SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Programming Social Applications
                               SXSWi Book Reading




Jonathan LeBlanc
Twitter: @jcleblanc
Hashtag: #FutureSoc
E-Mail: jleblanc@x.com
Github: github.com/jcleblanc
The Foundation Topics


                  The Foundations of Human Identity

                  Tribalism and Social Grouping

                  The Big Bag of Social Identity Fail



http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
The Foundation Topics


                  The Foundations of Human Identity

                  Tribalism and Social Grouping

                  The Big Bag of Social Identity Fail



http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: User Types




       Anonymous Users                        Real Identity Login


http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Open Identity Programming

       OAuth (1.0a + 2.0)
       PayPal Access, Facebook, Twitter

       OpenID (…and the upcoming OpenID Connect)
       PayPal Access, Google, Yahoo!

       Emerging Identity
       Mozilla BrowserID, WebFinger, LRDD

http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Anonymous Users




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Tracking Anonymous Users

                There are a few common options




             Tracking Cookie                   Local Storage


http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Real Identity Users




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Real Identity Sources

                        Sources of Real Identity




        Social (perceived)                    Concrete (true)

http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
The Foundation Topics


                  The Foundations of Human Identity

                  Tribalism and Social Grouping

                  The Big Bag of Social Identity Fail



http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: It’s Not A New Thing…




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: Foundation in Tribalism


    Tribalism started as a way to keep us safe

    …it has lead to some horrible parts of history

    but is also a foundation of many of our social
    relationships


http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: The Real Life Social Graph




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: The Online Social Graph




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: Group Types


                                  Follower Type


                                  Connection Type

                                  Group Type


http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: Data Miners are Rock Stars




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
The Foundation Topics


                  The Foundations of Human Identity

                  Tribalism and Social Grouping

                  The Big Bag of Social Identity Fail



http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Identity Fail: Personal Safety


   When Social Discovery Impacts Personal Safety


                            “My privacy concerns are not trite.
                            They are linked to my actual
                            physical safety”
                            --Harriet Jacobs (Gizmodo)



http://oreil.ly/FutureSoc    Programming Social Applications   Hashtag: #FutureSoc
Social Identity Fail: Privacy Concerns


        When Making Things Easy Impairs Privacy


                            “Path Uploads Your Entire iPhone
                            Contact List By Default”
                            --Mark Hachman (PCMag)




http://oreil.ly/FutureSoc    Programming Social Applications   Hashtag: #FutureSoc
Social Identity Fail: The Fine Line


     The Fine Line Between Insightful and Creepy


                            “How Target Figured Out A Teen Girl
                            Was Pregnant Before Her Father Did”
                            --Kashmir Hill (Forbes)




http://oreil.ly/FutureSoc        Programming Social Applications   Hashtag: #FutureSoc
Thank You! Questions?
                  Slides: http://slidesha.re/programmingsocial




Jonathan LeBlanc
Twitter: @jcleblanc
Hashtag: #FutureSoc
E-Mail: jleblanc@x.com
Github: github.com/jcleblanc

Weitere ähnliche Inhalte

Was ist angesagt?

Liaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social mediaLiaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social mediaMelissa Cheater
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?Blue Coat
 
Guidance Counsellor Forum, November 2009
Guidance Counsellor Forum, November 2009Guidance Counsellor Forum, November 2009
Guidance Counsellor Forum, November 2009Melissa Cheater
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the CyberspaceEmil Tan
 
API: Advertising Propagation Interface
API: Advertising Propagation InterfaceAPI: Advertising Propagation Interface
API: Advertising Propagation InterfaceArmando Alves
 
Big Informality
Big InformalityBig Informality
Big InformalityChangeist
 
LinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLancope, Inc.
 
