SlideShare a Scribd company logo
Context Automation
Phillip J. Windley, Ph.D.
CTO, Kynetx
www.windley.com
What is it?
Connecting the dots
On the web, users connect the
 dots between Web sites in
         their heads
context automation
        ==
connecting the dots
Context is state
Context Examples
Intra-site Context
Single Purpose Context
Context with Data
Amazon and Your Local Library
Trends Driving Context Automation
Trends Driving Context Automation


         Cloud
       Computing
Trends Driving Context Automation


         Cloud     Extensible
       Computing   Browsers
Trends Driving Context Automation


         Cloud          Extensible
       Computing        Browsers




                Internet
               Identities
Trends Driving Context Automation


         Cloud          Extensible
       Computing        Browsers




                Internet
               Identities
The Browser as Platform
 Browsers tie Web sessions
 together
The Browser as Platform
 Browsers tie Web sessions
 together
   1B Firefox add-on
   downloads since 2005*
The Browser as Platform
 Browsers tie Web sessions
 together
   1B Firefox add-on
   downloads since 2005*

   That is about 17/sec*
The Browser as Platform
 Browsers tie Web sessions
 together
   1B Firefox add-on
   downloads since 2005*

   That is about 17/sec*

   Estimates are 2x-5x below
   actual
The Browser as Platform
 Browsers tie Web sessions
 together
      1B Firefox add-on
      downloads since 2005*

      That is about 17/sec*

      Estimates are 2x-5x below
      actual



 *Justin Scott, Mozilla
The Identity Shift
The Identity Shift
   Ad-hoc
     IP Address
     Machine
     Cookie
     Session
     SSL
The Identity Shift
   Ad-hoc
     IP Address
     Machine
     Cookie
     Session
     SSL

    Security & privacy at
    the expense of
    convenience

    Website dependent
    identity only
The Identity Shift
   Ad-hoc                   Structured
     IP Address                Browser
     Machine                  Individual
     Cookie                   Identity
     Session                  Relationships
     SSL                      Reputation

    Security & privacy at
    the expense of
    convenience

    Website dependent
    identity only
The Identity Shift
   Ad-hoc                   Structured
     IP Address                Browser
     Machine                  Individual
     Cookie                   Identity
     Session                  Relationships
     SSL                      Reputation

    Security & privacy at    Convenience with
    the expense of           privacy, security &
    convenience              relationships

    Website dependent        Consistent website
    identity only            independent identity
Information Cards
Information Cards
   Microsoft developed standard
Information Cards
   Microsoft developed standard
   Information Card Foundation
Information Cards
   Microsoft developed standard
   Information Card Foundation
   User participation
Information Cards
   Microsoft developed standard
   Information Card Foundation
   User participation
   Firm, technical foundation for
   security and privacy
Information Card Types
Information Card Types

   Personal cards
Information Card Types

   Personal cards
   Managed cards
Information Card Types

   Personal cards
   Managed cards
   Action cards
The Information Card Selector
Context automation rocks when
 supported by cloud services,
browser extensions, & internet
            identity
Context automation works by
augmenting Web sites with new
   information for the user
The Web Augmentation Spectrum




 Javascript in
 the browser
The Web Augmentation Spectrum




                  Media
                 Toolbars


 Javascript in
 the browser
The Web Augmentation Spectrum




                  Media
                 Toolbars
                            Search
                            Context
 Javascript in
 the browser
The Web Augmentation Spectrum




                                      Context
                                      Platform
                  Media
                 Toolbars
                            Search
                            Context
 Javascript in
 the browser
What you get from the cloud...
What you get from the cloud...

   Machine independence
What you get from the cloud...

   Machine independence
   Hassle-free updates
What you get from the cloud...

   Machine independence
   Hassle-free updates
   Increased security
What you get from the cloud...

   Machine independence
   Hassle-free updates
   Increased security
   Auditing & analytics
What you get from identity...
What you get from identity...

   Individualized
What you get from identity...

