In a world where technology is transforming with mobile devices and wearables, its key to have a solid security backbone. From having a strong password to using biometrics, companies are finding ways to help consumers protect themselves without impacting the experience. We'll take a look at the current landscape of passwords, the importance of proper systems and how we can use wearables and mobile devices to build trust systems.
Audio from the session at OSCON (Portland, OR) on July 22nd, 2015 is available at https://archive.org/details/protecting_future_mobile_payments
We are now in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices as they’re roaming around unsecured locations, especially when we want to pay for something.
In this talk we’re going to rip apart the illusion of mobile security and explore some of the most difficult to secure experiences: payments. We’ll cover the concepts of building a rich feature set to protect the user, how to encrypt all interactions, building scalable trust zones, and extending identification with wearables and biometrics.
Building a Mobile Location Aware System with BeaconsJonathan LeBlanc
Audio from talk (OSCON - July 22nd, 2015): https://archive.org/details/oscon_mobile_location_aware_systems_with_beacons
What if instead of a broad location, you could have pinpoint location awareness of someone in a physical space. How could this change everything about how we interact with the physical world? In this session we will be exploring Beacon technology, which enables this, the underlying Bluetooth Smart standard, and how we can use these systems to change everything from shopping, to accessibility for the disabled, all built on top of a mobile device.
You have a solid security infrastructure, all user data is encrypted, your users are protected right? As long as passwords remain the standard methods for identifying your users on the web, people will still continue to use "letmein" or "password123" for their secure login, and will continue to be shocked when their accounts become compromised.
Passwords are not secure, they need to be replaced. In this talk we're going to explore the pitfalls of a system designed around a username and password, then dive into the ways that technology is giving us a slew of new ways to build a secure user identity system. From biometrics to wearables, hardware to tokens, we'll explore a multitude of ways that we can finally kill all passwords.
Mobile Authentication using Biometrics & WearablesJonathan LeBlanc
Have you ever had to implement a client- or server-side authentication system and actually enjoyed it? Did you ever notice the wide landscape of mechanisms that seem to be complementary but are in fact hard to combine? As we move towards mobile-centric technology and wearables, this landscape becomes even more difficult to navigate.
Centralized group and identification mechanisms are starting to rise to fill this need, building out standards for how authentication should be implemented on emerging technology and devices. As these areas develop, the need for new security measures is also becoming paramount.
Come and join Jon Leblanc and Tim Messerschmidt from PayPal to learn about how identification, through biometrics, is being used to build the future of mobile centric devices and technology, breaking into the world of wearables. We’ll look at the security behind this technology, and see where the future of biometrics is leading us.
Presentation from #MixWest14 in Indianapolis, IN on August 1. This is the 15th version of the consumer behavior deck I've presented over the past year. Added new numbers on revenue lift using content personalization and a new trend - Collaborative Economy.
Technology Trends Changing Consumer Behavior - Presentation at ZapposKyle Lacy
Presentation given at the Zappos HQ on trends changing consumer behavior in email, mobile, social and digital marketing. The future of marketing is very much dependent on the personalization of content and integration of data.
Audio from the session at OSCON (Portland, OR) on July 22nd, 2015 is available at https://archive.org/details/protecting_future_mobile_payments
We are now in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices as they’re roaming around unsecured locations, especially when we want to pay for something.
In this talk we’re going to rip apart the illusion of mobile security and explore some of the most difficult to secure experiences: payments. We’ll cover the concepts of building a rich feature set to protect the user, how to encrypt all interactions, building scalable trust zones, and extending identification with wearables and biometrics.
Building a Mobile Location Aware System with BeaconsJonathan LeBlanc
Audio from talk (OSCON - July 22nd, 2015): https://archive.org/details/oscon_mobile_location_aware_systems_with_beacons
What if instead of a broad location, you could have pinpoint location awareness of someone in a physical space. How could this change everything about how we interact with the physical world? In this session we will be exploring Beacon technology, which enables this, the underlying Bluetooth Smart standard, and how we can use these systems to change everything from shopping, to accessibility for the disabled, all built on top of a mobile device.
You have a solid security infrastructure, all user data is encrypted, your users are protected right? As long as passwords remain the standard methods for identifying your users on the web, people will still continue to use "letmein" or "password123" for their secure login, and will continue to be shocked when their accounts become compromised.
