O'Reilly Tool of Change talk on "Changing the Face of Open Commerce Identity in Publishing": New York, NY (February 2012).
The audio recording from this session is available at http://archive.org/details/ChangingTheFaceOfOpenIdentityInEcommerceOreillyToc2012
2012 Confoo: Changing the Face of Identity in EcommerceJonathan LeBlanc
March 2012 talk on "Changing the Face of Identity in Ecommerce" at Confoo in Montreal, QC.
The audio recording from this session is available at http://archive.org/details/ChangingTheFaceOfOpenIdentityInEcommerce
2012 POSSCON Changing the Face of Identity in EcommerceJonathan LeBlanc
March 2012 presentation on open source Ecommerce identity for POSSCON (Columbia, SC).
The audio recording from this session is available at http://archive.org/details/ChangingTheFaceOfOpenIdentityInEcommercePosscon2012
Content:
1. What is Growth Hacking?
2. Success stories: Dropbox, Buffer, Paypal, Twitter
3. Growth Hacking Problem Solving
4. Growth Hacking as Service
Sean Ellis (CEO of GrowthHackers) coined the term "growth hacker" in 2010:
"Growth Hacker is a person whose true north is growth. Everything they do is scrutinized by its potential impact on scalable growth."
Andrew Chen’s (leading GH at Uber) definition:
"Growth Hacker is the new VP Marketing. Growth Hackers are a hybrid of marketer and coder, one who looks at the traditional question of 'How do I get customers for my product?' and answers with A/B tests, landing pages, viral factor, email deliverability, and Open Graph."
If you have an eCommerce website those areas could be:
Customer Acquisition – bringing people to your website.
Customer Engagement – people finding your product.
Customer Activation – people registering and buying the product.
Customer Retention – people returning and buying something again.
You can achieve the Growth Hacking Goal by using various Growth Hacking Approaches.
For Retention it could be — email notifications, retargeting, loyalty cards.
Inside of the email notifications approach, you can try such Growth Hacking Techniques as “thank you” emails, email notifications for similar products, or emails with information about discounts.
Growth Hacker is a cross-functional, multi-tasking person focused on achieving a certain objective.
It can be a programmer with an excellent understanding of marketing and analytics, but also a marketer with strong programming skills.
The skills required for this profession are actually a combination of marketing, data analyzing, product understanding, and creative and analytical thinking. Combined together, they need to provide you with a solution that might have been overlooked by others.
Growth Hacking vs. Marketing
— All successful growth hackers are marketers, but not all marketers are growth hackers
Digital marketing teams are usually composed of non-technical people that often rely on developers, designers, and data scientists to implement their ideas. On the other hand, growth hacking teams are made of people that generate ideas and execute them from start to finish (wegrowth.com)
— Growth hacking is experiment driven marketing focused primarily on how the product is used to create growth both from the distribution and retention side. The key differentiator being the product-level focus vs. the channel-level focus of traditional marketing effort (Morgan Brown, COO of Inman News)
— Growth hacking does not separate product design and product effectiveness from marketing (Ryan Holiday, marketer and entrepreneur)
Presentation powered by Nestim Gmbh
PayPal Access presentation for internal eBay hackathon (April 30th, 2012). The live coding portion of the talk went through the samples available at https://github.com/jcleblanc/oauth/tree/master/oauth2-php-paypal/
2012 Confoo: Changing the Face of Identity in EcommerceJonathan LeBlanc
March 2012 talk on "Changing the Face of Identity in Ecommerce" at Confoo in Montreal, QC.
The audio recording from this session is available at http://archive.org/details/ChangingTheFaceOfOpenIdentityInEcommerce
2012 POSSCON Changing the Face of Identity in EcommerceJonathan LeBlanc
March 2012 presentation on open source Ecommerce identity for POSSCON (Columbia, SC).
