SlideShare ist ein Scribd-Unternehmen logo
1 von 56
Downloaden Sie, um offline zu lesen
Online Identity
Getting to know your users
Cristiano Betta, Developer Evangelist
Developer Evangelist
Why am I here?
Do we always want to use the
same identity?
Should we always want to
use the same identity?
Authentication vs
Authorisation
A little history lesson
Username + password
Security considerations
Security nightmare
4.7% of users have the password password
8.5% have the passwords password or 123456
9.8% have the passwords password, 123456 or 12345678
14% have a password from the top 10 passwords
40% have a password from the top 100 passwords
79% have a password from the top 500 passwords
91% have a password from the top 1000 passwords
Source: xato.net/passwords/more-top-worst-passwords/
wiki.skullsecurity.org/Passwords
45% admit to leaving a website instead of resetting their password or answering security questions
Source: bit.ly/bluestats
OpenID
OAuth 1.0
Request'
Request'Token'

Grant'
Request'Token'

Direct'User'to'Service'

Obtain'Authoriza:on'

Request'
Access'Token'

Direct'to'Consumer'

Access'
Resources'

Grant'
Access'Token'
OAuth 1.0a
OAuth 2.0
OAuth 2.0
Consumer'

Service-Provider'

Direct'User'to'Service'

Obtain'Authoriza5on'

Request'
Access'Token'

Grant'
Access'Token'

Access'
Resources'/'Profile'

Direct'to'Consumer'
OAuth 2.0 and the Road to Hell
homakov.blogspot.de/2013/03/oauth1-oauth2-oauth.html
OAuth 2.0 +
OpenID Connect
Identity Providers
Out of 657 surveyed users 66% think that social
sign-in is a desirable alternative.
Source: bit.ly/bluestats
Google

Facebook

Twitter
Social vs Concrete
• Name, email, location
• Name, email, location
• Friends, address
• Name, email, location
• Friends, address
• Verified address, payment address, account type
• Name, email, location
• Friends, address
• Verified address, payment address, account type
• Seamless checkout
Demo
The nature of an identity matters
Recognize the difference between authentication
and authorization
Well used authorization can improve the user
experience beyond plain user identification
The user experience should be enhanced not
impaired by user authentication
Questions
cbetta@paypal.com
slideshare.net/paypal

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (14)

Zombie land title timeline
Zombie land title timelineZombie land title timeline
Zombie land title timeline
 
Gerencia y Liderazgo
Gerencia y LiderazgoGerencia y Liderazgo
Gerencia y Liderazgo
 
Modelo osi
Modelo osiModelo osi
Modelo osi
 
E marketing
E marketingE marketing
E marketing
 
Signature Project: The Bramble Schoole
Signature Project: The Bramble SchooleSignature Project: The Bramble Schoole
Signature Project: The Bramble Schoole
 
Educación
EducaciónEducación
Educación
 
Animales en peligro
Animales en peligroAnimales en peligro
Animales en peligro
 
Ejercicios mru
Ejercicios mruEjercicios mru
Ejercicios mru
 
B.Com
B.ComB.Com
B.Com
 
County school rankings 2.15
County school rankings 2.15County school rankings 2.15
County school rankings 2.15
 
THERMODYNAMIC BEHAVIOR OF COMPLEX ANTIMONITE ORE FOR ELECTRODEPOSITION OF MET...
THERMODYNAMIC BEHAVIOR OF COMPLEX ANTIMONITE ORE FOR ELECTRODEPOSITION OF MET...THERMODYNAMIC BEHAVIOR OF COMPLEX ANTIMONITE ORE FOR ELECTRODEPOSITION OF MET...
THERMODYNAMIC BEHAVIOR OF COMPLEX ANTIMONITE ORE FOR ELECTRODEPOSITION OF MET...
 