Passwords are not secure, they need to be replaced. In this talk we're going to explore the pitfalls of a system designed around a username and password, then dive into the ways that technology is giving us a slew of new ways to build a secure user identity system. From biometrics to wearables, hardware to tokens, we'll explore a multitude of ways that we can finally kill all passwords.
Mobile Authentication using Biometrics & WearablesJonathan LeBlanc
Have you ever had to implement a client- or server-side authentication system and actually enjoyed it? Did you ever notice the wide landscape of mechanisms that seem to be complementary but are in fact hard to combine? As we move towards mobile-centric technology and wearables, this landscape becomes even more difficult to navigate.
Centralized group and identification mechanisms are starting to rise to fill this need, building out standards for how authentication should be implemented on emerging technology and devices. As these areas develop, the need for new security measures is also becoming paramount.
Come and join Jon Leblanc and Tim Messerschmidt from PayPal to learn about how identification, through biometrics, is being used to build the future of mobile centric devices and technology, breaking into the world of wearables. We’ll look at the security behind this technology, and see where the future of biometrics is leading us.
Presentation from #MixWest14 in Indianapolis, IN on August 1. This is the 15th version of the consumer behavior deck I've presented over the past year. Added new numbers on revenue lift using content personalization and a new trend - Collaborative Economy.
Technology Trends Changing Consumer Behavior - Presentation at ZapposKyle Lacy
Presentation given at the Zappos HQ on trends changing consumer behavior in email, mobile, social and digital marketing. The future of marketing is very much dependent on the personalization of content and integration of data.
Identity in the Future of Embeddables & WearablesJonathan LeBlanc
The audio recording of this talk is available at https://archive.org/details/identity_wearables_embeddables
Ways of identifying a person to the technology around them is shifting from antiquated external body definitions, to internal body functions. In this session, we'll explore how the technology behind this embeddable and wearable movement works, exploring vein recognition biometrics, heartbeat identification, and going into embeddable body modifications as sources of identification.
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...PayPalX Developer Network
Outsourcing identity-related services—such as customer authentication—to PayPal could speed your application development, save you the hassle of dealing with password resets, and give your customers a shorter and easier path to purchases. An authentication service is just one example of the identity services we've got planned. Come learn how all of them can improve business opportunities and enhance user experiences.
PayPal Access presentation for internal eBay hackathon (April 30th, 2012). The live coding portion of the talk went through the samples available at https://github.com/jcleblanc/oauth/tree/master/oauth2-php-paypal/
The audio for this presentation is available at https://archive.org/details/future_of_using_money
The lines between online and office commerce have completely blurred into a new age of connected commerce, and mobile technologies have risen to become the central point of that digital revolution. These changes in the mindset behind how we shop have simplified entrepreneurship within the physical space, and have streamlined the digital world to the point where the wallet is a dying necessity. In this session, we will delve into the technology that is driving the new age of commerce, and how new architectural models for buying and selling are becoming the new standard, including:
- The specifications behind how bluetooth low energy (BLE) technology is being used to create on-demand popup shops, facilitating commerce between any bluetooth connected devices.
- How open identity technology is being used as an instigator of commerce.
- Case studies on the ways mobile has changed the traditional ways we shop.
Creating a User-Centric Mobile Payment ArchitectureJonathan LeBlanc
Payment architectures are no longer flat experiences that are static for all users. Mobile experiences have become personalized, providing an identity infrastructure to promote payment ease for users. Through the lessons learned from a mobile first PayPal product overhaul, we'll explore how identity and in-app purchasing coalesce to create a scalable mobile payment infrastructure, looking into how building cross-platform payment personalization increasing user ease and revenue.
ES6 is coming and it’s chock-full of really amazing features. PayPal recently started adopting certain ES6 features and Jamund will show what parts of the language they are using, how they are able to use it today and the performance impact.
Building a modern API architecture is a constant struggle between ease of development and security. JSON Web Tokens (JWTs) introduce a means of building authentication into JSON objects being transmitted through APIs.
In this session we’ll explore how JWTs work to build verifiable and trusted objects, allowing them to be combined with standards such as OAuth 2 for capturing access tokens, leading to a secure means of JavaScript SDK dev.