Facebook Business
Facebook BusinessFacebook Business
Facebook BusinessBilgiEC149
 
NM Department of Agriculture
NM Department of AgricultureNM Department of Agriculture
NM Department of AgricultureJulia Parra
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
KEYNOTE: The Unlikely Romance: Part 2 - What Now?
KEYNOTE: The Unlikely Romance: Part 2 - What Now?KEYNOTE: The Unlikely Romance: Part 2 - What Now?
KEYNOTE: The Unlikely Romance: Part 2 - What Now?Casey Ellis
 
Using emerging technologies for open access Best practices for dissemination ...
Using emerging technologies for open access Best practices for dissemination ...Using emerging technologies for open access Best practices for dissemination ...
Using emerging technologies for open access Best practices for dissemination ...Tiffini Travis
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011Donald E. Hester
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Aleque Juneau
 

Was ist angesagt? (18)

Liaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social mediaLiaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social media
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Guidance Counsellor Forum, November 2009
Guidance Counsellor Forum, November 2009Guidance Counsellor Forum, November 2009
Guidance Counsellor Forum, November 2009
 
Smartphone Penetration Exceeds 50 Percent in Major Markets by Augustine Fou
Smartphone Penetration Exceeds 50 Percent in Major Markets by Augustine FouSmartphone Penetration Exceeds 50 Percent in Major Markets by Augustine Fou
Smartphone Penetration Exceeds 50 Percent in Major Markets by Augustine Fou
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the Cyberspace
 
API: Advertising Propagation Interface
API: Advertising Propagation InterfaceAPI: Advertising Propagation Interface
API: Advertising Propagation Interface
 
Big Informality
Big InformalityBig Informality
Big Informality
 
LinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering Threat
 
Facebook Business
Facebook BusinessFacebook Business
Facebook Business
 
NM Department of Agriculture
NM Department of AgricultureNM Department of Agriculture
NM Department of Agriculture
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
KEYNOTE: The Unlikely Romance: Part 2 - What Now?
KEYNOTE: The Unlikely Romance: Part 2 - What Now?KEYNOTE: The Unlikely Romance: Part 2 - What Now?
KEYNOTE: The Unlikely Romance: Part 2 - What Now?
 
Using emerging technologies for open access Best practices for dissemination ...
Using emerging technologies for open access Best practices for dissemination ...Using emerging technologies for open access Best practices for dissemination ...
Using emerging technologies for open access Best practices for dissemination ...
 
Errors
ErrorsErrors
Errors
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 

Andere mochten auch

Securing and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data MiningSecuring and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data MiningJonathan LeBlanc
 
Creating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data MiningCreating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data MiningJonathan LeBlanc
 
Browser MVC with YQL and YUI
Browser MVC with YQL and YUIBrowser MVC with YQL and YUI
Browser MVC with YQL and YUIJonathan LeBlanc
 
Rrv head & shoulders new
Rrv head & shoulders newRrv head & shoulders new
Rrv head & shoulders newBhupesh sahu
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensJonathan LeBlanc
 
The 5 API Monetization Models and How to Measure Their Success
The 5 API Monetization Models and How to Measure Their SuccessThe 5 API Monetization Models and How to Measure Their Success
The 5 API Monetization Models and How to Measure Their SuccessRob Zazueta
 
SOA in the API World - Facades, Transactions, Stateless Services
SOA in the API World - Facades, Transactions, Stateless Services SOA in the API World - Facades, Transactions, Stateless Services
SOA in the API World - Facades, Transactions, Stateless Services Apigee | Google Cloud
 
The Five API Monetization Models - Rob Zazueta, RESTFest 2016
The Five API Monetization Models - Rob Zazueta, RESTFest 2016The Five API Monetization Models - Rob Zazueta, RESTFest 2016
The Five API Monetization Models - Rob Zazueta, RESTFest 2016Rob Zazueta
 
Application Portfolio Management
Application Portfolio ManagementApplication Portfolio Management
Application Portfolio ManagementAlain Charpentier
 
Secure Your APIs with Amazon API Gateway
Secure Your APIs with Amazon API GatewaySecure Your APIs with Amazon API Gateway
Secure Your APIs with Amazon API GatewayMohammed Badran
 

Andere mochten auch (13)

Securing and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data MiningSecuring and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data Mining
 
Creating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data MiningCreating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data Mining
 
Browser MVC with YQL and YUI
Browser MVC with YQL and YUIBrowser MVC with YQL and YUI
Browser MVC with YQL and YUI
 
