SlideShare a Scribd company logo
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)
Context Automation (with video demos)

More Related Content

What's hot (20)

PDF
Password Manager: Detailed presentation
Hitachi ID Systems, Inc.
 
PDF
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
IndicThreads
 
PDF
Two factor authentication-in_your_network_e_guide
Nick Owen
 
PPTX
How Does Code Signing Works?
AboutSSL
 
PPTX
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Michael Noel
 
PPSX
AzureAAD
TonyHotko
 
PDF
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Novell
 
PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
OKsystem
 
PDF
SSL Certificate and Code Signing
Li-Wei Yao
 
PPT
P hallam baker_keynote
shindeshekhar
 
PPTX
Leveraging SharePoint for Extranets
Avtex
 
PDF
FIDO Authentication Opportunities in Healthcare
FIDO Alliance
 
PPTX
Securing online services by combining smart cards and web-based applications
Olivier Potonniée
 
ODP
Authentication Concepts
Charles Southerland
 
PPTX
Reinforcing Your Enterprise With Security Architectures
Uthaiyashankar
 
PPTX
Planning Your Cloud Strategy
Uthaiyashankar
 
PDF
FIDO Technical Specifications Overview
FIDO Alliance
 
PDF
Certification Authority - Sergio Lietti
Núcleo de Computação Científica
 
PPTX
Identity and Access Management in the Era of Digital Transformation
Uthaiyashankar
 
PPTX
Wayfs and Strays - Jonathan Richardson
Eduserv
 
Password Manager: Detailed presentation
Hitachi ID Systems, Inc.
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
IndicThreads
 
Two factor authentication-in_your_network_e_guide
Nick Owen
 
How Does Code Signing Works?
AboutSSL
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Michael Noel
 
AzureAAD
TonyHotko
 
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Novell
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
OKsystem
 
SSL Certificate and Code Signing
Li-Wei Yao
 
P hallam baker_keynote
shindeshekhar
 
Leveraging SharePoint for Extranets
Avtex
 
FIDO Authentication Opportunities in Healthcare
FIDO Alliance
 
Securing online services by combining smart cards and web-based applications
Olivier Potonniée
 
Authentication Concepts
Charles Southerland
 
Reinforcing Your Enterprise With Security Architectures
Uthaiyashankar
 
Planning Your Cloud Strategy
Uthaiyashankar
 
FIDO Technical Specifications Overview
FIDO Alliance
 
Certification Authority - Sergio Lietti
Núcleo de Computação Científica
 
Identity and Access Management in the Era of Digital Transformation
Uthaiyashankar
 
Wayfs and Strays - Jonathan Richardson
Eduserv
 

Similar to Context Automation (with video demos) (20)

PDF
Identity Insights: Social, Local and Mobile Identity
Jon Bultmeyer
 
PDF
Bechtel On OpenID and OAuth from Cloud Identity Summit
Matterport
 
PDF
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Nordic Infrastructure Conference
 
PPT
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
KEY
Cloud Security at Netflix
Jason Chan
 
KEY
Democratization of IT - october 18 - 20m
Alistair Croll
 
PDF
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
CA API Management
 
PDF
Identity and Access Management and electronic Identities _ Belgian Federal Go...
E-Government Center Moldova
 
PDF
110307 cloud security requirements gourley
GovCloud Network
 
PPTX
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
Brian Campbell
 
PDF
IT Security Trends 2013
IMC Institute
 
PPTX
Leveraging the azure cloud for your mobile apps
Marcel de Vries
 
PDF
Harvesting The Web With Cloud Computing
King Huang
 
PDF
Internet Explorer 8
Eduardo Castro
 
PDF
SaaS as a Security Hazard - Google Apps Security Example
Newvewm
 
PDF
Is the Web at Risk?
Carlos Serrao
 
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IBM Danmark
 
PDF
Extending Enterprise Security into the Cloud
CA API Management
 
PDF
Information Security and Cloud Computing
Paul Miller
 
PDF
Identity Talk at Net Squared 2008
Kaliya "Identity Woman" Young
 
Identity Insights: Social, Local and Mobile Identity
Jon Bultmeyer
 
Bechtel On OpenID and OAuth from Cloud Identity Summit
Matterport
 
Andy Malone - Keynote: the cloud one small step for man one giant leap for it
Nordic Infrastructure Conference
 
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
Cloud Security at Netflix
Jason Chan
 
Democratization of IT - october 18 - 20m
Alistair Croll
 
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
CA API Management
 
Identity and Access Management and electronic Identities _ Belgian Federal Go...
E-Government Center Moldova
 
110307 cloud security requirements gourley
GovCloud Network
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
Brian Campbell
 
IT Security Trends 2013
IMC Institute
 
Leveraging the azure cloud for your mobile apps
Marcel de Vries
 
Harvesting The Web With Cloud Computing
King Huang
 
Internet Explorer 8
Eduardo Castro
 
SaaS as a Security Hazard - Google Apps Security Example
Newvewm
 
Is the Web at Risk?
Carlos Serrao
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IBM Danmark
 