   Individualized
   Structured browsing
What you get from identity...

   Individualized
   Structured browsing
   Privacy
What you get from identity...

   Individualized
   Structured browsing
   Privacy
   Security
Kynetx
         &
Context Automation
How Kynetx Works
1




    How Kynetx Works
1
        2




    How Kynetx Works
1
        2



            3




    How Kynetx Works
4




1
        2



            3




    How Kynetx Works
Kynetx Rule Language (KRL)
Sometimes a layer of indirection helps...
Kynetx Rule Language (KRL)
Sometimes a layer of indirection helps...

   Domain specific language
Kynetx Rule Language (KRL)
Sometimes a layer of indirection helps...

   Domain specific language
   Browser and platform independent
Kynetx Rule Language (KRL)
Sometimes a layer of indirection helps...

   Domain specific language
   Browser and platform independent
   Mental leverage via abstractions
KRL Rulesets
KRL Rulesets

  Select page via URL class
KRL Rulesets

  Select page via URL class
  Declare and access data sources
KRL Rulesets

  Select page via URL class
  Declare and access data sources
  Conditionally fire action
KRL Rulesets

  Select page via URL class
  Declare and access data sources
  Conditionally fire action
  Process callbacks
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
KRL for Library Lookup
Information cards advantages
Information cards advantages
   Signed
Information cards advantages
   Signed
   Uniquely identified
Information cards advantages
   Signed
   Uniquely identified
   Protect user data
Information cards advantages
   Signed
   Uniquely identified
   Protect user data
   Hidden security
Information cards advantages
   Signed
   Uniquely identified
   Protect user data
   Hidden security
   Nice metaphor
Can we hack a card?
Can we hack a card?
RE
   JEC
       T
ED
    !!
Malicious apps can be
identified and disabled
Kynetx Developer Beta
Kynetx Developer Beta
Kynetx Developer Beta
 Free (under quota)
Kynetx Developer Beta
 Free (under quota)
 Limited number
Kynetx Developer Beta
 Free (under quota)
 Limited number
 See me for signup card
Cloud          Extensible
Computing        Browsers




         Internet
        Identities
Cloud          Extensible
Computing        Browsers




         Internet
        Identities
Cloud          Extensible
Computing        Browsers



                              Safe
         Internet
        Identities
Cloud          Extensible
Computing        Browsers



                              Safe
         Internet
                              Secure
        Identities
Cloud          Extensible
Computing        Browsers



                              Safe
         Internet
                              Secure
        Identities
                              Individualized
Cloud          Extensible
Computing        Browsers



                              Safe
         Internet
                              Secure
        Identities
                              Individualized
                              Flexible
Cloud          Extensible
Computing        Browsers



                              Safe
         Internet
                              Secure
        Identities
                              Individualized
                              Flexible
                              Powerful
More information...

   Read the white paper:
    http://www.kynetx.com
   Our developer site
    http://code.kynetx.com/
Context
Automation


?
     Contact info:
    phil@windley.org
    www.windley.com
        @windley
Context Automation

More Related Content

What's hot

Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
Hitachi ID Systems, Inc.
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
IndicThreads
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
How Does Code Signing Works?
How Does Code Signing Works?How Does Code Signing Works?
How Does Code Signing Works?
AboutSSL
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Michael Noel
 
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsUsing Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Novell
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
SSL Certificate and Code Signing
SSL Certificate and Code SigningSSL Certificate and Code Signing
SSL Certificate and Code Signing
Li-Wei Yao
 
P hallam baker_keynote
P hallam baker_keynoteP hallam baker_keynote
P hallam baker_keynoteshindeshekhar
 
Leveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsLeveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsAvtex
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
FIDO Alliance
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsOlivier Potonniée
 
Authentication Concepts
Authentication ConceptsAuthentication Concepts
Authentication Concepts
Charles Southerland
 
Reinforcing Your Enterprise With Security Architectures
Reinforcing Your Enterprise With Security ArchitecturesReinforcing Your Enterprise With Security Architectures
Reinforcing Your Enterprise With Security Architectures
Uthaiyashankar
 
