SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Programming Social Applications
                               SXSWi Book Reading




Jonathan LeBlanc
Twitter: @jcleblanc
Hashtag: #FutureSoc
E-Mail: jleblanc@x.com
Github: github.com/jcleblanc
The Foundation Topics


                  The Foundations of Human Identity

                  Tribalism and Social Grouping

                  The Big Bag of Social Identity Fail



http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
The Foundation Topics


                  The Foundations of Human Identity

                  Tribalism and Social Grouping

                  The Big Bag of Social Identity Fail



http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: User Types




       Anonymous Users                        Real Identity Login


http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Open Identity Programming

       OAuth (1.0a + 2.0)
       PayPal Access, Facebook, Twitter

       OpenID (…and the upcoming OpenID Connect)
       PayPal Access, Google, Yahoo!

       Emerging Identity
       Mozilla BrowserID, WebFinger, LRDD

http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Anonymous Users




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Tracking Anonymous Users

                There are a few common options




             Tracking Cookie                   Local Storage


http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Real Identity Users




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Real Identity Sources

                        Sources of Real Identity




        Social (perceived)                    Concrete (true)

http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
The Foundation Topics


                  The Foundations of Human Identity

                  Tribalism and Social Grouping

                  The Big Bag of Social Identity Fail



http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: It’s Not A New Thing…




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: Foundation in Tribalism


    Tribalism started as a way to keep us safe

    …it has lead to some horrible parts of history

    but is also a foundation of many of our social
    relationships


http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: The Real Life Social Graph




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: The Online Social Graph




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: Group Types


                                  Follower Type


                                  Connection Type

                                  Group Type


http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: Data Miners are Rock Stars




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
The Foundation Topics


                  The Foundations of Human Identity

                  Tribalism and Social Grouping

                  The Big Bag of Social Identity Fail



http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Identity Fail: Personal Safety


   When Social Discovery Impacts Personal Safety


                            “My privacy concerns are not trite.
                            They are linked to my actual
                            physical safety”
                            --Harriet Jacobs (Gizmodo)



http://oreil.ly/FutureSoc    Programming Social Applications   Hashtag: #FutureSoc
Social Identity Fail: Privacy Concerns


        When Making Things Easy Impairs Privacy


                            “Path Uploads Your Entire iPhone
                            Contact List By Default”
                            --Mark Hachman (PCMag)




http://oreil.ly/FutureSoc    Programming Social Applications   Hashtag: #FutureSoc
Social Identity Fail: The Fine Line


     The Fine Line Between Insightful and Creepy


                            “How Target Figured Out A Teen Girl
                            Was Pregnant Before Her Father Did”
                            --Kashmir Hill (Forbes)




http://oreil.ly/FutureSoc        Programming Social Applications   Hashtag: #FutureSoc
Thank You! Questions?
                  Slides: http://slidesha.re/programmingsocial




Jonathan LeBlanc
Twitter: @jcleblanc
Hashtag: #FutureSoc
E-Mail: jleblanc@x.com
Github: github.com/jcleblanc

Weitere ähnliche Inhalte

Was ist angesagt?

Liaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social mediaLiaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social mediaMelissa Cheater
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?Blue Coat
 
Guidance Counsellor Forum, November 2009
Guidance Counsellor Forum, November 2009Guidance Counsellor Forum, November 2009
Guidance Counsellor Forum, November 2009Melissa Cheater
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the CyberspaceEmil Tan
 
API: Advertising Propagation Interface
API: Advertising Propagation InterfaceAPI: Advertising Propagation Interface
API: Advertising Propagation InterfaceArmando Alves
 
Big Informality
Big InformalityBig Informality
Big InformalityChangeist
 
LinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLancope, Inc.
 
Facebook Business
Facebook BusinessFacebook Business
Facebook BusinessBilgiEC149
 
NM Department of Agriculture
NM Department of AgricultureNM Department of Agriculture
NM Department of AgricultureJulia Parra
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
KEYNOTE: The Unlikely Romance: Part 2 - What Now?
KEYNOTE: The Unlikely Romance: Part 2 - What Now?KEYNOTE: The Unlikely Romance: Part 2 - What Now?
KEYNOTE: The Unlikely Romance: Part 2 - What Now?Casey Ellis
 
Using emerging technologies for open access Best practices for dissemination ...
Using emerging technologies for open access Best practices for dissemination ...Using emerging technologies for open access Best practices for dissemination ...
Using emerging technologies for open access Best practices for dissemination ...Tiffini Travis
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011Donald E. Hester
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Aleque Juneau
 

