Context Automation (with video demos)

1,698
-1

Published on

Presentation delivered at the 2009 Gluecon on May 13, 2009 in Denver CO

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,698
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide


  • imagine that the dots are Web sites and the user is going from web site to web site to accomplish some task.
  • existing browsers offer little help with this task
    Nearly everything we do only involves multiple Web sites, but there’s no help in connecting them.
  • context is:
    - relevant data to the Web task
    - links multiple sites
    - what the user cares about
    CA generates a browsing experience that links together formerly disconnected experiences and ven modifies individual sites.


  • Cookies and sessions are a way of creating context within a single site
    HTTP is designed to be stateless. Each page stands alone.
  • Single sign on is an example of cross-site context
    - single purpose: authentication context
    - still not leveraging this as we could. Having a single login that works on multiple sites isn’t the same as having a single authentication context for a given Web episode.

  • TrustWatch is a browser extension that provides a security context for users that uses a could-based service for site verification.





  • FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms.
    Still some work to do here. Safari not very open. Especially on iPhone.
  • FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms.
    Still some work to do here. Safari not very open. Especially on iPhone.
  • FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms.
    Still some work to do here. Safari not very open. Especially on iPhone.
  • FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms.
    Still some work to do here. Safari not very open. Especially on iPhone.
  • - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.






  • Greasemonkey - scripts on the browser not the cloud
  • Greasemonkey - scripts on the browser not the cloud
  • Greasemonkey - scripts on the browser not the cloud




  • Structure browsing - connects the dots and threads the experience
    opt-in, user controlled
  • Structure browsing - connects the dots and threads the experience
    opt-in, user controlled
  • Structure browsing - connects the dots and threads the experience
    opt-in, user controlled
  • Structure browsing - connects the dots and threads the experience
    opt-in, user controlled





  • No one’s ever surprised me with a GUI
  • No one’s ever surprised me with a GUI
  • No one’s ever surprised me with a GUI

























  • The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...



  • Context Automation (with video demos)