The audio recording from this session is available at http://archive.org/details/ChangingTheFaceOfOpenIdentityInEcommercePosscon2012
Content:
1. What is Growth Hacking?
2. Success stories: Dropbox, Buffer, Paypal, Twitter
3. Growth Hacking Problem Solving
4. Growth Hacking as Service
Sean Ellis (CEO of GrowthHackers) coined the term "growth hacker" in 2010:
"Growth Hacker is a person whose true north is growth. Everything they do is scrutinized by its potential impact on scalable growth."
Andrew Chen’s (leading GH at Uber) definition:
"Growth Hacker is the new VP Marketing. Growth Hackers are a hybrid of marketer and coder, one who looks at the traditional question of 'How do I get customers for my product?' and answers with A/B tests, landing pages, viral factor, email deliverability, and Open Graph."
If you have an eCommerce website those areas could be:
Customer Acquisition – bringing people to your website.
Customer Engagement – people finding your product.
Customer Activation – people registering and buying the product.
Customer Retention – people returning and buying something again.
You can achieve the Growth Hacking Goal by using various Growth Hacking Approaches.
For Retention it could be — email notifications, retargeting, loyalty cards.
Inside of the email notifications approach, you can try such Growth Hacking Techniques as “thank you” emails, email notifications for similar products, or emails with information about discounts.
Growth Hacker is a cross-functional, multi-tasking person focused on achieving a certain objective.
It can be a programmer with an excellent understanding of marketing and analytics, but also a marketer with strong programming skills.
The skills required for this profession are actually a combination of marketing, data analyzing, product understanding, and creative and analytical thinking. Combined together, they need to provide you with a solution that might have been overlooked by others.
Growth Hacking vs. Marketing
— All successful growth hackers are marketers, but not all marketers are growth hackers
Digital marketing teams are usually composed of non-technical people that often rely on developers, designers, and data scientists to implement their ideas. On the other hand, growth hacking teams are made of people that generate ideas and execute them from start to finish (wegrowth.com)
— Growth hacking is experiment driven marketing focused primarily on how the product is used to create growth both from the distribution and retention side. The key differentiator being the product-level focus vs. the channel-level focus of traditional marketing effort (Morgan Brown, COO of Inman News)
— Growth hacking does not separate product design and product effectiveness from marketing (Ryan Holiday, marketer and entrepreneur)
Presentation powered by Nestim Gmbh
PayPal Access presentation for internal eBay hackathon (April 30th, 2012). The live coding portion of the talk went through the samples available at https://github.com/jcleblanc/oauth/tree/master/oauth2-php-paypal/
Growth Hacking skills will help you beat your competition and keep growing!
Rohan runs you through some of the case studies, learnings and tricks he has learned along the way as a Growth Hacker.
Eastern Software Systems Private Limited ( ESS), established in 1990 is a premier software services and products company. With a presence in 27 countries and with 700+clients in 20 + different industry verticals, ESS is a CMM level 5 and ISO 9001:2008 company.
ESS offers cost-effective solutions specifically tailored to your immediate needs and fully upgradeable to meet your future needs. We have expertise in creating all kinds of web solutions: B2B applications, B2C applications, web portals and many others. These solutions give you flexibility and power - all at a reasonable price and within your particular fixed budget frame. By obtaining a comprehensive insight into our clients businesses we fully understand their online objectives, allowing us to design websites which exceed expectations and create new, or enhance existing channels to target markets.
"Atomization" - a new trend in online marketing and how to exploit itEconsultancy
A 53-slide presentation by Internet Authtor and CEO of E-consultancy.com Ashley Friedlein looking at what he calls 'atomisation'. Ashley shows how internet content and services are increasingly being 'atomised' across the internet; your would-be site users are consuming your content in many other places than your actual site. So what can you do about it? How can you embrace this trend?
The purpose of this document is to explain how micro-entrepreneurs can sell services, goods and experiences to untapped markets through emerging web-based marketplaces.
Michael Vorel, CEO of Vastplanet.com on leading Ecommerce Trends, Online Merchants, Conversion Strategies and features high volume affiliate marketing sites. Presentation includes takeaway affiliate marketing strategies and industry trends.