Derecho administrativo
Derecho administrativoDerecho administrativo
Derecho administrativo
 
REPORT DELLA SAGRA DEL PROGRAMMA DI TARANTO
REPORT DELLA SAGRA DEL PROGRAMMA DI TARANTOREPORT DELLA SAGRA DEL PROGRAMMA DI TARANTO
REPORT DELLA SAGRA DEL PROGRAMMA DI TARANTO
 
La comunicación y la cultura nevis las tic
La comunicación y la cultura nevis las ticLa comunicación y la cultura nevis las tic
La comunicación y la cultura nevis las tic
 

Ähnlich wie Online identity getting to know your users

Authentication for Droids
Authentication for DroidsAuthentication for Droids
Authentication for DroidsPayPal
 
Death To Passwords
Death To PasswordsDeath To Passwords
Death To PasswordsDroidConTLV
 
Death To Passwords Droid Edition
Death To Passwords Droid EditionDeath To Passwords Droid Edition
Death To Passwords Droid EditionPayPal
 
Death To Passwords
Death To PasswordsDeath To Passwords
Death To PasswordsPayPal
 
Securing RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectSecuring RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectJonathan LeBlanc
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java ApplicationsStormpath
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
The State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashThe State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashAll Things Open
 
The state of passwordless auth on the web
The state of passwordless auth on the web The state of passwordless auth on the web
The state of passwordless auth on the web Phil Nash
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Gabriella Davis
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughSecureAuth
 
Cyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital WorldCyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital Worldqubanewmedia
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsFraudBusters
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthnFIDO Alliance
 
Hardware and the commerce revolution
Hardware and the commerce revolutionHardware and the commerce revolution
Hardware and the commerce revolutionCristiano Betta
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityChristian Heilmann
 
OmniAuth: From the Ground Up
OmniAuth: From the Ground UpOmniAuth: From the Ground Up
OmniAuth: From the Ground UpMichael Bleigh
 
The state of passwordless auth on the web
The state of passwordless auth on the webThe state of passwordless auth on the web
The state of passwordless auth on the webPhil Nash
 

Ähnlich wie Online identity getting to know your users (20)

Authentication for Droids
Authentication for DroidsAuthentication for Droids
Authentication for Droids
 
Death To Passwords
Death To PasswordsDeath To Passwords
Death To Passwords
 
Death To Passwords
Death To PasswordsDeath To Passwords
Death To Passwords
 
Death To Passwords Droid Edition
Death To Passwords Droid EditionDeath To Passwords Droid Edition
Death To Passwords Droid Edition
 
Death To Passwords
Death To PasswordsDeath To Passwords
Death To Passwords
 
Securing RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectSecuring RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID Connect
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
The State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashThe State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil Nash
 
The state of passwordless auth on the web
The state of passwordless auth on the web The state of passwordless auth on the web
The state of passwordless auth on the web
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
Cyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital WorldCyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital World
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthn
 
Hardware and the commerce revolution
Hardware and the commerce revolutionHardware and the commerce revolution
Hardware and the commerce revolution
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
OmniAuth: From the Ground Up
OmniAuth: From the Ground UpOmniAuth: From the Ground Up
OmniAuth: From the Ground Up
 
The state of passwordless auth on the web
The state of passwordless auth on the webThe state of passwordless auth on the web
The state of passwordless auth on the web
 

Mehr von Cristiano Betta

This strange planet earth
This strange planet earthThis strange planet earth
This strange planet earthCristiano Betta
 
Techsylvania -Hackathons on Rails
Techsylvania -Hackathons on RailsTechsylvania -Hackathons on Rails
Techsylvania -Hackathons on RailsCristiano Betta
 
Making your hackathon matter api con-uk
Making your hackathon matter   api con-ukMaking your hackathon matter   api con-uk
Making your hackathon matter api con-ukCristiano Betta
 
Why we released the kraken
Why we released the krakenWhy we released the kraken
Why we released the krakenCristiano Betta
 
How hardware is driving the commerce revolution copy
How hardware is driving the commerce revolution copyHow hardware is driving the commerce revolution copy
How hardware is driving the commerce revolution copyCristiano Betta
 
Making your hackathon matter
Making your hackathon matterMaking your hackathon matter
Making your hackathon matterCristiano Betta
 
Hackathons: Best Practices From experience
Hackathons: Best Practices From experienceHackathons: Best Practices From experience
Hackathons: Best Practices From experienceCristiano Betta
 
Hacking through space and time
Hacking through space and timeHacking through space and time
Hacking through space and timeCristiano Betta
 