Extending Enterprise Security into the Cloud
CA API Management
 
Information Security and Cloud Computing
Paul Miller
 
Identity Talk at Net Squared 2008
Kaliya "Identity Woman" Young
 
Ad

More from Phil Windley (20)

PPTX
Trust, Blockchains, and Self-Soveriegn Identity
Phil Windley
 
PPTX
A University API
Phil Windley
 
PDF
Rule Language for IoT
Phil Windley
 
PDF
Events, Picos, and Microservices
Phil Windley
 
PDF
Picos, CloudOS, and Connecting Things
Phil Windley
 
PDF
Events, Picos, and Microservices
Phil Windley
 
PDF
Relationships: Modeling the Vehicle Ecosystem with Fuse
Phil Windley
 
PDF
Fuse 2
Phil Windley
 
PDF
Connecting Things
Phil Windley
 
PDF
Persistent Compute Objects and the Fabric of Cyberspace
Phil Windley
 
PDF
Persistent Compute Objects - Picos
Phil Windley
 
PDF
Fuse Technical Presentation
Phil Windley
 
PDF
Personal Cloud Application Architectures
Phil Windley
 
KEY
Why Personal Clouds
Phil Windley
 
KEY
Personal Cloud Operating Systems
Phil Windley
 
KEY
Introducing Personal Event Networks
Phil Windley
 
KEY
The Live Web #SCITDA11 Keynote
Phil Windley
 
KEY
Shaping strategies and Startups
Phil Windley
 
KEY
Shaping Strategies and the Live Web - Kynetx Impact 2011
Phil Windley
 
PDF
The Evented Web Makes Users Happy
Phil Windley
 
Trust, Blockchains, and Self-Soveriegn Identity
Phil Windley
 
A University API
Phil Windley
 
Rule Language for IoT
Phil Windley
 
Events, Picos, and Microservices
Phil Windley
 
Picos, CloudOS, and Connecting Things
Phil Windley
 
Events, Picos, and Microservices
Phil Windley
 
Relationships: Modeling the Vehicle Ecosystem with Fuse
Phil Windley
 
Fuse 2
Phil Windley
 
Connecting Things
Phil Windley
 
Persistent Compute Objects and the Fabric of Cyberspace
Phil Windley
 
Persistent Compute Objects - Picos
Phil Windley
 
Fuse Technical Presentation
Phil Windley
 
Personal Cloud Application Architectures
Phil Windley
 
Why Personal Clouds
Phil Windley
 
Personal Cloud Operating Systems
Phil Windley
 
Introducing Personal Event Networks
Phil Windley
 
The Live Web #SCITDA11 Keynote
Phil Windley
 
Shaping strategies and Startups
Phil Windley
 
Shaping Strategies and the Live Web - Kynetx Impact 2011
Phil Windley
 
The Evented Web Makes Users Happy
Phil Windley
 
Ad

Recently uploaded (20)

PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 

Editor's Notes

  • #4: imagine that the dots are Web sites and the user is going from web site to web site to accomplish some task.
  • #5: existing browsers offer little help with this task Nearly everything we do only involves multiple Web sites, but there’s no help in connecting them.
  • #6: context is: - relevant data to the Web task - links multiple sites - what the user cares about CA generates a browsing experience that links together formerly disconnected experiences and ven modifies individual sites.
  • #9: Cookies and sessions are a way of creating context within a single site HTTP is designed to be stateless. Each page stands alone.
  • #10: Single sign on is an example of cross-site context - single purpose: authentication context - still not leveraging this as we could. Having a single login that works on multiple sites isn’t the same as having a single authentication context for a given Web episode.
  • #11: TrustWatch is a browser extension that provides a security context for users that uses a could-based service for site verification.
  • #17: FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  • #18: FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  • #19: FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  • #20: FF and IE have discovered that others will create interesting add-ons to their browsers. They encourage third party developers to build extensions to their platforms. Still some work to do here. Safari not very open. Especially on iPhone.
  • #21: - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • #22: - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • #23: - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • #24: - Web 2.0 has made moves toward this individualization, but is stuck in the ad hoc rule. Web 2.0 drives the need for context.
  • #25: Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • #26: Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • #27: Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • #28: Fundamentally different than other solutions like OpenID. Cryptographically sound. Deep use cases, not shallow.
  • #35: Greasemonkey - scripts on the browser not the cloud
  • #36: Greasemonkey - scripts on the browser not the cloud
  • #37: Greasemonkey - scripts on the browser not the cloud
  • #42: Structure browsing - connects the dots and threads the experience opt-in, user controlled
  • #43: Structure browsing - connects the dots and threads the experience opt-in, user controlled
  • #44: Structure browsing - connects the dots and threads the experience opt-in, user controlled
  • #45: Structure browsing - connects the dots and threads the experience opt-in, user controlled
  • #51: No one’s ever surprised me with a GUI
  • #52: No one’s ever surprised me with a GUI
  • #53: No one’s ever surprised me with a GUI
  • #79: The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • #80: The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • #81: The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • #82: The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • #83: The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...
  • #84: The combination of browser as platform, cloud-based functionality, & strong identity yield an architecture for generating browsing experiences that are ...