Planning Your Cloud Strategy
Planning Your Cloud StrategyPlanning Your Cloud Strategy
Planning Your Cloud Strategy
Uthaiyashankar
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications Overview
FIDO Alliance
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
Uthaiyashankar
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonEduserv
 

What's hot (20)

Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
How Does Code Signing Works?
How Does Code Signing Works?How Does Code Signing Works?
How Does Code Signing Works?
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsUsing Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
SSL Certificate and Code Signing
SSL Certificate and Code SigningSSL Certificate and Code Signing
SSL Certificate and Code Signing
 
P hallam baker_keynote
P hallam baker_keynoteP hallam baker_keynote
P hallam baker_keynote
 
Leveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsLeveraging SharePoint for Extranets
Leveraging SharePoint for Extranets
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
Authentication Concepts
Authentication ConceptsAuthentication Concepts
Authentication Concepts
 
Reinforcing Your Enterprise With Security Architectures
Reinforcing Your Enterprise With Security ArchitecturesReinforcing Your Enterprise With Security Architectures
Reinforcing Your Enterprise With Security Architectures
 
Planning Your Cloud Strategy
Planning Your Cloud StrategyPlanning Your Cloud Strategy
Planning Your Cloud Strategy
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications Overview
 
Certification Authority - Sergio Lietti
Certification Authority - Sergio LiettiCertification Authority - Sergio Lietti
Certification Authority - Sergio Lietti
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
 

Similar to Context Automation

Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
ForgeRock
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Maxim Salnikov
 
Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017
Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017
Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017
Eran Stiller
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
ForgeRock
 
Cybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something biggerCybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something bigger
Ben Boyd
 
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
Mike Walker
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the Cloud
CloudIDSummit
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
Morgan Simonsen
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
Shahar Geiger Maor
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
ForgeRock
 
Blockchain Cybersecurity Development
Blockchain Cybersecurity DevelopmentBlockchain Cybersecurity Development
Blockchain Cybersecurity Development
Mobiloitte Technologies
 
Blockchain Cybersecurity
Blockchain CybersecurityBlockchain Cybersecurity
Blockchain Cybersecurity
Mobiloitte Technologies
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010Michael Noel
 
Oscon anatomy of_os_cloud_ecosystem
Oscon anatomy of_os_cloud_ecosystemOscon anatomy of_os_cloud_ecosystem
Oscon anatomy of_os_cloud_ecosystemhtdvul
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricSpiffy
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Amazon Web Services
 
Ad fs
Ad fsAd fs
TechNet Event: August 2011 Cloud Essentials
TechNet Event: August 2011 Cloud EssentialsTechNet Event: August 2011 Cloud Essentials
TechNet Event: August 2011 Cloud Essentials
Harold Wong
 
Client & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit SplunkClient & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit Splunk
Georg Knon
 

Similar to Context Automation (20)

Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017
Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017
Building an IoT Massive Multiplayer Game in 60 Minutes - TechBash 2017
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
 
Cybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something biggerCybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something bigger
 
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the Cloud
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
 
Blockchain Cybersecurity Development
Blockchain Cybersecurity DevelopmentBlockchain Cybersecurity Development
Blockchain Cybersecurity Development
 
Blockchain Cybersecurity
Blockchain CybersecurityBlockchain Cybersecurity
Blockchain Cybersecurity
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010
 
Oscon anatomy of_os_cloud_ecosystem
Oscon anatomy of_os_cloud_ecosystemOscon anatomy of_os_cloud_ecosystem
Oscon anatomy of_os_cloud_ecosystem
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App Fabric
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
ekey+ Presentation
ekey+ Presentationekey+ Presentation
ekey+ Presentation
 
Ad fs
Ad fsAd fs
Ad fs
 
TechNet Event: August 2011 Cloud Essentials
TechNet Event: August 2011 Cloud EssentialsTechNet Event: August 2011 Cloud Essentials
TechNet Event: August 2011 Cloud Essentials
 