JavaScript App Security: Auth and Identity on the ClientJonathan LeBlanc
The story is always the same; if you want to create a JavaScript centric app with API and identity security, you’re told that you need to have a server-side component for handling your identity and application security. That’s simply not the case in modern development.
In this session we'll look at client-side identity, API, and token security, exploring token downscoping methodologies, key management tools, and security on the client.
Improving Developer Onboarding Through Intelligent Data InsightsJonathan LeBlanc
A developer platform lives and dies by it's developer community. When huge problems need to be solved, it's easy to make valuable improvements, but what do you do when those are solved and you still see high bounce rates on your site, low developer application completion, and generally poor adoption of your product? This is where your data can save you.
In this talk we'll run through:
- How to track valuable developer path insights, from moments of anxiety to time to first valuable call.
- Overlaying support and ticketing information on top of developer path data to decrease developer friction.
- How to create automated analytics systems to measure success.
- When these systems should be built, before it's too late.
Growth Hacking skills will help you beat your competition and keep growing!
Rohan runs you through some of the case studies, learnings and tricks he has learned along the way as a Growth Hacker.
Eastern Software Systems Private Limited ( ESS), established in 1990 is a premier software services and products company. With a presence in 27 countries and with 700+clients in 20 + different industry verticals, ESS is a CMM level 5 and ISO 9001:2008 company.
ESS offers cost-effective solutions specifically tailored to your immediate needs and fully upgradeable to meet your future needs. We have expertise in creating all kinds of web solutions: B2B applications, B2C applications, web portals and many others. These solutions give you flexibility and power - all at a reasonable price and within your particular fixed budget frame. By obtaining a comprehensive insight into our clients businesses we fully understand their online objectives, allowing us to design websites which exceed expectations and create new, or enhance existing channels to target markets.
"Atomization" - a new trend in online marketing and how to exploit itEconsultancy
A 53-slide presentation by Internet Authtor and CEO of E-consultancy.com Ashley Friedlein looking at what he calls 'atomisation'. Ashley shows how internet content and services are increasingly being 'atomised' across the internet; your would-be site users are consuming your content in many other places than your actual site. So what can you do about it? How can you embrace this trend?
The purpose of this document is to explain how micro-entrepreneurs can sell services, goods and experiences to untapped markets through emerging web-based marketplaces.
Michael Vorel, CEO of Vastplanet.com on leading Ecommerce Trends, Online Merchants, Conversion Strategies and features high volume affiliate marketing sites. Presentation includes takeaway affiliate marketing strategies and industry trends.
Similar to 2012 O'Reilly TOC: Commerce Identity (20)
JavaScript App Security: Auth and Identity on the ClientJonathan LeBlanc
The story is always the same; if you want to create a JavaScript centric app with API and identity security, you’re told that you need to have a server-side component for handling your identity and application security. That’s simply not the case in modern development.
In this session we'll look at client-side identity, API, and token security, exploring token downscoping methodologies, key management tools, and security on the client.
Improving Developer Onboarding Through Intelligent Data InsightsJonathan LeBlanc
A developer platform lives and dies by it's developer community. When huge problems need to be solved, it's easy to make valuable improvements, but what do you do when those are solved and you still see high bounce rates on your site, low developer application completion, and generally poor adoption of your product? This is where your data can save you.
In this talk we'll run through:
- How to track valuable developer path insights, from moments of anxiety to time to first valuable call.
- Overlaying support and ticketing information on top of developer path data to decrease developer friction.
- How to create automated analytics systems to measure success.
- When these systems should be built, before it's too late.
Better Data with Machine Learning and ServerlessJonathan LeBlanc
Creating valuable insights out of raw data files, such as audio or video, has traditionally been a very manual and tedious process, and has produced mixed results due to an influential human element in the mix.
Thanks to enhancements in machine learning systems, coupled with the rapidly deployable nature of serverless technology as a middleware layer, we are able to create highly sophisticated data insight platforms to replace the huge time requirements that have typically been required in the past.
With this in mind, we’ll look at:
- How to build end-to-end data insight and predictor systems, built on the back of serverless and machine learning systems.