Mobile devices are becoming a central point for the future of hardware and technology that is enabling commerce in the online and offline world. Being the enabler between body monitoring identification systems, wearable pairing, and merchant-based hardware and software, mobile hardware is becoming the most important central piece of technology towards the future of commerce.
As we look into the technology that is enabling this next stage of mobile commerce growth, we’ll explore the identification systems, hardware prototypes, digital currencies, and open technology that is becoming an accessory to this new mobile payments world.
Creating a mobile app is only half the battle. The other half is to get people to buy it. The slides in this deck, created by Jamie Turner, co-author of Go Mobile, highlight the best ways you can get people to download your app regularly.
Wouldn’t you like to know the future of staffing software? Of course, you would — and by attending this webinar you’ll learn the 10 most critical trends in staffing tech. By understanding these trends and what’s driving them, you’ll make better staffing technology purchases. Staffing tech isn’t rocket science, but technology advancements are moving quite fast. Our three goals for this session are that you’re aware, you understand and you’re confident about the immediate future of staffing tech.
During this session, you will learn about:
Get a full map of the current HCM software market.
Find out the 10 staffing tech trends you’ll need to watch.
Understand how evolving staffing tech will affect your work.
"Death To Passwords" was delivered at Mobile Tech Con 2014 in Munich. It's a talk covering the base weaknesses of passwords and which alternative technologies can help surpassing these.
Mythbusting Websites: What Prospects Value About #HigherEd Websites (and What...mStoner, Inc.
Prospective students — especially teens — are a prime audience for a college website. But do we really know what teens are looking for when they visit your .edu? We designed, in partnership with mStoner, Inc. and Higher Ed Live, a survey asking teens to share their frank opinions of the college websites they’ve visited.
We asked them to tell us what they looked for on websites when they were researching colleges, choosing where to apply, and deciding which to attend. What did they like about the sites they visited? What was the most important content — and when was it important? What were the frustrations they experienced? What were the best sites they looked at? And they didn’t hold back.
Next, we sent the same survey to admission staff, web developers, designers, and marketers at colleges who were designing and redesigning websites for this key audience. We wanted to find out what they knew (or thought they knew) about what teens wanted.
The resulting presentation will explore where their perspectives converge — and where they differ — and how marketers can leverage this knowledge.
What You Will Learn
• What’s important, when. Knowing what kind of content students value and when in their college search and choice process they particularly value it helps college and university staff tune up websites and informs content strategy and storytelling.
• Where the problems are on .edu websites. Identifying typical problems on college websites helps colleges to ensure that they address those issues on their own sites.
• Where to invest your time and resources. You’ll learn what kinds of content prospects value so you can create more of it: If prospects don’t value alumni profiles, why create them?
• What college web, marketing, and admissions professionals don’t understand about what teens do on their sites. We’ll highlight significant disconnects between what on-campus professionals think they know about what teens do, and what they actually do.
Larry Maccherone: "Probabilistic Decision Making"RedHatAgileDay
From Red Hat Agile Day Oct 20, 2015 Session 4 Advanced Track:
You know “collaboration over contract negotiation’, right? However, metrics often drive a wedge between management and the team, none more so than forecasting metrics. However, when you give a probability distribution as the answer to the question, “When will we get it?” instead of a single date, an amazing transformation happens. Suddenly, the team and management start working together to manage tradeoffs and risk.
You need two things to take advantage of this paradigm shift: 1) How do you start to think probabilistically?; and 2) How do you generate a probabilistic forecast or analysis? This talk provides mindset shifts necessary for #1 and lots of worked out practical examples for #2.
Passwordless is Possible - How to Remove Passwords and Improve Security SecureAuth
According to the latest Verizon Data Breach Report, breaches caused by stolen or weak credentials are on the rise – up to 81% in 2016. While there is no denying that we need to remove our dependency on the password as a primary method of authentication, the question remains how do we get there?
This SC Magazine-hosted Webinar featured SecureAuth CTO Keith Graham discussing how passwordless authentication is possible today, the considerations needed when moving to a password–free world and how removing passwords as your weakest link can increase security while providing a great user experience.