    1. 1. Context Automation Phillip J. Windley, Ph.D. CTO, Kynetx www.windley.com
    2. 2. What is it?
    3. 3. Connecting the dots
    4. 4. On the web, users connect the dots between Web sites in their heads
    5. 5. context automation == connecting the dots
    6. 6. Context is state
    7. 7. Context Examples
    8. 8. Intra-site Context
    9. 9. Single Purpose Context
    10. 10. Context with Data
    11. 11. Amazon and Your Local Library
    12. 12. Trends Driving Context Automation
    13. 13. Trends Driving Context Automation Cloud Computing
    14. 14. Trends Driving Context Automation Cloud Extensible Computing Browsers
    15. 15. Trends Driving Context Automation Cloud Extensible Computing Browsers Internet Identities
    16. 16. Trends Driving Context Automation Cloud Extensible Computing Browsers Internet Identities
    17. 17. The Browser as Platform Browsers tie Web sessions together
    18. 18. The Browser as Platform Browsers tie Web sessions together 1B Firefox add-on downloads since 2005*
    19. 19. The Browser as Platform Browsers tie Web sessions together 1B Firefox add-on downloads since 2005* That is about 17/sec*
    20. 20. The Browser as Platform Browsers tie Web sessions together 1B Firefox add-on downloads since 2005* That is about 17/sec* Estimates are 2x-5x below actual
    21. 21. The Browser as Platform Browsers tie Web sessions together 1B Firefox add-on downloads since 2005* That is about 17/sec* Estimates are 2x-5x below actual *Justin Scott, Mozilla
    22. 22. The Identity Shift
    23. 23. The Identity Shift Ad-hoc IP Address Machine Cookie Session SSL
    24. 24. The Identity Shift Ad-hoc IP Address Machine Cookie Session SSL Security & privacy at the expense of convenience Website dependent identity only
    25. 25. The Identity Shift Ad-hoc Structured IP Address Browser Machine Individual Cookie Identity Session Relationships SSL Reputation Security & privacy at the expense of convenience Website dependent identity only
    26. 26. The Identity Shift Ad-hoc Structured IP Address Browser Machine Individual Cookie Identity Session Relationships SSL Reputation Security & privacy at Convenience with the expense of privacy, security & convenience relationships Website dependent Consistent website identity only independent identity
    27. 27. Information Cards
    28. 28. Information Cards Microsoft developed standard
    29. 29. Information Cards Microsoft developed standard Information Card Foundation
    30. 30. Information Cards Microsoft developed standard Information Card Foundation User participation
    31. 31. Information Cards Microsoft developed standard Information Card Foundation User participation Firm, technical foundation for security and privacy
    32. 32. Information Card Types
    33. 33. Information Card Types Personal cards
    34. 34. Information Card Types Personal cards Managed cards
    35. 35. Information Card Types Personal cards Managed cards Action cards
    36. 36. The Information Card Selector
    37. 37. Context automation rocks when supported by cloud services, browser extensions, & internet identity
    38. 38. Context automation works by augmenting Web sites with new information for the user
    39. 39. The Web Augmentation Spectrum Javascript in the browser
    40. 40. The Web Augmentation Spectrum Media Toolbars Javascript in the browser
    41. 41. The Web Augmentation Spectrum Media Toolbars Search Context Javascript in the browser
    42. 42. The Web Augmentation Spectrum Context Platform Media Toolbars Search Context Javascript in the browser
    43. 43. What you get from the cloud...
    44. 44. What you get from the cloud... Machine independence
    45. 45. What you get from the cloud... Machine independence Hassle-free updates
    46. 46. What you get from the cloud... Machine independence Hassle-free updates Increased security
    47. 47. What you get from the cloud... Machine independence Hassle-free updates Increased security Auditing & analytics
    48. 48. What you get from identity...
    49. 49. What you get from identity... Individualized
    50. 50. What you get from identity... Individualized Structured browsing
    51. 51. What you get from identity... Individualized Structured browsing Privacy
    52. 52. What you get from identity... Individualized Structured browsing Privacy Security
    53. 53. Kynetx & Context Automation
    54. 54. How Kynetx Works
    55. 55. 1 How Kynetx Works
    56. 56. 1 2 How Kynetx Works
    57. 57. 1 2 3 How Kynetx Works
    58. 58. 4 1 2 3 How Kynetx Works
    59. 59. Kynetx Rule Language (KRL) Sometimes a layer of indirection helps...
    60. 60. Kynetx Rule Language (KRL) Sometimes a layer of indirection helps... Domain specific language
    61. 61. Kynetx Rule Language (KRL) Sometimes a layer of indirection helps... Domain specific language Browser and platform independent
    62. 62. Kynetx Rule Language (KRL) Sometimes a layer of indirection helps... Domain specific language Browser and platform independent Mental leverage via abstractions
    63. 63. KRL Rulesets
    64. 64. KRL Rulesets Select page via URL class
    65. 65. KRL Rulesets Select page via URL class Declare and access data sources
    66. 66. KRL Rulesets Select page via URL class Declare and access data sources Conditionally fire action
    67. 67. KRL Rulesets Select page via URL class Declare and access data sources Conditionally fire action Process callbacks
    68. 68. KRL for Library Lookup
    69. 69. KRL for Library Lookup
    70. 70. KRL for Library Lookup
    71. 71. KRL for Library Lookup
    72. 72. KRL for Library Lookup
    73. 73. KRL for Library Lookup
    74. 74. KRL for Library Lookup
    75. 75. KRL for Library Lookup
    76. 76. KRL for Library Lookup
    77. 77. Information cards advantages
    78. 78. Information cards advantages Signed
    79. 79. Information cards advantages Signed Uniquely identified
    80. 80. Information cards advantages Signed Uniquely identified Protect user data
    81. 81. Information cards advantages Signed Uniquely identified Protect user data Hidden security
    82. 82. Information cards advantages Signed Uniquely identified Protect user data Hidden security Nice metaphor
    83. 83. Can we hack a card?
    84. 84. Can we hack a card?
    85. 85. RE JEC T ED !!
    86. 86. Malicious apps can be identified and disabled
    87. 87. Kynetx Developer Beta
    88. 88. Kynetx Developer Beta
    89. 89. Kynetx Developer Beta Free (under quota)
    90. 90. Kynetx Developer Beta Free (under quota) Limited number
    91. 91. Kynetx Developer Beta Free (under quota) Limited number See me for signup card
    92. 92. Cloud Extensible Computing Browsers Internet Identities
    93. 93. Cloud Extensible Computing Browsers Internet Identities
    94. 94. Cloud Extensible Computing Browsers Safe Internet Identities
    95. 95. Cloud Extensible Computing Browsers Safe Internet Secure Identities
    96. 96. Cloud Extensible Computing Browsers Safe Internet Secure Identities Individualized
    97. 97. Cloud Extensible Computing Browsers Safe Internet Secure Identities Individualized Flexible
    98. 98. Cloud Extensible Computing Browsers Safe Internet Secure Identities Individualized Flexible Powerful
    99. 99. More information... Read the white paper: http://www.kynetx.com Our developer site http://code.kynetx.com/
    100. 100. Context Automation ? Contact info: phil@windley.org www.windley.com @windley

    ×