updates
  • 46. What you get from the cloud... Machine independence Hassle-free updates Increased security
  • 47. What you get from the cloud... Machine independence Hassle-free updates Increased security Auditing & analytics
  • 48. What you get from identity...
  • 49. What you get from identity... Individualized
  • 50. What you get from identity... Individualized Structured browsing
  • 51. What you get from identity... Individualized Structured browsing Privacy
  • 52. What you get from identity... Individualized Structured browsing Privacy Security
  • 53. Kynetx & Context Automation
  • 54. How Kynetx Works
  • 55. 1 How Kynetx Works
  • 56. 1 2 How Kynetx Works
  • 57. 1 2 3 How Kynetx Works
  • 58. 4 1 2 3 How Kynetx Works
  • 59. Kynetx Rule Language (KRL) Sometimes a layer of indirection helps...
  • 60. Kynetx Rule Language (KRL) Sometimes a layer of indirection helps... Domain specific language
  • 61. Kynetx Rule Language (KRL) Sometimes a layer of indirection helps... Domain specific language Browser and platform independent
  • 62. Kynetx Rule Language (KRL) Sometimes a layer of indirection helps... Domain specific language Browser and platform independent Mental leverage via abstractions
  • 63. KRL Rulesets
  • 64. KRL Rulesets Select page via URL class
  • 65. KRL Rulesets Select page via URL class Declare and access data sources
  • 66. KRL Rulesets Select page via URL class Declare and access data sources Conditionally fire action
  • 67. KRL Rulesets Select page via URL class Declare and access data sources Conditionally fire action Process callbacks
  • 68. KRL for Library Lookup
  • 69. KRL for Library Lookup
  • 70. KRL for Library Lookup
  • 71. KRL for Library Lookup
  • 72. KRL for Library Lookup
  • 73. KRL for Library Lookup
  • 74. KRL for Library Lookup
  • 75. KRL for Library Lookup
  • 76. KRL for Library Lookup
  • 77. Information cards advantages
  • 78. Information cards advantages Signed
  • 79. Information cards advantages Signed Uniquely identified
  • 80. Information cards advantages Signed Uniquely identified Protect user data
  • 81. Information cards advantages Signed Uniquely identified Protect user data Hidden security
  • 82. Information cards advantages Signed Uniquely identified Protect user data Hidden security Nice metaphor
  • 83. Can we hack a card?
  • 84. Can we hack a card?
  • 85. RE JEC T ED !!
  • 86. Malicious apps can be identified and disabled
  • 87. Kynetx Developer Beta
  • 88. Kynetx Developer Beta
  • 89. Kynetx Developer Beta Free (under quota)
  • 90. Kynetx Developer Beta Free (under quota) Limited number
  • 91. Kynetx Developer Beta Free (under quota) Limited number See me for signup card
  • 92. Cloud Extensible Computing Browsers Internet Identities
  • 93. Cloud Extensible Computing Browsers Internet Identities
  • 94. Cloud Extensible Computing Browsers Safe Internet Identities
  • 95. Cloud Extensible Computing Browsers Safe Internet Secure Identities
  • 96. Cloud Extensible Computing Browsers Safe Internet Secure Identities Individualized
  • 97. Cloud Extensible Computing Browsers Safe Internet Secure Identities Individualized Flexible
  • 98. Cloud Extensible Computing Browsers Safe Internet Secure Identities Individualized Flexible Powerful
  • 99. More information... Read the white paper: http://www.kynetx.com Our developer site http://code.kynetx.com/
  • 100. Context Automation ? Contact info: phil@windley.org www.windley.com @windley