Client & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit SplunkClient & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit Splunk
 

More from Phil Windley

Trust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityTrust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn Identity
Phil Windley
 
A University API
A University APIA University API
A University API
Phil Windley
 
Rule Language for IoT
Rule Language for IoTRule Language for IoT
Rule Language for IoT
Phil Windley
 
Events, Picos, and Microservices
Events, Picos, and MicroservicesEvents, Picos, and Microservices
Events, Picos, and Microservices
Phil Windley
 
Picos, CloudOS, and Connecting Things
Picos, CloudOS, and Connecting ThingsPicos, CloudOS, and Connecting Things
Picos, CloudOS, and Connecting Things
Phil Windley
 
Events, Picos, and Microservices
Events, Picos, and MicroservicesEvents, Picos, and Microservices
Events, Picos, and Microservices
Phil Windley
 
Relationships: Modeling the Vehicle Ecosystem with Fuse
Relationships: Modeling the Vehicle Ecosystem with FuseRelationships: Modeling the Vehicle Ecosystem with Fuse
Relationships: Modeling the Vehicle Ecosystem with Fuse
Phil Windley
 
Connecting Things
Connecting ThingsConnecting Things
Connecting Things
Phil Windley
 
Persistent Compute Objects and the Fabric of Cyberspace
Persistent Compute Objects and the Fabric of CyberspacePersistent Compute Objects and the Fabric of Cyberspace
Persistent Compute Objects and the Fabric of Cyberspace
Phil Windley
 
Persistent Compute Objects - Picos
Persistent Compute Objects - PicosPersistent Compute Objects - Picos
Persistent Compute Objects - Picos
Phil Windley
 
Fuse Technical Presentation
Fuse Technical PresentationFuse Technical Presentation
Fuse Technical Presentation
Phil Windley
 
Personal Cloud Application Architectures
Personal Cloud Application ArchitecturesPersonal Cloud Application Architectures
Personal Cloud Application Architectures
Phil Windley
 
Why Personal Clouds
Why Personal CloudsWhy Personal Clouds
Why Personal Clouds
Phil Windley
 
Personal Cloud Operating Systems
Personal Cloud Operating SystemsPersonal Cloud Operating Systems
Personal Cloud Operating Systems
Phil Windley
 
Introducing Personal Event Networks
Introducing Personal Event NetworksIntroducing Personal Event Networks
Introducing Personal Event NetworksPhil Windley
 
The Live Web #SCITDA11 Keynote
The Live Web #SCITDA11 KeynoteThe Live Web #SCITDA11 Keynote
The Live Web #SCITDA11 Keynote
Phil Windley
 
Shaping strategies and Startups
Shaping strategies and StartupsShaping strategies and Startups
Shaping strategies and Startups
Phil Windley
 
Shaping Strategies and the Live Web - Kynetx Impact 2011
Shaping Strategies and the Live Web - Kynetx Impact 2011Shaping Strategies and the Live Web - Kynetx Impact 2011
Shaping Strategies and the Live Web - Kynetx Impact 2011
Phil Windley
 
The Evented Web Makes Users Happy
The Evented Web Makes Users HappyThe Evented Web Makes Users Happy
The Evented Web Makes Users Happy
Phil Windley
 

More from Phil Windley (20)

Trust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityTrust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn Identity
 
A University API
A University APIA University API
A University API
 
Rule Language for IoT
Rule Language for IoTRule Language for IoT
Rule Language for IoT
 
Events, Picos, and Microservices
Events, Picos, and MicroservicesEvents, Picos, and Microservices
Events, Picos, and Microservices
 
Picos, CloudOS, and Connecting Things
Picos, CloudOS, and Connecting ThingsPicos, CloudOS, and Connecting Things
Picos, CloudOS, and Connecting Things
 