2011 HackU UCSD
2011 HackU UCSD2011 HackU UCSD
2011 HackU UCSD
 
Rrv head & shoulders new
Rrv head & shoulders newRrv head & shoulders new
Rrv head & shoulders new
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web Tokens
 
The 5 API Monetization Models and How to Measure Their Success
The 5 API Monetization Models and How to Measure Their SuccessThe 5 API Monetization Models and How to Measure Their Success
The 5 API Monetization Models and How to Measure Their Success
 
SOA in the API World - Facades, Transactions, Stateless Services
SOA in the API World - Facades, Transactions, Stateless Services SOA in the API World - Facades, Transactions, Stateless Services
SOA in the API World - Facades, Transactions, Stateless Services
 
The Five API Monetization Models - Rob Zazueta, RESTFest 2016
The Five API Monetization Models - Rob Zazueta, RESTFest 2016The Five API Monetization Models - Rob Zazueta, RESTFest 2016
The Five API Monetization Models - Rob Zazueta, RESTFest 2016
 
Application Portfolio Management
Application Portfolio ManagementApplication Portfolio Management
Application Portfolio Management
 
Secure Your APIs with Amazon API Gateway
Secure Your APIs with Amazon API GatewaySecure Your APIs with Amazon API Gateway
Secure Your APIs with Amazon API Gateway
 
Securing API data models
Securing API data modelsSecuring API data models
Securing API data models
 

Ähnlich wie SXSWi 2012: Programming Social Applications

BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceBSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceJosephTesta9
 
2010 sept - mobile web africa - marc smith - says who - mapping social medi...
2010   sept - mobile web africa - marc smith - says who - mapping social medi...2010   sept - mobile web africa - marc smith - says who - mapping social medi...
2010 sept - mobile web africa - marc smith - says who - mapping social medi...Marc Smith
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebJamie Reffell
 
The Coevolution of Language & Social Technologies
The Coevolution of Language & Social TechnologiesThe Coevolution of Language & Social Technologies
The Coevolution of Language & Social TechnologiesRoland Smart
 
Social Web for VU Dagje Studeren
Social Web for VU Dagje Studeren Social Web for VU Dagje Studeren
Social Web for VU Dagje Studeren Victor de Boer
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)Michael Edson
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINTChandrapal Badshah
 
Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Bex Lewis
 
Brighten Your Future With IT : Why I Need to Start Learn Programming
Brighten Your Future With IT : Why I Need to Start Learn ProgrammingBrighten Your Future With IT : Why I Need to Start Learn Programming
Brighten Your Future With IT : Why I Need to Start Learn ProgrammingMuhammad Singgih Z.A
 
ReadWriteWeb Presentation Dec08
ReadWriteWeb Presentation Dec08ReadWriteWeb Presentation Dec08
ReadWriteWeb Presentation Dec08Richard MacManus
 
BCcampus a-great-babbling-bazaar
BCcampus a-great-babbling-bazaarBCcampus a-great-babbling-bazaar
BCcampus a-great-babbling-bazaarb p
 
Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Victor de Boer
 
Social Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceSocial Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceLaDonna Coy
 
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09Karl Kasca
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013Ray Brannon
 
The digital revolution and the future 2012
The digital revolution and the future 2012The digital revolution and the future 2012
The digital revolution and the future 2012Bex Lewis
 

Ähnlich wie SXSWi 2012: Programming Social Applications (20)

BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceBSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
 
Wizard of Apps Revised
Wizard of Apps RevisedWizard of Apps Revised
Wizard of Apps Revised
 
Technology for engagement
Technology for engagementTechnology for engagement
Technology for engagement
 
2010 sept - mobile web africa - marc smith - says who - mapping social medi...
2010   sept - mobile web africa - marc smith - says who - mapping social medi...2010   sept - mobile web africa - marc smith - says who - mapping social medi...
2010 sept - mobile web africa - marc smith - says who - mapping social medi...
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the Web
 
The Coevolution of Language & Social Technologies
The Coevolution of Language & Social TechnologiesThe Coevolution of Language & Social Technologies
The Coevolution of Language & Social Technologies
 