Keynote presentation for the Peak Campus Conference in Atlanta, GA on 1/12/17. We talk about two current technology disruption business and what we must do to evolve. At the core, this presentation is filled with tips to building sustainable growth by focusing on the foundation of digital change and not the hype.
Using metrics to influence developers, executives, and stakeholdersLarry Maccherone
The evening before the space shuttle Challenger explosion, engineers at NASA caught what they thought was a potentially catastrophic risk with the o-rings considering the unusually cold temperature expected for the morning’s launch. They brought the issue to management attention but failed to influence the final decision enough to stop the launch. As a leader in your organization, your failure to influence may not cost lives but it could be “catastrophic” for your business.
Identity in the Future of Embeddables & WearablesJonathan LeBlanc
The audio recording of this talk is available at https://archive.org/details/identity_wearables_embeddables
Ways of identifying a person to the technology around them is shifting from antiquated external body definitions, to internal body functions. In this session, we'll explore how the technology behind this embeddable and wearable movement works, exploring vein recognition biometrics, heartbeat identification, and going into embeddable body modifications as sources of identification.
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...PayPalX Developer Network
Outsourcing identity-related services—such as customer authentication—to PayPal could speed your application development, save you the hassle of dealing with password resets, and give your customers a shorter and easier path to purchases. An authentication service is just one example of the identity services we've got planned. Come learn how all of them can improve business opportunities and enhance user experiences.
PayPal Access presentation for internal eBay hackathon (April 30th, 2012). The live coding portion of the talk went through the samples available at https://github.com/jcleblanc/oauth/tree/master/oauth2-php-paypal/
The audio for this presentation is available at https://archive.org/details/future_of_using_money
The lines between online and office commerce have completely blurred into a new age of connected commerce, and mobile technologies have risen to become the central point of that digital revolution. These changes in the mindset behind how we shop have simplified entrepreneurship within the physical space, and have streamlined the digital world to the point where the wallet is a dying necessity. In this session, we will delve into the technology that is driving the new age of commerce, and how new architectural models for buying and selling are becoming the new standard, including:
- The specifications behind how bluetooth low energy (BLE) technology is being used to create on-demand popup shops, facilitating commerce between any bluetooth connected devices.
- How open identity technology is being used as an instigator of commerce.
- Case studies on the ways mobile has changed the traditional ways we shop.
Creating a User-Centric Mobile Payment ArchitectureJonathan LeBlanc
Payment architectures are no longer flat experiences that are static for all users. Mobile experiences have become personalized, providing an identity infrastructure to promote payment ease for users. Through the lessons learned from a mobile first PayPal product overhaul, we'll explore how identity and in-app purchasing coalesce to create a scalable mobile payment infrastructure, looking into how building cross-platform payment personalization increasing user ease and revenue.
ES6 is coming and it’s chock-full of really amazing features. PayPal recently started adopting certain ES6 features and Jamund will show what parts of the language they are using, how they are able to use it today and the performance impact.
Building a modern API architecture is a constant struggle between ease of development and security. JSON Web Tokens (JWTs) introduce a means of building authentication into JSON objects being transmitted through APIs.
In this session we’ll explore how JWTs work to build verifiable and trusted objects, allowing them to be combined with standards such as OAuth 2 for capturing access tokens, leading to a secure means of JavaScript SDK dev.
Mobile devices are becoming a central point for the future of hardware and technology that is enabling commerce in the online and offline world. Being the enabler between body monitoring identification systems, wearable pairing, and merchant-based hardware and software, mobile hardware is becoming the most important central piece of technology towards the future of commerce.
As we look into the technology that is enabling this next stage of mobile commerce growth, we’ll explore the identification systems, hardware prototypes, digital currencies, and open technology that is becoming an accessory to this new mobile payments world.
Creating a mobile app is only half the battle. The other half is to get people to buy it. The slides in this deck, created by Jamie Turner, co-author of Go Mobile, highlight the best ways you can get people to download your app regularly.
Wouldn’t you like to know the future of staffing software? Of course, you would — and by attending this webinar you’ll learn the 10 most critical trends in staffing tech. By understanding these trends and what’s driving them, you’ll make better staffing technology purchases. Staffing tech isn’t rocket science, but technology advancements are moving quite fast. Our three goals for this session are that you’re aware, you understand and you’re confident about the immediate future of staffing tech.