- Best practices for working with serverless technology for ferrying information between raw data files and machine learning systems through an eventing system.
- Considerations and practical examples of working with the security implications of dealing with sensitive information.
Best Practices for Application Development with BoxJonathan LeBlanc
Covering the best practices for building new applications on top of Box platform, including token management, error condition and program flow, architecture, and other such topics.
This topic will go through current standards and future trends for building a scalable security model for distributed cloud based data. We’ll look into practices and considerations behind handing highly privileged data globally, diving into topics such as:
- How global compliance and regulations affect security practices.
- Handling data permissions, identity, and security with application access to data.
- Considerations, trends, and standards for global data availability.
Building a modern API architecture is a constant struggle between ease of development and security. JSON Web Tokens (JWTs) introduce a means of building authentication into JSON objects being transmitted through APIs.
In this session we’ll explore how JWTs work to build verifiable and trusted objects, allowing them to be combined with standards such as OAuth 2 for capturing access tokens, leading to a secure means of JavaScript SDK dev.
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
The future of retail is in removing the divide between the offline shopping state and the enhanced online buying experience. To create this type of enhanced retail experience, we can remove complexities in the process, such as simplifying checkout.
In this session we’ll learn how to use internet-connected microelectronics to attach to a buyer’s mobile device to provide the functionality to buy products right from the aisle.
As web enabled systems become an integral part of everything we interact with, how do we secure data in potential unsecure environments?
In this session you'll learn how to apply fundamental security precepts in potentially insecure environments. Topics include:
Securing identity and payment data through voice commands or text
Tokenization and encryption security
Triggering secure transactions from communications media
We are in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices roaming around unsecured locations, especially when they want to pay for something. Learn the secrets behind building a secure mobile backbone, as we explore how to harden security, build systems based on identity confidence, and work towards a future proofed mobile framework.
The arena of proper auth & data security standards is often some of the most misunderstood, confusing, and tricky aspects of building Node apps. Using open source auth techniques and proper data encryption standards, we’ll learn how to make intelligent decisions on creating a solid infrastructure to protect our users and data. We’ll dive into auth systems, data attack vectors, how to protect your systems, and common security pitfalls in Node.
The screencast of this presentation can be found at https://youtu.be/o3uy7dgG_n4
There is an assumption in the industry, amongst companies large and small alike, that if they store sensitive user data (and sometimes do some mild encryption) in their database, it's locked in and secured from potential attacks. People rely too heavily on their false assumptions of security, and it usually ends up costing them extensively when that is proven wrong.
In this session, Jonathan will build a foundation for identity and data security that everyone dealing with sensitive data should understand. We'll break down concepts of identity security, common attack vectors and how to protect yourself, and how to harden your web application.
Web enabled systems are now an integral part of everything we interact with, from microelectronics to voice enabled hardware, from text messages and phone calls to email, and really we’re just limited by our imaginations as to what we can connect. As we explore vast new realms of communication over mixed digital media, we have to ask ourselves how we protect our critical data within potential unsecure environments. Going beyond that, how do we protect some of our more critical data, payment information, in this same realm.
As we look at a multitude of different environments, we’ll be exploring how to secure user identity and payment information through the communication channels, covering topics like:
* Securing identity and payment data through voice commands or text.
* Tokenization and encryption security.
* Techniques for triggering secure transactions from communications media.
At the end of the session, we’ll have a stronger understanding of proper techniques for working with new communication media sources, and see how we can apply fundamental security precepts in potentially insecure environments.
Audio from the session at OSCON (Portland, OR) on July 22nd, 2015 is available at https://archive.org/details/protecting_future_mobile_payments
We are now in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices as they’re roaming around unsecured locations, especially when we want to pay for something.
In this talk we’re going to rip apart the illusion of mobile security and explore some of the most difficult to secure experiences: payments. We’ll cover the concepts of building a rich feature set to protect the user, how to encrypt all interactions, building scalable trust zones, and extending identification with wearables and biometrics.
