SlideShare a Scribd company logo
Notification
Management:
Putting Users in
Control
Jim Fenton (@jimfenton)
The Nōtifs Vision
๏  Notifications are a “thing”
-  Not well served by existing services,
especially email
-  Growing usage, particularly mobile
๏  Looked at how we use email, SMS, etc.
-  Optimize for this subset of these uses
-  Runs alongside these services
๏  Applications => apps, so
Notifications => nōtifs
Priorities
Categories
Official Approval
Internet of Things Social/Advertising
…and many more
What is a Nōtif?
๏  One-way
๏  Solicited, Opt-in
๏  Time-sensitive
๏  Perishable
๏  Short (typically)
Notification
Agent
Phone
CallSMS,
App push
Growl
Management,
Authorization
Notifications
Authorization Table
Rules
Bank
Emergency
Services
Retailers
Social
Media
Approval
Requests
Calendar
For Notifiers:
๏  Direct feedback when nōtifs are accepted
on behalf of users
๏  No need for third-party bulk senders
๏  Spam-and phishing-resistant
-  No junk mail folders to avoid
๏  Less clutter => more impact
For Users:
๏  Centralized management/unsubscribe
๏  Control over how (or whether) to be alerted
when nōtifs arrive
๏  Spam and phishing-resistant
Spam and Phishing?
๏  No widely-used addresses
๏  Notifs are signed by the notifier domain
-  Protects against theft of notifier’s database
๏  No From address => nothing to spoof
-  From address in authorization, not message
Privacy
๏  Notifiers don’t get persistent contact info
๏  Addresses are unique, opaque
-  (and in the background)
user@example.com
415 555-2368
🚫
🚫
Alerts
๏  Users describe their push methods to
notification agent
-  Cell phones (SMS), voice phones, email, app
push
๏  Rule sets decide if/how to alert the user
-  Based on priority, category, notifier
-  Can be time of day based
Opting In
Notification
Agent
User
Notifier
1. Request authorization to notify
2. Browser redirects to
Notification Agent, User
agrees
3. Notification address
sent to Notifier
Cutting the Clutter
๏  Less nōtif clutter: Good for everyone
-  Users get relevant nōtifs
-  Nōtifs have more impact
๏  3 mechanisms:
-  Update
-  Deletion
-  Expiration
๏  All best-effort
Update
๏  Notifier replaces a previous nōtif
-  Tornado watch -> warning
-  More info on wanted criminal
-  Updated auction bid status
-  Error in original nōtif
Delete
๏  An update that deletes the nōtif
-  AMBER Alert: Child is found
-  Requested approval no longer needed
-  User left vicinity of location-triggered notif
-  Alarm condition has been cleared
-  Special offer sold out
-  Voicemail has been collected
Expiration
๏  Timed automatic deletion
-  Coupon expired
-  Tornado warning expired
-  Auction over
-  Calendar event has passed
๏  Doesn’t require notifier activity
Running a Notification Agent
๏  Open-source implementations will be
available
๏  Comparable to running a website or blog
-  Some will run their own
-  Some will rely on commercial services
-  Think Wordpress
๏  Outside commercial services can provide
support for user alerts
Being a Notifier
๏  Simple enough for IoT devices
-  Modest persistent storage and crypto
๏  No need for special ISP arrangements like
static IP addresses
๏  Communicate with notification agents via
Web API
๏  Toolkit libraries will make this easy
Nōtifs Summary
๏  Something I wish I had
๏  An API purpose-built for notification
๏  Vendor-independent
๏  Not burdened by legacy protocol
requirements (like email)
๏  BUT: Deploying something new is hard

More Related Content

Similar to IgnitePII2014 Nōtifs

The Future of Roaming
The Future of RoamingThe Future of Roaming
The Future of Roaming
Mark Phillips
 
The Future of Roaming
The Future of RoamingThe Future of Roaming
The Future of Roaming
Mark Phillips
 
Preemptive Customer Service: Learning from Customer Data Silos
Preemptive Customer Service: Learning from Customer Data SilosPreemptive Customer Service: Learning from Customer Data Silos
Preemptive Customer Service: Learning from Customer Data Silos
Henry Sampson
 