Was ist angesagt? (18)

Liaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social mediaLiaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social media
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Guidance Counsellor Forum, November 2009
Guidance Counsellor Forum, November 2009Guidance Counsellor Forum, November 2009
Guidance Counsellor Forum, November 2009
 
Smartphone Penetration Exceeds 50 Percent in Major Markets by Augustine Fou
Smartphone Penetration Exceeds 50 Percent in Major Markets by Augustine FouSmartphone Penetration Exceeds 50 Percent in Major Markets by Augustine Fou
Smartphone Penetration Exceeds 50 Percent in Major Markets by Augustine Fou
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the Cyberspace
 
API: Advertising Propagation Interface
API: Advertising Propagation InterfaceAPI: Advertising Propagation Interface
API: Advertising Propagation Interface
 
Big Informality
Big InformalityBig Informality
Big Informality
 
LinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering Threat
 
Facebook Business
Facebook BusinessFacebook Business
Facebook Business
 
NM Department of Agriculture
NM Department of AgricultureNM Department of Agriculture
NM Department of Agriculture
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
KEYNOTE: The Unlikely Romance: Part 2 - What Now?
KEYNOTE: The Unlikely Romance: Part 2 - What Now?KEYNOTE: The Unlikely Romance: Part 2 - What Now?
KEYNOTE: The Unlikely Romance: Part 2 - What Now?
 
Using emerging technologies for open access Best practices for dissemination ...
Using emerging technologies for open access Best practices for dissemination ...Using emerging technologies for open access Best practices for dissemination ...
Using emerging technologies for open access Best practices for dissemination ...
 
Errors
ErrorsErrors
Errors
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 

Andere mochten auch

Securing and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data MiningSecuring and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data MiningJonathan LeBlanc
 
Creating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data MiningCreating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data MiningJonathan LeBlanc
 
Browser MVC with YQL and YUI
Browser MVC with YQL and YUIBrowser MVC with YQL and YUI
Browser MVC with YQL and YUIJonathan LeBlanc
 
Rrv head & shoulders new
Rrv head & shoulders newRrv head & shoulders new
Rrv head & shoulders newBhupesh sahu
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensJonathan LeBlanc
 
The 5 API Monetization Models and How to Measure Their Success
The 5 API Monetization Models and How to Measure Their SuccessThe 5 API Monetization Models and How to Measure Their Success
The 5 API Monetization Models and How to Measure Their SuccessRob Zazueta
 
SOA in the API World - Facades, Transactions, Stateless Services
SOA in the API World - Facades, Transactions, Stateless Services SOA in the API World - Facades, Transactions, Stateless Services
SOA in the API World - Facades, Transactions, Stateless Services Apigee | Google Cloud
 
The Five API Monetization Models - Rob Zazueta, RESTFest 2016
The Five API Monetization Models - Rob Zazueta, RESTFest 2016The Five API Monetization Models - Rob Zazueta, RESTFest 2016
The Five API Monetization Models - Rob Zazueta, RESTFest 2016Rob Zazueta
 
Application Portfolio Management
Application Portfolio ManagementApplication Portfolio Management
Application Portfolio ManagementAlain Charpentier
 
Secure Your APIs with Amazon API Gateway
Secure Your APIs with Amazon API GatewaySecure Your APIs with Amazon API Gateway
Secure Your APIs with Amazon API GatewayMohammed Badran
 
Securing API data models
Securing API data modelsSecuring API data models
Securing API data modelsJonathan LeBlanc
 

Andere mochten auch (13)

Securing and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data MiningSecuring and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data Mining
 
Creating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data MiningCreating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data Mining
 
Browser MVC with YQL and YUI
Browser MVC with YQL and YUIBrowser MVC with YQL and YUI
Browser MVC with YQL and YUI
 
2011 HackU UCSD
2011 HackU UCSD2011 HackU UCSD
2011 HackU UCSD
 
Rrv head & shoulders new
Rrv head & shoulders newRrv head & shoulders new
Rrv head & shoulders new
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web Tokens
 
The 5 API Monetization Models and How to Measure Their Success
The 5 API Monetization Models and How to Measure Their SuccessThe 5 API Monetization Models and How to Measure Their Success
The 5 API Monetization Models and How to Measure Their Success
 
SOA in the API World - Facades, Transactions, Stateless Services
SOA in the API World - Facades, Transactions, Stateless Services SOA in the API World - Facades, Transactions, Stateless Services
SOA in the API World - Facades, Transactions, Stateless Services
 