During this session, you will learn about:
Get a full map of the current HCM software market.
Find out the 10 staffing tech trends you’ll need to watch.
Understand how evolving staffing tech will affect your work.
"Death To Passwords" was delivered at Mobile Tech Con 2014 in Munich. It's a talk covering the base weaknesses of passwords and which alternative technologies can help surpassing these.
Mythbusting Websites: What Prospects Value About #HigherEd Websites (and What...mStoner, Inc.
Prospective students — especially teens — are a prime audience for a college website. But do we really know what teens are looking for when they visit your .edu? We designed, in partnership with mStoner, Inc. and Higher Ed Live, a survey asking teens to share their frank opinions of the college websites they’ve visited.
We asked them to tell us what they looked for on websites when they were researching colleges, choosing where to apply, and deciding which to attend. What did they like about the sites they visited? What was the most important content — and when was it important? What were the frustrations they experienced? What were the best sites they looked at? And they didn’t hold back.
Next, we sent the same survey to admission staff, web developers, designers, and marketers at colleges who were designing and redesigning websites for this key audience. We wanted to find out what they knew (or thought they knew) about what teens wanted.
The resulting presentation will explore where their perspectives converge — and where they differ — and how marketers can leverage this knowledge.
What You Will Learn
• What’s important, when. Knowing what kind of content students value and when in their college search and choice process they particularly value it helps college and university staff tune up websites and informs content strategy and storytelling.
• Where the problems are on .edu websites. Identifying typical problems on college websites helps colleges to ensure that they address those issues on their own sites.
• Where to invest your time and resources. You’ll learn what kinds of content prospects value so you can create more of it: If prospects don’t value alumni profiles, why create them?
• What college web, marketing, and admissions professionals don’t understand about what teens do on their sites. We’ll highlight significant disconnects between what on-campus professionals think they know about what teens do, and what they actually do.
Larry Maccherone: "Probabilistic Decision Making"RedHatAgileDay
From Red Hat Agile Day Oct 20, 2015 Session 4 Advanced Track:
You know “collaboration over contract negotiation’, right? However, metrics often drive a wedge between management and the team, none more so than forecasting metrics. However, when you give a probability distribution as the answer to the question, “When will we get it?” instead of a single date, an amazing transformation happens. Suddenly, the team and management start working together to manage tradeoffs and risk.
You need two things to take advantage of this paradigm shift: 1) How do you start to think probabilistically?; and 2) How do you generate a probabilistic forecast or analysis? This talk provides mindset shifts necessary for #1 and lots of worked out practical examples for #2.
Passwordless is Possible - How to Remove Passwords and Improve Security SecureAuth
According to the latest Verizon Data Breach Report, breaches caused by stolen or weak credentials are on the rise – up to 81% in 2016. While there is no denying that we need to remove our dependency on the password as a primary method of authentication, the question remains how do we get there?
This SC Magazine-hosted Webinar featured SecureAuth CTO Keith Graham discussing how passwordless authentication is possible today, the considerations needed when moving to a password–free world and how removing passwords as your weakest link can increase security while providing a great user experience.
Keynote presentation for the Peak Campus Conference in Atlanta, GA on 1/12/17. We talk about two current technology disruption business and what we must do to evolve. At the core, this presentation is filled with tips to building sustainable growth by focusing on the foundation of digital change and not the hype.
Using metrics to influence developers, executives, and stakeholdersLarry Maccherone
The evening before the space shuttle Challenger explosion, engineers at NASA caught what they thought was a potentially catastrophic risk with the o-rings considering the unusually cold temperature expected for the morning’s launch. They brought the issue to management attention but failed to influence the final decision enough to stop the launch. As a leader in your organization, your failure to influence may not cost lives but it could be “catastrophic” for your business.
Wild Apricot Expert Webinar: 5 Ways Nonprofits are Actually Attracting New Me...Wild Apricot
If you are spending a ton of time promoting your organization on social media without getting any real results, you’re not alone — many organizations struggle with this. That’s why we’re bringing in nonprofit social media expert and author Julia Campbell for our webinar on August 21. In this session, Julia will reveal exactly how small and mid-sized nonprofits are attracting new members through social media.