In a world where technology is transforming with mobile devices and wearables, its key to have a solid security backbone. From having a strong password to using biometrics, companies are finding ways to help consumers protect themselves without impacting the experience. We'll take a look at the current landscape of passwords, the importance of proper systems and how we can use wearables and mobile devices to build trust systems.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
2012 O'Reilly TOC: Commerce Identity
1. Changing the Face of Identity
Open Commerce In Publishing
Jonathan LeBlanc
Developer Evangelist: X.commerce
Email: jleblanc@x.com
Twitter: @jcleblanc
2. The Gist of This Talk
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
3. The Gist of This Talk: PayPal Access
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
4. The Gist of This Talk: PayPal Access
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
5. The Gist of This Talk: PayPal Access
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
6. What We’re Going to Cover
What is user identity?
How can you use grouping to personalize?
How do you pick the right identity tool?
How does PayPal Access help publishers?
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
7. What We’re Going to Cover
What is user identity?
How can you use grouping to personalize?
How do you pick the right identity tool?
How does PayPal Access help publishers?
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
13. Identity: Statistics From User Browsing Data
Are you tracking what a user is viewing?
Are you categorizing your users?
Are you incentivizing your users?
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
14. Identity: The Different Identity Models
Anonymous
Identity
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
15. Identity: The Different Identity Models
Perceived
Identity
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
16. Identity: The Different Identity Models
True (Verified)
Identity
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
17. What Have We Learned Thus Far?
Identity is more than just a login
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
18. What We’re Going to Cover
What is user identity?
How can you use grouping to personalize?
How do you pick the right identity tool?
How does PayPal Access help publishers?
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
22. What Have We Learned Thus Far?
Identity is more than just a login
Grouping provides insight into users
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
23. What We’re Going to Cover
What is user identity?
How can you use grouping to personalize?
How do you pick the right identity tool?
How does PayPal Access help publishers?
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
24. Identity Tools: Proprietary or Open?
23 % of customers abandoned carts when
asked to register. (Forrester)
45 % left a site when they couldn’t remember
their password. (Blue Inc)
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
25. Identity Tools: It’s Simpler Than You Think
Do you sell anything?
What kind of raw user data do you need?
In what ways do you want to personalize
your product with identity?
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
30. What Have We Learned Thus Far?
Identity is more than just a login
Grouping provides insight into users
The right tool should work for your needs
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
31. What We’re Going to Cover
What is user identity?
How can you use grouping to personalize?
How do you pick the right identity tool?
How does PayPal Access help publishers?
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
32. PayPal Access: The Core Principals
Identity is more than just a login
Grouping provides insight into users
The right tool should work for your needs
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
33. PayPal Access: The Raw Data
Verified Account Addresses
Language Telephone Number
First Name Date of Birth
Last Name Time zone
Full Name Gender
Emails
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
34. PayPal Access: Using the Raw Data
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
35. PayPal Access: Using the Raw Data
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
36. PayPal Access: The Data Sources
Transaction Activity
Recency Class
Transaction Average
Frequency Spent
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
37. Extending Identity with Recommendations
Recommended
Products
Similar
Products
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
38. Group Dynamics with Prospect Scores
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
39. In The End…
Data should help, not hinder
Identity should help extend
your business
X.Commerce (eBay Inc.)
http://www.x.com | @x_commerce
40. Thanks for joining me! Questions?
Slides: https://bitly.com/tocidentity
Jonathan LeBlanc
Developer Evangelist: X.commerce
Email: jleblanc@x.com
Twitter: @jcleblanc
Editor's Notes
Are you tracking what a user is viewing?Use that data to personalize state & suggest productsFacebook likes hard to categorize (entire web) but publishers have a specific inventory that they control.
Identity should include user historical buying data and what they have viewed – recommendation engine
Many times you will have users that aren’t exactly sure what they wantThrough monitoring their browsing and buying behavior you can find “like” usersFrom “like users”, you can recommend products and guide users to products they may like.
Identity should include user historical buying data and what they have viewed – recommendation engine
Identity should include user historical buying data and what they have viewed – recommendation engine
Identity should include user historical buying data and what they have viewed – recommendation engine