SlideShare ist ein Scribd-Unternehmen logo
1 von 56
Downloaden Sie, um offline zu lesen
Online Identity
Getting to know your users
Cristiano Betta, Developer Evangelist
Developer Evangelist
Why am I here?
Do we always want to use the
same identity?
Should we always want to
use the same identity?
Authentication vs
Authorisation
A little history lesson
Username + password
Security considerations
Security nightmare
4.7% of users have the password password
8.5% have the passwords password or 123456
9.8% have the passwords password, 123456 or 12345678
14% have a password from the top 10 passwords
40% have a password from the top 100 passwords
79% have a password from the top 500 passwords
91% have a password from the top 1000 passwords
Source: xato.net/passwords/more-top-worst-passwords/
wiki.skullsecurity.org/Passwords
45% admit to leaving a website instead of resetting their password or answering security questions
Source: bit.ly/bluestats
OpenID
OAuth 1.0
Request'
Request'Token'

Grant'
Request'Token'

Direct'User'to'Service'

Obtain'Authoriza:on'

Request'
Access'Token'

Direct'to'Consumer'

Access'
Resources'

Grant'
Access'Token'
OAuth 1.0a
OAuth 2.0
OAuth 2.0
Consumer'

Service-Provider'

Direct'User'to'Service'

Obtain'Authoriza5on'

Request'
Access'Token'

Grant'
Access'Token'

Access'
Resources'/'Profile'

Direct'to'Consumer'
OAuth 2.0 and the Road to Hell
homakov.blogspot.de/2013/03/oauth1-oauth2-oauth.html
OAuth 2.0 +
OpenID Connect
Identity Providers
Out of 657 surveyed users 66% think that social
sign-in is a desirable alternative.
Source: bit.ly/bluestats
Google

Facebook

Twitter
Social vs Concrete
• Name, email, location
• Name, email, location
• Friends, address
• Name, email, location
• Friends, address
• Verified address, payment address, account type
• Name, email, location
• Friends, address
• Verified address, payment address, account type
• Seamless checkout
Demo
The nature of an identity matters
Recognize the difference between authentication
and authorization
Well used authorization can improve the user
experience beyond plain user identification
The user experience should be enhanced not
impaired by user authentication
Questions
cbetta@paypal.com
slideshare.net/paypal

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (14)

Zombie land title timeline
Zombie land title timelineZombie land title timeline
Zombie land title timeline
 
Gerencia y Liderazgo
Gerencia y LiderazgoGerencia y Liderazgo
Gerencia y Liderazgo
 
Modelo osi
Modelo osiModelo osi
Modelo osi
 
E marketing
E marketingE marketing
E marketing
 
Signature Project: The Bramble Schoole
Signature Project: The Bramble SchooleSignature Project: The Bramble Schoole
Signature Project: The Bramble Schoole
 
Educación
EducaciónEducación
Educación
 
Animales en peligro
Animales en peligroAnimales en peligro
Animales en peligro
 
Ejercicios mru
Ejercicios mruEjercicios mru
Ejercicios mru
 
B.Com
B.ComB.Com
B.Com
 
County school rankings 2.15
County school rankings 2.15County school rankings 2.15
County school rankings 2.15
 
THERMODYNAMIC BEHAVIOR OF COMPLEX ANTIMONITE ORE FOR ELECTRODEPOSITION OF MET...
THERMODYNAMIC BEHAVIOR OF COMPLEX ANTIMONITE ORE FOR ELECTRODEPOSITION OF MET...THERMODYNAMIC BEHAVIOR OF COMPLEX ANTIMONITE ORE FOR ELECTRODEPOSITION OF MET...
THERMODYNAMIC BEHAVIOR OF COMPLEX ANTIMONITE ORE FOR ELECTRODEPOSITION OF MET...
 