The Five API Monetization Models - Rob Zazueta, RESTFest 2016
The Five API Monetization Models - Rob Zazueta, RESTFest 2016The Five API Monetization Models - Rob Zazueta, RESTFest 2016
The Five API Monetization Models - Rob Zazueta, RESTFest 2016
 
Application Portfolio Management
Application Portfolio ManagementApplication Portfolio Management
Application Portfolio Management
 
Secure Your APIs with Amazon API Gateway
Secure Your APIs with Amazon API GatewaySecure Your APIs with Amazon API Gateway
Secure Your APIs with Amazon API Gateway
 
Securing API data models
Securing API data modelsSecuring API data models
Securing API data models
 

Ă„hnlich wie SXSWi 2012: Programming Social Applications

BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceBSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceJosephTesta9
 
2010 sept - mobile web africa - marc smith - says who - mapping social medi...
2010   sept - mobile web africa - marc smith - says who - mapping social medi...2010   sept - mobile web africa - marc smith - says who - mapping social medi...
2010 sept - mobile web africa - marc smith - says who - mapping social medi...Marc Smith
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebJamie Reffell
 
The Coevolution of Language & Social Technologies
The Coevolution of Language & Social TechnologiesThe Coevolution of Language & Social Technologies
The Coevolution of Language & Social TechnologiesRoland Smart
 
Social Web for VU Dagje Studeren
Social Web for VU Dagje Studeren Social Web for VU Dagje Studeren
Social Web for VU Dagje Studeren Victor de Boer
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)Michael Edson
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINTChandrapal Badshah
 
Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Bex Lewis
 
Brighten Your Future With IT : Why I Need to Start Learn Programming
Brighten Your Future With IT : Why I Need to Start Learn ProgrammingBrighten Your Future With IT : Why I Need to Start Learn Programming
Brighten Your Future With IT : Why I Need to Start Learn ProgrammingMuhammad Singgih Z.A
 
ReadWriteWeb Presentation Dec08
ReadWriteWeb Presentation Dec08ReadWriteWeb Presentation Dec08
ReadWriteWeb Presentation Dec08Richard MacManus
 
BCcampus a-great-babbling-bazaar
BCcampus a-great-babbling-bazaarBCcampus a-great-babbling-bazaar
BCcampus a-great-babbling-bazaarb p
 
Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Victor de Boer
 
Social Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceSocial Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceLaDonna Coy
 
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09Karl Kasca
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013Ray Brannon
 
The digital revolution and the future 2012
The digital revolution and the future 2012The digital revolution and the future 2012
The digital revolution and the future 2012Bex Lewis
 

Ă„hnlich wie SXSWi 2012: Programming Social Applications (20)

BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceBSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
 
Wizard of Apps Revised
Wizard of Apps RevisedWizard of Apps Revised
Wizard of Apps Revised
 
Technology for engagement
Technology for engagementTechnology for engagement
Technology for engagement
 
2010 sept - mobile web africa - marc smith - says who - mapping social medi...
2010   sept - mobile web africa - marc smith - says who - mapping social medi...2010   sept - mobile web africa - marc smith - says who - mapping social medi...
2010 sept - mobile web africa - marc smith - says who - mapping social medi...
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the Web
 
The Coevolution of Language & Social Technologies
The Coevolution of Language & Social TechnologiesThe Coevolution of Language & Social Technologies
The Coevolution of Language & Social Technologies
 
Social Web for VU Dagje Studeren
Social Web for VU Dagje Studeren Social Web for VU Dagje Studeren
Social Web for VU Dagje Studeren
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013
 
Brighten Your Future With IT : Why I Need to Start Learn Programming
Brighten Your Future With IT : Why I Need to Start Learn ProgrammingBrighten Your Future With IT : Why I Need to Start Learn Programming
Brighten Your Future With IT : Why I Need to Start Learn Programming
 
ReadWriteWeb Presentation Dec08
ReadWriteWeb Presentation Dec08ReadWriteWeb Presentation Dec08
ReadWriteWeb Presentation Dec08
 
BCcampus a-great-babbling-bazaar
BCcampus a-great-babbling-bazaarBCcampus a-great-babbling-bazaar
BCcampus a-great-babbling-bazaar
 
Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016
 
Social Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceSocial Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention Conference
 
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
The digital revolution and the future 2012
The digital revolution and the future 2012The digital revolution and the future 2012
The digital revolution and the future 2012
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 