Barriers to Customer Activation: A case study from MTN Uganda
Barriers to Customer Activation: A case study from MTN UgandaBarriers to Customer Activation: A case study from MTN Uganda
Barriers to Customer Activation: A case study from MTN Uganda
Camilo Tellez
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
Vesta Corporation
 
Fighting Internet and Wireless Spam Act
Fighting Internet and Wireless Spam ActFighting Internet and Wireless Spam Act
Fighting Internet and Wireless Spam Act
Matt Vernhout
 
Insurance webinar june 17
Insurance webinar june 17Insurance webinar june 17
Insurance webinar june 17
Vijai Shankar
 
"Realize the Potential of Customer Data through the Power of Consent", Stuart...
"Realize the Potential of Customer Data through the Power of Consent", Stuart..."Realize the Potential of Customer Data through the Power of Consent", Stuart...
"Realize the Potential of Customer Data through the Power of Consent", Stuart...
Dataconomy Media
 
Totango 5 tips to grow revenues from your app
Totango 5 tips to grow revenues from your appTotango 5 tips to grow revenues from your app
Totango 5 tips to grow revenues from your app
Totango
 
An Endorsement Based Mobile Payment System for A Disaster Area
An Endorsement Based Mobile Payment System for A Disaster AreaAn Endorsement Based Mobile Payment System for A Disaster Area
An Endorsement Based Mobile Payment System for A Disaster Area
Naoki Shibata
 
Text2Title Presentation
Text2Title PresentationText2Title Presentation
Text2Title Presentation
BeverlyTuttle
 
Text2Title Presentation
Text2Title PresentationText2Title Presentation
Text2Title Presentation
BeverlyTuttle
 
The unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityThe unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile security
Claus Cramon Houmann
 
Notifs 2018
Notifs 2018Notifs 2018
Notifs 2018
Jim Fenton
 
Mobile Case Study
Mobile Case StudyMobile Case Study
Mobile Case Study
Dee Sadler
 
Myproject
MyprojectMyproject
Myproject
SURESH MOGUDALA
 
Project on cellular purchasing system
Project on cellular purchasing systemProject on cellular purchasing system
Project on cellular purchasing system
Ershad Serajee
 
CIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity StandardsCIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity Standards
CloudIDSummit
 
Getting the most from your crm
Getting the most from your crmGetting the most from your crm
Getting the most from your crm
ReallySimpleSystems
 
Transaction Processing System
Transaction Processing SystemTransaction Processing System
Transaction Processing System
Mohammed Kashifulla
 

Similar to IgnitePII2014 Nōtifs (20)

The Future of Roaming
The Future of RoamingThe Future of Roaming
The Future of Roaming
 
The Future of Roaming
The Future of RoamingThe Future of Roaming
The Future of Roaming
 
Preemptive Customer Service: Learning from Customer Data Silos
Preemptive Customer Service: Learning from Customer Data SilosPreemptive Customer Service: Learning from Customer Data Silos
Preemptive Customer Service: Learning from Customer Data Silos
 
Barriers to Customer Activation: A case study from MTN Uganda
Barriers to Customer Activation: A case study from MTN UgandaBarriers to Customer Activation: A case study from MTN Uganda
Barriers to Customer Activation: A case study from MTN Uganda
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
 
Fighting Internet and Wireless Spam Act
Fighting Internet and Wireless Spam ActFighting Internet and Wireless Spam Act
Fighting Internet and Wireless Spam Act
 
Insurance webinar june 17
Insurance webinar june 17Insurance webinar june 17
Insurance webinar june 17
 
"Realize the Potential of Customer Data through the Power of Consent", Stuart...
"Realize the Potential of Customer Data through the Power of Consent", Stuart..."Realize the Potential of Customer Data through the Power of Consent", Stuart...
"Realize the Potential of Customer Data through the Power of Consent", Stuart...
 