Derecho administrativo
Derecho administrativoDerecho administrativo
Derecho administrativo
 
REPORT DELLA SAGRA DEL PROGRAMMA DI TARANTO
REPORT DELLA SAGRA DEL PROGRAMMA DI TARANTOREPORT DELLA SAGRA DEL PROGRAMMA DI TARANTO
REPORT DELLA SAGRA DEL PROGRAMMA DI TARANTO
 
La comunicación y la cultura nevis las tic
La comunicación y la cultura nevis las ticLa comunicación y la cultura nevis las tic
La comunicación y la cultura nevis las tic
 

Ähnlich wie Online identity getting to know your users

Authentication for Droids
Authentication for DroidsAuthentication for Droids
Authentication for DroidsPayPal
 
Death To Passwords
Death To PasswordsDeath To Passwords
Death To PasswordsDroidConTLV
 
Death To Passwords Droid Edition
Death To Passwords Droid EditionDeath To Passwords Droid Edition
Death To Passwords Droid EditionPayPal
 
Death To Passwords
Death To PasswordsDeath To Passwords
Death To PasswordsPayPal
 
Securing RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectSecuring RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectJonathan LeBlanc
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java ApplicationsStormpath
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
The State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashThe State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashAll Things Open
 
The state of passwordless auth on the web
The state of passwordless auth on the web The state of passwordless auth on the web
The state of passwordless auth on the web Phil Nash
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Gabriella Davis
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughSecureAuth
 
Cyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital WorldCyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital Worldqubanewmedia
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsFraudBusters
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthnFIDO Alliance
 
Hardware and the commerce revolution
Hardware and the commerce revolutionHardware and the commerce revolution
Hardware and the commerce revolutionCristiano Betta
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityChristian Heilmann
 
OmniAuth: From the Ground Up
OmniAuth: From the Ground UpOmniAuth: From the Ground Up
OmniAuth: From the Ground UpMichael Bleigh
 
The state of passwordless auth on the web
The state of passwordless auth on the webThe state of passwordless auth on the web
The state of passwordless auth on the webPhil Nash
 

Ähnlich wie Online identity getting to know your users (20)

Authentication for Droids
Authentication for DroidsAuthentication for Droids
Authentication for Droids
 
Death To Passwords
Death To PasswordsDeath To Passwords
Death To Passwords
 
Death To Passwords
Death To PasswordsDeath To Passwords
Death To Passwords
 
Death To Passwords Droid Edition
Death To Passwords Droid EditionDeath To Passwords Droid Edition
Death To Passwords Droid Edition
 
Death To Passwords
Death To PasswordsDeath To Passwords
Death To Passwords
 
Securing RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectSecuring RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID Connect
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
The State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashThe State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil Nash
 
The state of passwordless auth on the web
The state of passwordless auth on the web The state of passwordless auth on the web
The state of passwordless auth on the web
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
Cyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital WorldCyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital World
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthn
 
Hardware and the commerce revolution
Hardware and the commerce revolutionHardware and the commerce revolution
Hardware and the commerce revolution
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
OmniAuth: From the Ground Up
OmniAuth: From the Ground UpOmniAuth: From the Ground Up
OmniAuth: From the Ground Up
 
The state of passwordless auth on the web
The state of passwordless auth on the webThe state of passwordless auth on the web
The state of passwordless auth on the web
 

Mehr von Cristiano Betta

This strange planet earth
This strange planet earthThis strange planet earth
This strange planet earthCristiano Betta
 
Techsylvania -Hackathons on Rails
Techsylvania -Hackathons on RailsTechsylvania -Hackathons on Rails
Techsylvania -Hackathons on RailsCristiano Betta
 
Making your hackathon matter api con-uk
Making your hackathon matter   api con-ukMaking your hackathon matter   api con-uk
Making your hackathon matter api con-ukCristiano Betta
 
Why we released the kraken
Why we released the krakenWhy we released the kraken
Why we released the krakenCristiano Betta
 
How hardware is driving the commerce revolution copy
How hardware is driving the commerce revolution copyHow hardware is driving the commerce revolution copy
How hardware is driving the commerce revolution copyCristiano Betta
 
Making your hackathon matter
Making your hackathon matterMaking your hackathon matter
Making your hackathon matterCristiano Betta
 
Hackathons: Best Practices From experience
Hackathons: Best Practices From experienceHackathons: Best Practices From experience
Hackathons: Best Practices From experienceCristiano Betta
 
Hacking through space and time
Hacking through space and timeHacking through space and time
Hacking through space and timeCristiano Betta
 