Hacking with html5 video, rtc and shared web workers
Hacking with html5 video, rtc and shared web workersHacking with html5 video, rtc and shared web workers
Hacking with html5 video, rtc and shared web workersCristiano Betta
 
From geek to event organiser
From geek to event organiserFrom geek to event organiser
From geek to event organiserCristiano Betta
 
5 awesome new paypal hack ideas
5 awesome new paypal hack ideas5 awesome new paypal hack ideas
5 awesome new paypal hack ideasCristiano Betta
 
Concrete indentity really getting to know your users
Concrete indentity  really getting to know your usersConcrete indentity  really getting to know your users
Concrete indentity really getting to know your usersCristiano Betta
 
PayPal on iOS + 9 great free app ideas
PayPal on iOS + 9 great free app ideasPayPal on iOS + 9 great free app ideas
PayPal on iOS + 9 great free app ideasCristiano Betta
 
The state of packaged web apps
The state of packaged web appsThe state of packaged web apps
The state of packaged web appsCristiano Betta
 
Payments for the REST of us
Payments for the REST of usPayments for the REST of us
Payments for the REST of usCristiano Betta
 
Chrome Extensions for Hackers
Chrome Extensions for HackersChrome Extensions for Hackers
Chrome Extensions for HackersCristiano Betta
 
Creative Commons Introduction
Creative Commons IntroductionCreative Commons Introduction
Creative Commons IntroductionCristiano Betta
 

Mehr von Cristiano Betta (20)

This strange planet earth
This strange planet earthThis strange planet earth
This strange planet earth
 
Techsylvania -Hackathons on Rails
Techsylvania -Hackathons on RailsTechsylvania -Hackathons on Rails
Techsylvania -Hackathons on Rails
 
Death to Passwords
Death to Passwords Death to Passwords
Death to Passwords
 
Making your hackathon matter api con-uk
Making your hackathon matter   api con-ukMaking your hackathon matter   api con-uk
Making your hackathon matter api con-uk
 
The future ux of money
The future ux of moneyThe future ux of money
The future ux of money
 
Why we released the kraken
Why we released the krakenWhy we released the kraken
Why we released the kraken
 
How hardware is driving the commerce revolution copy
How hardware is driving the commerce revolution copyHow hardware is driving the commerce revolution copy
How hardware is driving the commerce revolution copy
 
Making your hackathon matter
Making your hackathon matterMaking your hackathon matter
Making your hackathon matter
 
Hackathons: Best Practices From experience
Hackathons: Best Practices From experienceHackathons: Best Practices From experience
Hackathons: Best Practices From experience
 
Hacking through space and time
Hacking through space and timeHacking through space and time
Hacking through space and time
 
Hacking with html5 video, rtc and shared web workers
Hacking with html5 video, rtc and shared web workersHacking with html5 video, rtc and shared web workers
Hacking with html5 video, rtc and shared web workers
 
From geek to event organiser
From geek to event organiserFrom geek to event organiser
From geek to event organiser
 
5 awesome new paypal hack ideas
5 awesome new paypal hack ideas5 awesome new paypal hack ideas
5 awesome new paypal hack ideas
 
Concrete indentity really getting to know your users
Concrete indentity  really getting to know your usersConcrete indentity  really getting to know your users
Concrete indentity really getting to know your users
 
PayPal on iOS + 9 great free app ideas
PayPal on iOS + 9 great free app ideasPayPal on iOS + 9 great free app ideas
PayPal on iOS + 9 great free app ideas
 
The state of packaged web apps
The state of packaged web appsThe state of packaged web apps
The state of packaged web apps
 
Payments for the REST of us
Payments for the REST of usPayments for the REST of us
Payments for the REST of us
 
Chrome Extensions for Hackers
Chrome Extensions for HackersChrome Extensions for Hackers
Chrome Extensions for Hackers
 
Encampment Opening Talk
Encampment Opening TalkEncampment Opening Talk
Encampment Opening Talk
 
Creative Commons Introduction
Creative Commons IntroductionCreative Commons Introduction
Creative Commons Introduction
 

Kürzlich hochgeladen

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Online identity getting to know your users