In this free webinar, you will learn:
- 7 common pitfalls that make your social updates less effective, and what to do instead
- The real strategies that nonprofits use to find success through social media
- A simple process to create engaging content on social media that your members and donors will love
Technology trends are important to any business because they define the next generation of marketing and consumer strategy. We’ll focus on the quickly evolving communication landscape and the impacts of increased consumer mobility, localization, smart machines, and the power of social. Based on six years of extensive research of over 10,000 global consumers, we've discovered seven trends that will be changing your business in the years to come. The session will equip you with the knowledge needed to understand and use tools to build a successful brand.
7 Ways the Social Web is Changing the WorldTara Hunt
This is the presentation I gave in Brighton, UT on March 10, 2010 on how the social web is changing the world and effecting how people interact with business...and how business can change to meet our changing needs.
This presentation was being held at Droidcon DE 2014. It covers the main issues with passwords in mobile and web applications and which alternative technolgoies can help resolving them.
This speech was held at Droidcon Berlin 2014. It covers key issues of passwords and what can be done to resolve them by moving on to more advanced authentication techniques like OAuth 2.0 or even biometry.
JavaScript App Security: Auth and Identity on the ClientJonathan LeBlanc
The story is always the same; if you want to create a JavaScript centric app with API and identity security, you’re told that you need to have a server-side component for handling your identity and application security. That’s simply not the case in modern development.
In this session we'll look at client-side identity, API, and token security, exploring token downscoping methodologies, key management tools, and security on the client.
Improving Developer Onboarding Through Intelligent Data InsightsJonathan LeBlanc
A developer platform lives and dies by it's developer community. When huge problems need to be solved, it's easy to make valuable improvements, but what do you do when those are solved and you still see high bounce rates on your site, low developer application completion, and generally poor adoption of your product? This is where your data can save you.
In this talk we'll run through:
- How to track valuable developer path insights, from moments of anxiety to time to first valuable call.
- Overlaying support and ticketing information on top of developer path data to decrease developer friction.
- How to create automated analytics systems to measure success.
- When these systems should be built, before it's too late.
Better Data with Machine Learning and ServerlessJonathan LeBlanc
Creating valuable insights out of raw data files, such as audio or video, has traditionally been a very manual and tedious process, and has produced mixed results due to an influential human element in the mix.
Thanks to enhancements in machine learning systems, coupled with the rapidly deployable nature of serverless technology as a middleware layer, we are able to create highly sophisticated data insight platforms to replace the huge time requirements that have typically been required in the past.
With this in mind, we’ll look at:
- How to build end-to-end data insight and predictor systems, built on the back of serverless and machine learning systems.
- Best practices for working with serverless technology for ferrying information between raw data files and machine learning systems through an eventing system.
- Considerations and practical examples of working with the security implications of dealing with sensitive information.
Best Practices for Application Development with BoxJonathan LeBlanc
Covering the best practices for building new applications on top of Box platform, including token management, error condition and program flow, architecture, and other such topics.
This topic will go through current standards and future trends for building a scalable security model for distributed cloud based data. We’ll look into practices and considerations behind handing highly privileged data globally, diving into topics such as:
- How global compliance and regulations affect security practices.
- Handling data permissions, identity, and security with application access to data.
- Considerations, trends, and standards for global data availability.
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
The future of retail is in removing the divide between the offline shopping state and the enhanced online buying experience. To create this type of enhanced retail experience, we can remove complexities in the process, such as simplifying checkout.
In this session we’ll learn how to use internet-connected microelectronics to attach to a buyer’s mobile device to provide the functionality to buy products right from the aisle.
As web enabled systems become an integral part of everything we interact with, how do we secure data in potential unsecure environments?
In this session you'll learn how to apply fundamental security precepts in potentially insecure environments. Topics include:
Securing identity and payment data through voice commands or text
Tokenization and encryption security
Triggering secure transactions from communications media
We are in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices roaming around unsecured locations, especially when they want to pay for something. Learn the secrets behind building a secure mobile backbone, as we explore how to harden security, build systems based on identity confidence, and work towards a future proofed mobile framework.
