SlideShare a Scribd company logo
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)

More Related Content

PPT
Protect Your Passwords, Secure Your Servers
PDF
New Trends in Web Security
PPTX
Kerberos-PKI-Federated identity
PDF
O Dell Secure360 Presentation5 12 10b
PPTX
Sogeti Cloud Seminar Identity In The Clouds
PDF
Identity, Security, and XML Web Services -- The Importance of Interoperable S...
PDF
Debashis banerjee cloud_is_as_secure
PPTX
Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk
Protect Your Passwords, Secure Your Servers
New Trends in Web Security
Kerberos-PKI-Federated identity
O Dell Secure360 Presentation5 12 10b
Sogeti Cloud Seminar Identity In The Clouds
Identity, Security, and XML Web Services -- The Importance of Interoperable S...
Debashis banerjee cloud_is_as_secure
Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk

What's hot (20)

PDF
Password Manager: Detailed presentation
PDF
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
PDF
Two factor authentication-in_your_network_e_guide
PPTX
How Does Code Signing Works?
PPTX
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
PPSX
AzureAAD
PDF
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
PDF
SSL Certificate and Code Signing
PPT
P hallam baker_keynote
PPTX
Leveraging SharePoint for Extranets
PDF
FIDO Authentication Opportunities in Healthcare
PPTX
Securing online services by combining smart cards and web-based applications
ODP
Authentication Concepts
PPTX
Reinforcing Your Enterprise With Security Architectures
PPTX
Planning Your Cloud Strategy
PDF
FIDO Technical Specifications Overview
PDF
Certification Authority - Sergio Lietti
PPTX
Identity and Access Management in the Era of Digital Transformation
PPTX
Wayfs and Strays - Jonathan Richardson
Password Manager: Detailed presentation
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Two factor authentication-in_your_network_e_guide
How Does Code Signing Works?
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
AzureAAD
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
SSL Certificate and Code Signing
P hallam baker_keynote
Leveraging SharePoint for Extranets
FIDO Authentication Opportunities in Healthcare
Securing online services by combining smart cards and web-based applications
Authentication Concepts
Reinforcing Your Enterprise With Security Architectures
Planning Your Cloud Strategy
FIDO Technical Specifications Overview
Certification Authority - Sergio Lietti
Identity and Access Management in the Era of Digital Transformation
Wayfs and Strays - Jonathan Richardson
Ad

Similar to Context Automation (with video demos) (20)

PDF
Identity Insights: Social, Local and Mobile Identity
PDF
Bechtel On OpenID and OAuth from Cloud Identity Summit
PDF
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
PPT
Security in Web 2.0, Social Web and Cloud
KEY
Cloud Security at Netflix
KEY
Democratization of IT - october 18 - 20m
PDF
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
PDF
Identity and Access Management and electronic Identities _ Belgian Federal Go...
PDF
110307 cloud security requirements gourley
PPTX
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
PDF
IT Security Trends 2013
PPTX
Leveraging the azure cloud for your mobile apps
PDF
Harvesting The Web With Cloud Computing
PDF
Internet Explorer 8
PDF
SaaS as a Security Hazard - Google Apps Security Example
PDF
Is the Web at Risk?
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PDF
Extending Enterprise Security into the Cloud
PDF
Information Security and Cloud Computing
PDF
Identity Talk at Net Squared 2008
Identity Insights: Social, Local and Mobile Identity
Bechtel On OpenID and OAuth from Cloud Identity Summit
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Security in Web 2.0, Social Web and Cloud
Cloud Security at Netflix
Democratization of IT - october 18 - 20m
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Identity and Access Management and electronic Identities _ Belgian Federal Go...
110307 cloud security requirements gourley
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
IT Security Trends 2013
Leveraging the azure cloud for your mobile apps
Harvesting The Web With Cloud Computing
Internet Explorer 8
SaaS as a Security Hazard - Google Apps Security Example
Is the Web at Risk?
PCTY 2012, IBM Security and Strategy v. Fabio Panada
Extending Enterprise Security into the Cloud
Information Security and Cloud Computing
Identity Talk at Net Squared 2008
Ad

