SlideShare a Scribd company logo
User Authentication with MU
in Existing Ecosystems
Casey Bisson
WordPress MU
WordPress MU
University
University
External Authentication
LDAP
Shibboleth
OpenID
CAS (central authentication service)
External Authentication
LDAP
Shibboleth
OpenID
CAS (central authentication service)
authN + authZ
authN only
WordPress User
Directory
WordPress User
Directory
If that’s all you need,
you’re set.
Irony
Many university systems behave like
you’ve never used the internet before.
Despite directory services, many
university users must maintain
accounts in multiple systems.
Our expensive commercial portal
doesn’t offer user-initiated password
resets or user profiles.
Law (almost)
"[An] institution may not make education
records available electronically by using
a common form user name (e.g., last
name and first name initial) with date of
birth or SSN, or a portion of the SSN, as
an initial password to be changed upon
first use of the system."
My Simple, Evil Plan
Replace user-facing components
with WordPress
Submit
No
No
Yes
Yes
Yes
No
Matches AD credentials?
Provision
account or sync
password to WP
Username and
password entry
Yo! Credentials
Matches WP credentials? Has full university account?
SunGard
Luminis
Portal
WordPress/
BuddyPress
Submit
No
Ma
Username and
password entry
Yo! Credentials
Ma
Submit
No
Ma
Username and
password entry
Yo! Credentials
Ma
Submit
No
No
YesMatches WP credentials?
Submit
No
No
YesMatches WP credentials?
Submit
No
No
Yes
YesMatches AD credentials?
Matches WP credentials?
Submit
No
No
Yes
YesMatches AD credentials?
Matches WP credentials?
Yes
Yes
Yes
No
Provision
account or sync
password to WP
Has full university account?
Yes
Yes
Yes
No
Provision
account or sync
password to WP
Has full university account?
Yes
Yes
Yes
No
Provision
account or sync
password to WP
Has full university account?
Yes
Yes
Yes
No
Provision
account or sync
password to WP
Has full university account?
Yes
Not?
SunGard
Luminis
Portal
WordPress/
BuddyPress
Yes
Not?
SunGard
Luminis
Portal
WordPress/
BuddyPress
Plugins, Hooks, Functions
Plugins we’ve released: Alternate
Contact Info, WordPress Ticket
Framework, wpSMS
Unreleased code replaces
wp_authenticate() and hooks
do_action(‘login_form’ . $action)
Much more detail in my blog post
Thank you
http://Plymouth.edu
http://MaisonBisson.com

More Related Content

Viewers also liked

The 7 characteristics of container native infrastructure, LinuxCon/ContainerC...
The 7 characteristics of container native infrastructure, LinuxCon/ContainerC...The 7 characteristics of container native infrastructure, LinuxCon/ContainerC...
The 7 characteristics of container native infrastructure, LinuxCon/ContainerC...
Casey Bisson
 
The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)
Casey Bisson
 
7 characteristics of container-native infrastructure, Docker Zurich 2015-09-08
7 characteristics of container-native infrastructure, Docker Zurich 2015-09-087 characteristics of container-native infrastructure, Docker Zurich 2015-09-08
7 characteristics of container-native infrastructure, Docker Zurich 2015-09-08
Casey Bisson
 
Triton + Docker, July 2015
Triton + Docker, July 2015Triton + Docker, July 2015
Triton + Docker, July 2015
Casey Bisson
 
2011-02 ClickAsiaSummit Metrics, Analysis, Action!
2011-02 ClickAsiaSummit Metrics, Analysis, Action!2011-02 ClickAsiaSummit Metrics, Analysis, Action!
2011-02 ClickAsiaSummit Metrics, Analysis, Action!
Gillian Muessig
 
Miva Merchant Conference 2013 e-Commerce Community Marketing
Miva Merchant Conference 2013 e-Commerce Community MarketingMiva Merchant Conference 2013 e-Commerce Community Marketing
Miva Merchant Conference 2013 e-Commerce Community Marketing
Gillian Muessig
 
Moet je horen...
Moet je horen...Moet je horen...
Moet je horen...
Boris Nihom
 
Live800の導入【招待ウィンドウ編】
Live800の導入【招待ウィンドウ編】Live800の導入【招待ウィンドウ編】
Live800の導入【招待ウィンドウ編】
Live 800
 
Hasil Kelompok I
Hasil Kelompok IHasil Kelompok I
Hasil Kelompok I
Goodreads Indonesia
 
Orden Arquitectonico Q3
Orden Arquitectonico Q3Orden Arquitectonico Q3
Orden Arquitectonico Q3wlado
 
Netiquitte Slideshow
Netiquitte SlideshowNetiquitte Slideshow
Netiquitte Slideshow
alaginess
 
Excellent Glory - Premium GIfts
Excellent Glory - Premium GIftsExcellent Glory - Premium GIfts
Excellent Glory - Premium GIftsEddie OOI
 
Christmas At The Potter’s (Part 2)
Christmas At The Potter’s (Part 2)Christmas At The Potter’s (Part 2)
Christmas At The Potter’s (Part 2)
Heather B.
 