The arena of proper auth & data security standards is often some of the most misunderstood, confusing, and tricky aspects of building Node apps. Using open source auth techniques and proper data encryption standards, we’ll learn how to make intelligent decisions on creating a solid infrastructure to protect our users and data. We’ll dive into auth systems, data attack vectors, how to protect your systems, and common security pitfalls in Node.
The screencast of this presentation can be found at https://youtu.be/o3uy7dgG_n4
There is an assumption in the industry, amongst companies large and small alike, that if they store sensitive user data (and sometimes do some mild encryption) in their database, it's locked in and secured from potential attacks. People rely too heavily on their false assumptions of security, and it usually ends up costing them extensively when that is proven wrong.
In this session, Jonathan will build a foundation for identity and data security that everyone dealing with sensitive data should understand. We'll break down concepts of identity security, common attack vectors and how to protect yourself, and how to harden your web application.
Web enabled systems are now an integral part of everything we interact with, from microelectronics to voice enabled hardware, from text messages and phone calls to email, and really we’re just limited by our imaginations as to what we can connect. As we explore vast new realms of communication over mixed digital media, we have to ask ourselves how we protect our critical data within potential unsecure environments. Going beyond that, how do we protect some of our more critical data, payment information, in this same realm.
As we look at a multitude of different environments, we’ll be exploring how to secure user identity and payment information through the communication channels, covering topics like:
* Securing identity and payment data through voice commands or text.
* Tokenization and encryption security.
* Techniques for triggering secure transactions from communications media.
At the end of the session, we’ll have a stronger understanding of proper techniques for working with new communication media sources, and see how we can apply fundamental security precepts in potentially insecure environments.
The video of this presentation is available at https://www.youtube.com/watch?v=b3nB6kZQeaQ
As startups and innovation hubs push towards grand notions of technology innovation, connecting the world around them, and building towards a truly online commerce profile, there is a huge segment of the population that falters and is left behind. The underserved community represents over 1 out of every 5 people in the US, and as we explore cash heavy societies, and heavily underbanked populations worldwide, that number increases dramatically. These are markets that are massively underserved by technology and commerce, yet represent a potential hotbed of growth for any business.
As we explore this large segment of the world population, we'll dive into how the banking and commerce industries are primed for disruption to build up the underserved communities around the planet into a new digital commerce world. From digital currency to the struggling banking industry, we'll explore how we're on the cusp of a commerce revolution, one that will completely disrupt the banking industry, and our notion of technology reach worldwide.
JavaScript and Internet Controlled Hardware Prototyping (Now with more Node G...Jonathan LeBlanc
The electronics maker movement has led a massive shift in how people are re-engineering the world around them through rapid hardware prototyping. With the rise of inexpensive, wifi and bluetooth low energy enabled electronics, this hardware revolution is internet and mobile controlled, all through simple bridges to build the electronics intelligence in familiar web languages.
In this session, we will play with Arduino microcontrollers and JavaScript to take a first dive into the world of internet controlled electronics, exploring topics such as:
- Setting up an Arduino to be controlled through web APIs
- Using JavaScript language bridges on the Arduino
- The future of web controlled hardware prototyping
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
4. 4.7% of users have the password password;
8.5% have the passwords password or 123456;
9.8% have the passwords password, 123456 or 12345678;
14% have a password from the top 10 passwords
40% have a password from the top 100 passwords
79% have a password from the top 500 passwords
91% have a password from the top 1000 passwords
Poor Password Choices
twitter: @jcleblanc | hashtag: #TNWEurope
Why do we need alternate identity systems? Passwords work so well
Password list
10,000 most common passwords represent 99.8% of all user passwords
“Oh my facebook got hacked” – well no, you left your account logged in when you were on Facebook at the Apple store
https://xato.net/passwords/more-top-worst-passwords/#.UwvEW_RdVZs
Humans are the weakest Link
People forget passwords... 45% admit to leaving a website instead of re- setting their password or answering security questions - Blue Inc. 2011
Favor security too much over the experience and you’ll make the
smashingmagazine.com/2012/10/26/password-masking-hurt-signup-form
Bad hashing algorithms
Devices using numerous forms of id – device id / browser id
Browser fingerprinting: https://panopticlick.eff.org/
http://www.dailydot.com/technology/device-fingerprinting-cookies-tracking/
Using bits of identifyable information that can be determined about a user to build in scaled authentication for trusted zones