Totango 5 tips to grow revenues from your app
Totango 5 tips to grow revenues from your appTotango 5 tips to grow revenues from your app
Totango 5 tips to grow revenues from your app
 
An Endorsement Based Mobile Payment System for A Disaster Area
An Endorsement Based Mobile Payment System for A Disaster AreaAn Endorsement Based Mobile Payment System for A Disaster Area
An Endorsement Based Mobile Payment System for A Disaster Area
 
Text2Title Presentation
Text2Title PresentationText2Title Presentation
Text2Title Presentation
 
Text2Title Presentation
Text2Title PresentationText2Title Presentation
Text2Title Presentation
 
The unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityThe unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile security
 
Notifs 2018
Notifs 2018Notifs 2018
Notifs 2018
 
Mobile Case Study
Mobile Case StudyMobile Case Study
Mobile Case Study
 
Myproject
MyprojectMyproject
Myproject
 
Project on cellular purchasing system
Project on cellular purchasing systemProject on cellular purchasing system
Project on cellular purchasing system
 
CIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity StandardsCIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity Standards
 
Getting the most from your crm
Getting the most from your crmGetting the most from your crm
Getting the most from your crm
 
Transaction Processing System
Transaction Processing SystemTransaction Processing System
Transaction Processing System
 

More from Jim Fenton

REQUIRETLS: Sender Control of TLS Requirements
REQUIRETLS: Sender Control of TLS RequirementsREQUIRETLS: Sender Control of TLS Requirements
REQUIRETLS: Sender Control of TLS Requirements
Jim Fenton
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
Jim Fenton
 
User Authentication Overview
User Authentication OverviewUser Authentication Overview
User Authentication Overview
Jim Fenton
 
Making User Authentication More Usable
Making User Authentication More UsableMaking User Authentication More Usable
Making User Authentication More Usable
Jim Fenton
 
Toward Better Password Requirements
Toward Better Password RequirementsToward Better Password Requirements
Toward Better Password Requirements
Jim Fenton
 
Security Questions Considered Harmful
Security Questions Considered HarmfulSecurity Questions Considered Harmful
Security Questions Considered Harmful
Jim Fenton
 
LOA Alternatives - A Modest Proposal
LOA Alternatives - A Modest ProposalLOA Alternatives - A Modest Proposal
LOA Alternatives - A Modest Proposal
Jim Fenton
 
Notifs update
Notifs updateNotifs update
Notifs update
Jim Fenton
 
iBeacons: Security and Privacy?
iBeacons: Security and Privacy?iBeacons: Security and Privacy?
iBeacons: Security and Privacy?
Jim Fenton
 
OneID Garage Door
OneID Garage DoorOneID Garage Door
OneID Garage Door
Jim Fenton
 
Identity systems
Identity systemsIdentity systems
Identity systems
Jim Fenton
 
Adapting Levels of Assurance for NSTIC
Adapting Levels of Assurance for NSTICAdapting Levels of Assurance for NSTIC
Adapting Levels of Assurance for NSTIC
Jim Fenton
 

More from Jim Fenton (12)

REQUIRETLS: Sender Control of TLS Requirements
REQUIRETLS: Sender Control of TLS RequirementsREQUIRETLS: Sender Control of TLS Requirements
REQUIRETLS: Sender Control of TLS Requirements
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
 
User Authentication Overview
User Authentication OverviewUser Authentication Overview
User Authentication Overview
 
Making User Authentication More Usable
Making User Authentication More UsableMaking User Authentication More Usable
Making User Authentication More Usable
 
Toward Better Password Requirements
Toward Better Password RequirementsToward Better Password Requirements
Toward Better Password Requirements
 
Security Questions Considered Harmful
Security Questions Considered HarmfulSecurity Questions Considered Harmful
Security Questions Considered Harmful
 
LOA Alternatives - A Modest Proposal
LOA Alternatives - A Modest ProposalLOA Alternatives - A Modest Proposal
LOA Alternatives - A Modest Proposal
 
Notifs update
Notifs updateNotifs update
Notifs update
 
iBeacons: Security and Privacy?
iBeacons: Security and Privacy?iBeacons: Security and Privacy?
iBeacons: Security and Privacy?
 
OneID Garage Door
OneID Garage DoorOneID Garage Door
OneID Garage Door
 
Identity systems
Identity systemsIdentity systems
Identity systems
 
Adapting Levels of Assurance for NSTIC
Adapting Levels of Assurance for NSTICAdapting Levels of Assurance for NSTIC
Adapting Levels of Assurance for NSTIC
 

Recently uploaded

Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 

Recently uploaded (19)

Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 

IgnitePII2014 Nōtifs

  • 2. The Nōtifs Vision ๏  Notifications are a “thing” -  Not well served by existing services, especially email -  Growing usage, particularly mobile ๏  Looked at how we use email, SMS, etc. -  Optimize for this subset of these uses -  Runs alongside these services ๏  Applications => apps, so Notifications => nōtifs
  • 3.
  • 5. Categories Official Approval Internet of Things Social/Advertising …and many more
  • 6. What is a Nōtif? ๏  One-way ๏  Solicited, Opt-in ๏  Time-sensitive ๏  Perishable ๏  Short (typically)
  • 8.
  • 9. For Notifiers: ๏  Direct feedback when nōtifs are accepted on behalf of users ๏  No need for third-party bulk senders ๏  Spam-and phishing-resistant -  No junk mail folders to avoid ๏  Less clutter => more impact
  • 10. For Users: ๏  Centralized management/unsubscribe ๏  Control over how (or whether) to be alerted when nōtifs arrive ๏  Spam and phishing-resistant
  • 11. Spam and Phishing? ๏  No widely-used addresses ๏  Notifs are signed by the notifier domain -  Protects against theft of notifier’s database ๏  No From address => nothing to spoof -  From address in authorization, not message
  • 12. Privacy ๏  Notifiers don’t get persistent contact info ๏  Addresses are unique, opaque -  (and in the background) user@example.com 415 555-2368 🚫 🚫
  • 13. Alerts ๏  Users describe their push methods to notification agent -  Cell phones (SMS), voice phones, email, app push ๏  Rule sets decide if/how to alert the user -  Based on priority, category, notifier -  Can be time of day based
  • 14. Opting In Notification Agent User Notifier 1. Request authorization to notify 2. Browser redirects to Notification Agent, User agrees 3. Notification address sent to Notifier
  • 15. Cutting the Clutter ๏  Less nōtif clutter: Good for everyone -  Users get relevant nōtifs -  Nōtifs have more impact ๏  3 mechanisms: -  Update -  Deletion -  Expiration ๏  All best-effort
  • 16. Update ๏  Notifier replaces a previous nōtif -  Tornado watch -> warning -  More info on wanted criminal -  Updated auction bid status -  Error in original nōtif
  • 17. Delete ๏  An update that deletes the nōtif -  AMBER Alert: Child is found -  Requested approval no longer needed -  User left vicinity of location-triggered notif -  Alarm condition has been cleared -  Special offer sold out -  Voicemail has been collected
  • 18. Expiration ๏  Timed automatic deletion -  Coupon expired -  Tornado warning expired -  Auction over -  Calendar event has passed ๏  Doesn’t require notifier activity
  • 19. Running a Notification Agent ๏  Open-source implementations will be available ๏  Comparable to running a website or blog -  Some will run their own -  Some will rely on commercial services -  Think Wordpress ๏  Outside commercial services can provide support for user alerts
  • 20. Being a Notifier ๏  Simple enough for IoT devices -  Modest persistent storage and crypto ๏  No need for special ISP arrangements like static IP addresses ๏  Communicate with notification agents via Web API ๏  Toolkit libraries will make this easy
  • 21. Nōtifs Summary ๏  Something I wish I had ๏  An API purpose-built for notification ๏  Vendor-independent ๏  Not burdened by legacy protocol requirements (like email) ๏  BUT: Deploying something new is hard

Editor's Notes

  1. We get lots of notifications, for lots of different reasons every day.
  2. Notifs cover a wide range of urgency and importance
  3. Notifs also can be categorized by type.
  4. So what do these uses have in common? They’re not a conversation, but you ask to receive them and often, time is of the essence.
  5. Here’s one possible way a notifications service could be structured. Examples of notifiers Agent User endpoints
  6. But we know there’s a chicken-and-egg problem with technologies like this: You need to get both senders and receivers to adopt them
  7. This boils down to deliverability
  8. The big advantages for users are the organization and control they have over nōtifs they receive.
  9. Users opt in to receiving notifs by relaying a website’s request to their notification agent.
  10. It’s in everyone’s best interest that the active notifs that users see are relevant. Fortunately, since the notifier talks to the agent directly, the notifier can update and delete notifs when appropriate.
  11. This is possible because the notifier communicates directly with the notification agent where the old notif is stored.
  12. Notifs that are no longer current are just unnecessary clutter.
  13. Sometimes notifs expire at planned times, so that should be easy to do.
  14. Running a notification agent should be just like running a blog: do it yourself, or go commercial.