More from Phil Windley (20)

PPTX
Trust, Blockchains, and Self-Soveriegn Identity
PPTX
A University API
PDF
Rule Language for IoT
PDF
Events, Picos, and Microservices
PDF
Picos, CloudOS, and Connecting Things
PDF
Events, Picos, and Microservices
PDF
Relationships: Modeling the Vehicle Ecosystem with Fuse
PDF
Fuse 2
PDF
Connecting Things
PDF
Persistent Compute Objects and the Fabric of Cyberspace
PDF
Persistent Compute Objects - Picos
PDF
Fuse Technical Presentation
PDF
Personal Cloud Application Architectures
KEY
Why Personal Clouds
KEY
Personal Cloud Operating Systems
KEY
Introducing Personal Event Networks
KEY
The Live Web #SCITDA11 Keynote
KEY
Shaping strategies and Startups
KEY
Shaping Strategies and the Live Web - Kynetx Impact 2011
PDF
The Evented Web Makes Users Happy
Trust, Blockchains, and Self-Soveriegn Identity
A University API
Rule Language for IoT
Events, Picos, and Microservices
Picos, CloudOS, and Connecting Things
Events, Picos, and Microservices
Relationships: Modeling the Vehicle Ecosystem with Fuse
Fuse 2
Connecting Things
Persistent Compute Objects and the Fabric of Cyberspace
Persistent Compute Objects - Picos
Fuse Technical Presentation
Personal Cloud Application Architectures
Why Personal Clouds
Personal Cloud Operating Systems
Introducing Personal Event Networks
The Live Web #SCITDA11 Keynote
Shaping strategies and Startups
Shaping Strategies and the Live Web - Kynetx Impact 2011
The Evented Web Makes Users Happy

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation theory and applications.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation theory and applications.pdf
Chapter 3 Spatial Domain Image Processing.pdf
A Presentation on Artificial Intelligence
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Mobile App Security Testing_ A Comprehensive Guide.pdf
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
Unlocking AI with Model Context Protocol (MCP)
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf

Editor's Notes

  • #4: imagine that the dots are Web sites and the user is going from web site to web site to accomplish some task.
  • #5: existing browsers offer little help with this task Nearly everything we do only involves multiple Web sites, but there’s no help in connecting them.
  • #6: context is: - relevant data to the Web task - links multiple sites - what the user cares about CA generates a browsing experience that links together formerly disconnected experiences and ven modifies individual sites.
  • #9: Cookies and sessions are a way of creating context within a single site HTTP is designed to be stateless. Each page stands alone.
  • #10: Single sign on is an example of cross-site context - single purpose: authentication context - still not leveraging this as we could. Having a single login that works on multiple sites isn’t the same as having a single authentication context for a given Web episode.
  • #11: TrustWatch is a browser extension that provides a security context for users that uses a could-based service for site verification.
  • #17: FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  • #18: FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  • #19: FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  • #20: FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  • #21: - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • #22: - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • #23: - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • #24: - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • #25: Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • #26: Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • #27: Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • #28: Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • #35: Greasemonkey - scripts on the browser not the cloud
  • #36: Greasemonkey - scripts on the browser not the cloud
  • #37: Greasemonkey - scripts on the browser not the cloud
  • #42: Structure browsing - connects the dots and threads the experience opt-in, user controlled
  • #43: Structure browsing - connects the dots and threads the experience opt-in, user controlled
  • #44: Structure browsing - connects the dots and threads the experience opt-in, user controlled
  • #45: Structure browsing - connects the dots and threads the experience opt-in, user controlled
  • #51: No one’s ever surprised me with a GUI
  • #52: No one’s ever surprised me with a GUI
  • #53: No one’s ever surprised me with a GUI
  • #79: The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • #80: The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • #81: The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • #82: The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • #83: The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • #84: The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...