Onva Consulting - An Overview
Onva Consulting  - An OverviewOnva Consulting  - An Overview
Onva Consulting - An Overview
MattManners
 
Fewthingsaboutsmartcity
FewthingsaboutsmartcityFewthingsaboutsmartcity
Fewthingsaboutsmartcitydasiyjun
 
An Astronomical Alphabetacy (Prologue)
An Astronomical Alphabetacy (Prologue)An Astronomical Alphabetacy (Prologue)
An Astronomical Alphabetacy (Prologue)
Heather B.
 
Brackets
BracketsBrackets
Brackets
Alibia de Vente
 
Internship presentation on Feb 22
Internship presentation on Feb 22Internship presentation on Feb 22
Internship presentation on Feb 22
Nathan Green
 

Viewers also liked (20)

The 7 characteristics of container native infrastructure, LinuxCon/ContainerC...
The 7 characteristics of container native infrastructure, LinuxCon/ContainerC...The 7 characteristics of container native infrastructure, LinuxCon/ContainerC...
The 7 characteristics of container native infrastructure, LinuxCon/ContainerC...
 
The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)
 
7 characteristics of container-native infrastructure, Docker Zurich 2015-09-08
7 characteristics of container-native infrastructure, Docker Zurich 2015-09-087 characteristics of container-native infrastructure, Docker Zurich 2015-09-08
7 characteristics of container-native infrastructure, Docker Zurich 2015-09-08
 
Triton + Docker, July 2015
Triton + Docker, July 2015Triton + Docker, July 2015
Triton + Docker, July 2015
 
2011-02 ClickAsiaSummit Metrics, Analysis, Action!
2011-02 ClickAsiaSummit Metrics, Analysis, Action!2011-02 ClickAsiaSummit Metrics, Analysis, Action!
2011-02 ClickAsiaSummit Metrics, Analysis, Action!
 
Miva Merchant Conference 2013 e-Commerce Community Marketing
Miva Merchant Conference 2013 e-Commerce Community MarketingMiva Merchant Conference 2013 e-Commerce Community Marketing
Miva Merchant Conference 2013 e-Commerce Community Marketing
 
Moet je horen...
Moet je horen...Moet je horen...
Moet je horen...
 
Live800の導入【招待ウィンドウ編】
Live800の導入【招待ウィンドウ編】Live800の導入【招待ウィンドウ編】
Live800の導入【招待ウィンドウ編】
 
Hasil Kelompok I
Hasil Kelompok IHasil Kelompok I
Hasil Kelompok I
 
Itec 214
Itec 214Itec 214
Itec 214
 
Orden Arquitectonico Q3
Orden Arquitectonico Q3Orden Arquitectonico Q3
Orden Arquitectonico Q3
 
Netiquitte Slideshow
Netiquitte SlideshowNetiquitte Slideshow
Netiquitte Slideshow
 
Lsi 09.2
Lsi 09.2Lsi 09.2
Lsi 09.2
 
Excellent Glory - Premium GIfts
Excellent Glory - Premium GIftsExcellent Glory - Premium GIfts
Excellent Glory - Premium GIfts
 
Christmas At The Potter’s (Part 2)
Christmas At The Potter’s (Part 2)Christmas At The Potter’s (Part 2)
Christmas At The Potter’s (Part 2)
 
Onva Consulting - An Overview
Onva Consulting  - An OverviewOnva Consulting  - An Overview
Onva Consulting - An Overview
 
Fewthingsaboutsmartcity
FewthingsaboutsmartcityFewthingsaboutsmartcity
Fewthingsaboutsmartcity
 
An Astronomical Alphabetacy (Prologue)
An Astronomical Alphabetacy (Prologue)An Astronomical Alphabetacy (Prologue)
An Astronomical Alphabetacy (Prologue)
 
Brackets
BracketsBrackets
Brackets
 
Internship presentation on Feb 22
Internship presentation on Feb 22Internship presentation on Feb 22
Internship presentation on Feb 22
 

Similar to WordCamp NYC Authentication 2009-11-13

Luminis Iv To Exchange Labs
Luminis Iv To Exchange LabsLuminis Iv To Exchange Labs
Luminis Iv To Exchange LabsMelissa Miller
 