Mehr von Jonathan LeBlanc

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJonathan LeBlanc
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsJonathan LeBlanc
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessJonathan LeBlanc
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with BoxJonathan LeBlanc
 
Box Platform Overview
Box Platform OverviewBox Platform Overview
Box Platform OverviewJonathan LeBlanc
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer WorkshopJonathan LeBlanc
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security PracticesJonathan LeBlanc
 
Box Authentication Types
Box Authentication TypesBox Authentication Types
Box Authentication TypesJonathan LeBlanc
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI ElementsJonathan LeBlanc
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingJonathan LeBlanc
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyJonathan LeBlanc
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data SecurityJonathan LeBlanc
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data SecurityJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityJonathan LeBlanc
 
BattleHack Los Angeles
BattleHack Los Angeles BattleHack Los Angeles
BattleHack Los Angeles Jonathan LeBlanc
 

Mehr von Jonathan LeBlanc (20)

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the Client
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data Insights
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and Serverless
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with Box
 
Box Platform Overview
Box Platform OverviewBox Platform Overview
Box Platform Overview
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer Workshop
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security Practices
 
Box Authentication Types
Box Authentication TypesBox Authentication Types
Box Authentication Types
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI Elements
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scoping
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments Globally
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data Security
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data Security
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable Security
 
Kill All Passwords
Kill All PasswordsKill All Passwords
Kill All Passwords
 
BattleHack Los Angeles
BattleHack Los Angeles BattleHack Los Angeles
BattleHack Los Angeles
 

KĂĽrzlich hochgeladen

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

KĂĽrzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

SXSWi 2012: Programming Social Applications

  • 1. Programming Social Applications SXSWi Book Reading Jonathan LeBlanc Twitter: @jcleblanc Hashtag: #FutureSoc E-Mail: jleblanc@x.com Github: github.com/jcleblanc
  • 2. The Foundation Topics The Foundations of Human Identity Tribalism and Social Grouping The Big Bag of Social Identity Fail http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 3. The Foundation Topics The Foundations of Human Identity Tribalism and Social Grouping The Big Bag of Social Identity Fail http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 4. Human Identity: User Types Anonymous Users Real Identity Login http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 5. Human Identity: Open Identity Programming OAuth (1.0a + 2.0) PayPal Access, Facebook, Twitter OpenID (…and the upcoming OpenID Connect) PayPal Access, Google, Yahoo! Emerging Identity Mozilla BrowserID, WebFinger, LRDD http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 6. Human Identity: Anonymous Users http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 7. Human Identity: Tracking Anonymous Users There are a few common options Tracking Cookie Local Storage http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 8. Human Identity: Real Identity Users http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 9. Human Identity: Real Identity Sources Sources of Real Identity Social (perceived) Concrete (true) http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 10. The Foundation Topics The Foundations of Human Identity Tribalism and Social Grouping The Big Bag of Social Identity Fail http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 11. Social Grouping: It’s Not A New Thing… http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 12. Social Grouping: Foundation in Tribalism Tribalism started as a way to keep us safe …it has lead to some horrible parts of history but is also a foundation of many of our social relationships http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 13. Social Grouping: The Real Life Social Graph http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 14. Social Grouping: The Online Social Graph http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 15. Social Grouping: Group Types Follower Type Connection Type Group Type http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 16. Social Grouping: Data Miners are Rock Stars http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 17. The Foundation Topics The Foundations of Human Identity Tribalism and Social Grouping The Big Bag of Social Identity Fail http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 18. Social Identity Fail: Personal Safety When Social Discovery Impacts Personal Safety “My privacy concerns are not trite. They are linked to my actual physical safety” --Harriet Jacobs (Gizmodo) http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 19. Social Identity Fail: Privacy Concerns When Making Things Easy Impairs Privacy “Path Uploads Your Entire iPhone Contact List By Default” --Mark Hachman (PCMag) http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 20. Social Identity Fail: The Fine Line The Fine Line Between Insightful and Creepy “How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did” --Kashmir Hill (Forbes) http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 21. Thank You! Questions? Slides: http://slidesha.re/programmingsocial Jonathan LeBlanc Twitter: @jcleblanc Hashtag: #FutureSoc E-Mail: jleblanc@x.com Github: github.com/jcleblanc

Hinweis der Redaktion

  1. http://gizmodo.com/5470696/fck-you-google
  2. http://www.pcmag.com/article2/0,2817,2399970,00.asp
  3. http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/The statistician is now a rock star