Events, Picos, and Microservices
Events, Picos, and MicroservicesEvents, Picos, and Microservices
Events, Picos, and Microservices
 
Relationships: Modeling the Vehicle Ecosystem with Fuse
Relationships: Modeling the Vehicle Ecosystem with FuseRelationships: Modeling the Vehicle Ecosystem with Fuse
Relationships: Modeling the Vehicle Ecosystem with Fuse
 
Fuse 2
Fuse 2Fuse 2
Fuse 2
 
Connecting Things
Connecting ThingsConnecting Things
Connecting Things
 
Persistent Compute Objects and the Fabric of Cyberspace
Persistent Compute Objects and the Fabric of CyberspacePersistent Compute Objects and the Fabric of Cyberspace
Persistent Compute Objects and the Fabric of Cyberspace
 
Persistent Compute Objects - Picos
Persistent Compute Objects - PicosPersistent Compute Objects - Picos
Persistent Compute Objects - Picos
 
Fuse Technical Presentation
Fuse Technical PresentationFuse Technical Presentation
Fuse Technical Presentation
 
Personal Cloud Application Architectures
Personal Cloud Application ArchitecturesPersonal Cloud Application Architectures
Personal Cloud Application Architectures
 
Why Personal Clouds
Why Personal CloudsWhy Personal Clouds
Why Personal Clouds
 
Personal Cloud Operating Systems
Personal Cloud Operating SystemsPersonal Cloud Operating Systems
Personal Cloud Operating Systems
 
Introducing Personal Event Networks
Introducing Personal Event NetworksIntroducing Personal Event Networks
Introducing Personal Event Networks
 
The Live Web #SCITDA11 Keynote
The Live Web #SCITDA11 KeynoteThe Live Web #SCITDA11 Keynote
The Live Web #SCITDA11 Keynote
 
Shaping strategies and Startups
Shaping strategies and StartupsShaping strategies and Startups
Shaping strategies and Startups
 
Shaping Strategies and the Live Web - Kynetx Impact 2011
Shaping Strategies and the Live Web - Kynetx Impact 2011Shaping Strategies and the Live Web - Kynetx Impact 2011
Shaping Strategies and the Live Web - Kynetx Impact 2011
 
The Evented Web Makes Users Happy
The Evented Web Makes Users HappyThe Evented Web Makes Users Happy
The Evented Web Makes Users Happy
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Context Automation

Editor's Notes

  1. imagine that the dots are Web sites and the user is going from web site to web site to accomplish some task.
  2. existing browsers offer little help with this task Nearly everything we do only involves multiple Web sites, but there’s no help in connecting them.
  3. context is: - relevant data to the Web task - links multiple sites - what the user cares about CA generates a browsing experience that links together formerly disconnected experiences and ven modifies individual sites.
  4. Cookies and sessions are a way of creating context within a single site HTTP is designed to be stateless. Each page stands alone.
  5. Single sign on is an example of cross-site context - single purpose: authentication context - still not leveraging this as we could. Having a single login that works on multiple sites isn’t the same as having a single authentication context for a given Web episode.
  6. TrustWatch is a browser extension that provides a security context for users that uses a could-based service for site verification.
  7. FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  8. FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  9. FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  10. FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  11. - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  12. - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  13. - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  14. - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  15. Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  16. Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  17. Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  18. Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  19. Greasemonkey - scripts on the browser not the cloud
  20. Greasemonkey - scripts on the browser not the cloud
  21. Greasemonkey - scripts on the browser not the cloud
  22. Structure browsing - connects the dots and threads the experience opt-in, user controlled
  23. Structure browsing - connects the dots and threads the experience opt-in, user controlled
  24. Structure browsing - connects the dots and threads the experience opt-in, user controlled
  25. Structure browsing - connects the dots and threads the experience opt-in, user controlled
  26. No one’s ever surprised me with a GUI
  27. No one’s ever surprised me with a GUI
  28. No one’s ever surprised me with a GUI
  29. The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  30. The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  31. The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  32. The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  33. The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  34. The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...