Azure cloud for students and educators
Azure cloud   for students and educatorsAzure cloud   for students and educators
Azure cloud for students and educators
Lee Stott
 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
Kaliya "Identity Woman" Young
 
A A A
A A AA A A
SharePoint 2010 - User Profile Store
SharePoint 2010 - User Profile Store SharePoint 2010 - User Profile Store
SharePoint 2010 - User Profile Store
Joshua Haebets
 
Build a Web Authentication System with a Custom UI
Build a Web Authentication System with a Custom UIBuild a Web Authentication System with a Custom UI
Build a Web Authentication System with a Custom UI
Amazon Web Services
 
Build a Web Authentication System with a Custom UI
Build a Web Authentication System with a Custom UIBuild a Web Authentication System with a Custom UI
Build a Web Authentication System with a Custom UI
Amazon Web Services
 
Why can't I use your data?
Why can't I use your data?Why can't I use your data?
Why can't I use your data?
Alison Kerwin
 
AWS Organizations & Service Control Policy
AWS Organizations & Service Control PolicyAWS Organizations & Service Control Policy
AWS Organizations & Service Control Policy
Bhuvaneswari Subramani
 
Ilta glenn weare-campusid
Ilta glenn weare-campusidIlta glenn weare-campusid
Ilta glenn weare-campusidHEAnet
 
.NET MAUI + Azure AD B2C
.NET MAUI + Azure AD B2C.NET MAUI + Azure AD B2C
.NET MAUI + Azure AD B2C
César Jesús Angulo Gasco
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017
Gabriella Davis
 
Mashing Up with User-centric Identity
Mashing Up with User-centric IdentityMashing Up with User-centric Identity
Mashing Up with User-centric Identitykkjjkevin03
 
Federated Access Management 102
Federated Access Management 102Federated Access Management 102
Federated Access Management 102
JISC.AM
 
Wordpress Ecosystems
Wordpress EcosystemsWordpress Ecosystems
Wordpress Ecosystems
Justin Kistner
 
School Manament System
School Manament SystemSchool Manament System
School Manament System
Majid Talpur
 
Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptx
TrushaKyada
 

Similar to WordCamp NYC Authentication 2009-11-13 (20)

Luminis Iv To Exchange Labs
Luminis Iv To Exchange LabsLuminis Iv To Exchange Labs
Luminis Iv To Exchange Labs
 
Azure cloud for students and educators
Azure cloud   for students and educatorsAzure cloud   for students and educators
Azure cloud for students and educators
 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
 
A A A
A A AA A A
A A A
 
SharePoint 2010 - User Profile Store
SharePoint 2010 - User Profile Store SharePoint 2010 - User Profile Store
SharePoint 2010 - User Profile Store
 
Build a Web Authentication System with a Custom UI
Build a Web Authentication System with a Custom UIBuild a Web Authentication System with a Custom UI
Build a Web Authentication System with a Custom UI
 
Build a Web Authentication System with a Custom UI
Build a Web Authentication System with a Custom UIBuild a Web Authentication System with a Custom UI
Build a Web Authentication System with a Custom UI
 
Why can't I use your data?
Why can't I use your data?Why can't I use your data?
Why can't I use your data?
 
AWS Organizations & Service Control Policy
AWS Organizations & Service Control PolicyAWS Organizations & Service Control Policy
AWS Organizations & Service Control Policy
 
Ilta glenn weare-campusid
Ilta glenn weare-campusidIlta glenn weare-campusid
Ilta glenn weare-campusid
 
.NET MAUI + Azure AD B2C
.NET MAUI + Azure AD B2C.NET MAUI + Azure AD B2C
.NET MAUI + Azure AD B2C
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017
 
Pratyush_Resume
Pratyush_ResumePratyush_Resume
Pratyush_Resume
 
Pratyush_Resume
Pratyush_ResumePratyush_Resume
Pratyush_Resume
 
Pratyush_Resume
Pratyush_ResumePratyush_Resume
Pratyush_Resume
 
Mashing Up with User-centric Identity
Mashing Up with User-centric IdentityMashing Up with User-centric Identity
Mashing Up with User-centric Identity
 
Federated Access Management 102
Federated Access Management 102Federated Access Management 102
Federated Access Management 102
 
Wordpress Ecosystems
Wordpress EcosystemsWordpress Ecosystems
Wordpress Ecosystems
 
School Manament System
School Manament SystemSchool Manament System
School Manament System
 
Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptx
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

WordCamp NYC Authentication 2009-11-13