Successfully reported this slideshow.

Context Automation

887 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Context Automation

  1. 1. Context Automation Phillip J. Windley, Ph.D. CTO, Kynetx www.windley.com
  2. 2. What is it?
  3. 3. Connecting the dots
  4. 4. On the web, users connect the dots between Web sites in their heads
  5. 5. context automation == connecting the dots
  6. 6. Context is state
  7. 7. Context Examples
  8. 8. Intra-site Context
  9. 9. Single Purpose Context
  10. 10. Context with Data
  11. 11. Amazon and Your Local Library
  12. 12. Trends Driving Context Automation
  13. 13. Trends Driving Context Automation Cloud Computing
  14. 14. Trends Driving Context Automation Cloud Extensible Computing Browsers
  15. 15. Trends Driving Context Automation Cloud Extensible Computing Browsers Internet Identities
  16. 16. Trends Driving Context Automation Cloud Extensible Computing Browsers Internet Identities
  17. 17. The Browser as Platform Browsers tie Web sessions together
  18. 18. The Browser as Platform Browsers tie Web sessions together 1B Firefox add-on downloads since 2005*
  19. 19. The Browser as Platform Browsers tie Web sessions together 1B Firefox add-on downloads since 2005* That is about 17/sec*
  20. 20. The Browser as Platform Browsers tie Web sessions together 1B Firefox add-on downloads since 2005* That is about 17/sec* Estimates are 2x-5x below actual
  21. 21. The Browser as Platform Browsers tie Web sessions together 1B Firefox add-on downloads since 2005* That is about 17/sec* Estimates are 2x-5x below actual *Justin Scott, Mozilla
  22. 22. The Identity Shift
  23. 23. The Identity Shift Ad-hoc IP Address Machine Cookie Session SSL
  24. 24. The Identity Shift Ad-hoc IP Address Machine Cookie Session SSL Security & privacy at the expense of convenience Website dependent identity only
  25. 25. The Identity Shift Ad-hoc Structured IP Address Browser Machine Individual Cookie Identity Session Relationships SSL Reputation Security & privacy at the expense of convenience Website dependent identity only
  26. 26. The Identity Shift Ad-hoc Structured IP Address Browser Machine Individual Cookie Identity Session Relationships SSL Reputation Security & privacy at Convenience with the expense of privacy, security & convenience relationships Website dependent Consistent website identity only independent identity
  27. 27. Information Cards
  28. 28. Information Cards Microsoft developed standard
  29. 29. Information Cards Microsoft developed standard Information Card Foundation
  30. 30. Information Cards Microsoft developed standard Information Card Foundation User participation
  31. 31. Information Cards Microsoft developed standard Information Card Foundation User participation Firm, technical foundation for security and privacy
  32. 32. Information Card Types
  33. 33. Information Card Types Personal cards
  34. 34. Information Card Types Personal cards Managed cards
  35. 35. Information Card Types Personal cards Managed cards Action cards
  36. 36. The Information Card Selector
  37. 37. Context automation rocks when supported by cloud services, browser extensions, & internet identity
  38. 38. Context automation works by augmenting Web sites with new information for the user
  39. 39. The Web Augmentation Spectrum Javascript in the browser
  40. 40. The Web Augmentation Spectrum Media Toolbars Javascript in the browser
  41. 41. The Web Augmentation Spectrum Media Toolbars Search Context Javascript in the browser
  42. 42. The Web Augmentation Spectrum Context Platform Media Toolbars Search Context Javascript in the browser
  43. 43. What you get from the cloud...
  44. 44. What you get from the cloud... Machine independence
  45. 45. What you get from the cloud... Machine independence Hassle-free updates
  46. 46. What you get from the cloud... Machine independence Hassle-free updates Increased security
  47. 47. What you get from the cloud... Machine independence Hassle-free updates Increased security Auditing & analytics
  48. 48. What you get from identity...
  49. 49. What you get from identity... Individualized
  50. 50. What you get from identity... Individualized Structured browsing
  51. 51. What you get from identity... Individualized Structured browsing Privacy
  52. 52. What you get from identity... Individualized Structured browsing Privacy Security
  53. 53. Kynetx & Context Automation
  54. 54. How Kynetx Works
  55. 55. 1 How Kynetx Works
  56. 56. 1 2 How Kynetx Works
  57. 57. 1 2 3 How Kynetx Works
  58. 58. 4 1 2 3 How Kynetx Works
  59. 59. Kynetx Rule Language (KRL) Sometimes a layer of indirection helps...
  60. 60. Kynetx Rule Language (KRL) Sometimes a layer of indirection helps... Domain specific language
  61. 61. Kynetx Rule Language (KRL) Sometimes a layer of indirection helps... Domain specific language Browser and platform independent
  62. 62. Kynetx Rule Language (KRL) Sometimes a layer of indirection helps... Domain specific language Browser and platform independent Mental leverage via abstractions
  63. 63. KRL Rulesets
  64. 64. KRL Rulesets Select page via URL class
  65. 65. KRL Rulesets Select page via URL class Declare and access data sources
  66. 66. KRL Rulesets Select page via URL class Declare and access data sources Conditionally fire action
  67. 67. KRL Rulesets Select page via URL class Declare and access data sources Conditionally fire action Process callbacks
  68. 68. KRL for Library Lookup
  69. 69. KRL for Library Lookup
  70. 70. KRL for Library Lookup
  71. 71. KRL for Library Lookup
  72. 72. KRL for Library Lookup
  73. 73. KRL for Library Lookup
  74. 74. KRL for Library Lookup
  75. 75. KRL for Library Lookup
  76. 76. KRL for Library Lookup
  77. 77. Information cards advantages
  78. 78. Information cards advantages Signed
  79. 79. Information cards advantages Signed Uniquely identified
  80. 80. Information cards advantages Signed Uniquely identified Protect user data
  81. 81. Information cards advantages Signed Uniquely identified Protect user data Hidden security
  82. 82. Information cards advantages Signed Uniquely identified Protect user data Hidden security Nice metaphor
  83. 83. Can we hack a card?
  84. 84. Can we hack a card?
  85. 85. RE JEC T ED !!
  86. 86. Malicious apps can be identified and disabled
  87. 87. Kynetx Developer Beta
  88. 88. Kynetx Developer Beta
  89. 89. Kynetx Developer Beta Free (under quota)
  90. 90. Kynetx Developer Beta Free (under quota) Limited number
  91. 91. Kynetx Developer Beta Free (under quota) Limited number See me for signup card
  92. 92. Cloud Extensible Computing Browsers Internet Identities
  93. 93. Cloud Extensible Computing Browsers Internet Identities
  94. 94. Cloud Extensible Computing Browsers Safe Internet Identities
  95. 95. Cloud Extensible Computing Browsers Safe Internet Secure Identities
  96. 96. Cloud Extensible Computing Browsers Safe Internet Secure Identities Individualized
  97. 97. Cloud Extensible Computing Browsers Safe Internet Secure Identities Individualized Flexible
  98. 98. Cloud Extensible Computing Browsers Safe Internet Secure Identities Individualized Flexible Powerful
  99. 99. More information... Read the white paper: http://www.kynetx.com Our developer site http://code.kynetx.com/
  100. 100. Context Automation ? Contact info: phil@windley.org www.windley.com @windley

×