Hacking with html5 video, rtc and shared web workers
Hacking with html5 video, rtc and shared web workersHacking with html5 video, rtc and shared web workers
Hacking with html5 video, rtc and shared web workersCristiano Betta
 
From geek to event organiser
From geek to event organiserFrom geek to event organiser
From geek to event organiserCristiano Betta
 
5 awesome new paypal hack ideas
5 awesome new paypal hack ideas5 awesome new paypal hack ideas
5 awesome new paypal hack ideasCristiano Betta
 
Concrete indentity really getting to know your users
Concrete indentity  really getting to know your usersConcrete indentity  really getting to know your users
Concrete indentity really getting to know your usersCristiano Betta
 
PayPal on iOS + 9 great free app ideas
PayPal on iOS + 9 great free app ideasPayPal on iOS + 9 great free app ideas
PayPal on iOS + 9 great free app ideasCristiano Betta
 
The state of packaged web apps
The state of packaged web appsThe state of packaged web apps
The state of packaged web appsCristiano Betta
 
Payments for the REST of us
Payments for the REST of usPayments for the REST of us
Payments for the REST of usCristiano Betta
 
Chrome Extensions for Hackers
Chrome Extensions for HackersChrome Extensions for Hackers
Chrome Extensions for HackersCristiano Betta
 
Creative Commons Introduction
Creative Commons IntroductionCreative Commons Introduction
Creative Commons IntroductionCristiano Betta
 

Mehr von Cristiano Betta (20)

This strange planet earth
This strange planet earthThis strange planet earth
This strange planet earth
 
Techsylvania -Hackathons on Rails
Techsylvania -Hackathons on RailsTechsylvania -Hackathons on Rails
Techsylvania -Hackathons on Rails
 
Death to Passwords
Death to Passwords Death to Passwords
Death to Passwords
 
Making your hackathon matter api con-uk
Making your hackathon matter   api con-ukMaking your hackathon matter   api con-uk
Making your hackathon matter api con-uk
 
The future ux of money
The future ux of moneyThe future ux of money
The future ux of money
 
Why we released the kraken
Why we released the krakenWhy we released the kraken
Why we released the kraken
 
How hardware is driving the commerce revolution copy
How hardware is driving the commerce revolution copyHow hardware is driving the commerce revolution copy
How hardware is driving the commerce revolution copy
 
Making your hackathon matter
Making your hackathon matterMaking your hackathon matter
Making your hackathon matter
 
Hackathons: Best Practices From experience
Hackathons: Best Practices From experienceHackathons: Best Practices From experience
Hackathons: Best Practices From experience
 
Hacking through space and time
Hacking through space and timeHacking through space and time
Hacking through space and time
 
Hacking with html5 video, rtc and shared web workers
Hacking with html5 video, rtc and shared web workersHacking with html5 video, rtc and shared web workers
Hacking with html5 video, rtc and shared web workers
 
From geek to event organiser
From geek to event organiserFrom geek to event organiser
From geek to event organiser
 
5 awesome new paypal hack ideas
5 awesome new paypal hack ideas5 awesome new paypal hack ideas
5 awesome new paypal hack ideas
 
Concrete indentity really getting to know your users
Concrete indentity  really getting to know your usersConcrete indentity  really getting to know your users
Concrete indentity really getting to know your users
 
PayPal on iOS + 9 great free app ideas
PayPal on iOS + 9 great free app ideasPayPal on iOS + 9 great free app ideas
PayPal on iOS + 9 great free app ideas
 
The state of packaged web apps
The state of packaged web appsThe state of packaged web apps
The state of packaged web apps
 
Payments for the REST of us
Payments for the REST of usPayments for the REST of us
Payments for the REST of us
 
Chrome Extensions for Hackers
Chrome Extensions for HackersChrome Extensions for Hackers
Chrome Extensions for Hackers
 
Encampment Opening Talk
Encampment Opening TalkEncampment Opening Talk
Encampment Opening Talk
 
Creative Commons Introduction
Creative Commons IntroductionCreative Commons Introduction
Creative Commons Introduction
 

Kürzlich hochgeladen

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 

Kürzlich hochgeladen (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Online identity getting to know your users