Social Web for VU Dagje Studeren
Social Web for VU Dagje Studeren Social Web for VU Dagje Studeren
Social Web for VU Dagje Studeren
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013
 
Brighten Your Future With IT : Why I Need to Start Learn Programming
Brighten Your Future With IT : Why I Need to Start Learn ProgrammingBrighten Your Future With IT : Why I Need to Start Learn Programming
Brighten Your Future With IT : Why I Need to Start Learn Programming
 
ReadWriteWeb Presentation Dec08
ReadWriteWeb Presentation Dec08ReadWriteWeb Presentation Dec08
ReadWriteWeb Presentation Dec08
 
BCcampus a-great-babbling-bazaar
BCcampus a-great-babbling-bazaarBCcampus a-great-babbling-bazaar
BCcampus a-great-babbling-bazaar
 
Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016
 
Social Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceSocial Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention Conference
 
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
The digital revolution and the future 2012
The digital revolution and the future 2012The digital revolution and the future 2012
The digital revolution and the future 2012
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 

Mehr von Jonathan LeBlanc

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJonathan LeBlanc
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsJonathan LeBlanc
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessJonathan LeBlanc
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with BoxJonathan LeBlanc
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer WorkshopJonathan LeBlanc
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security PracticesJonathan LeBlanc
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI ElementsJonathan LeBlanc
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingJonathan LeBlanc
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyJonathan LeBlanc
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data SecurityJonathan LeBlanc
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data SecurityJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityJonathan LeBlanc
 

Mehr von Jonathan LeBlanc (20)

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the Client
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data Insights
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and Serverless
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with Box
 
Box Platform Overview
Box Platform OverviewBox Platform Overview
Box Platform Overview
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer Workshop
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security Practices
 
Box Authentication Types
Box Authentication TypesBox Authentication Types
Box Authentication Types
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI Elements
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scoping
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments Globally
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data Security
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data Security
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable Security
 
Kill All Passwords
Kill All PasswordsKill All Passwords
Kill All Passwords
 
BattleHack Los Angeles
BattleHack Los Angeles BattleHack Los Angeles
BattleHack Los Angeles
 

Kürzlich hochgeladen

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Kürzlich hochgeladen (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

SXSWi 2012: Programming Social Applications

  • 1. Programming Social Applications SXSWi Book Reading Jonathan LeBlanc Twitter: @jcleblanc Hashtag: #FutureSoc E-Mail: jleblanc@x.com Github: github.com/jcleblanc
  • 2. The Foundation Topics The Foundations of Human Identity Tribalism and Social Grouping The Big Bag of Social Identity Fail http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 3. The Foundation Topics The Foundations of Human Identity Tribalism and Social Grouping The Big Bag of Social Identity Fail http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 4. Human Identity: User Types Anonymous Users Real Identity Login http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 5. Human Identity: Open Identity Programming OAuth (1.0a + 2.0) PayPal Access, Facebook, Twitter OpenID (…and the upcoming OpenID Connect) PayPal Access, Google, Yahoo! Emerging Identity Mozilla BrowserID, WebFinger, LRDD http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 6. Human Identity: Anonymous Users http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 7. Human Identity: Tracking Anonymous Users There are a few common options Tracking Cookie Local Storage http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 8. Human Identity: Real Identity Users http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 9. Human Identity: Real Identity Sources Sources of Real Identity Social (perceived) Concrete (true) http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 10. The Foundation Topics The Foundations of Human Identity Tribalism and Social Grouping The Big Bag of Social Identity Fail http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 11. Social Grouping: It’s Not A New Thing… http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 12. Social Grouping: Foundation in Tribalism Tribalism started as a way to keep us safe …it has lead to some horrible parts of history but is also a foundation of many of our social relationships http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 13. Social Grouping: The Real Life Social Graph http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 14. Social Grouping: The Online Social Graph http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 15. Social Grouping: Group Types Follower Type Connection Type Group Type http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 16. Social Grouping: Data Miners are Rock Stars http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 17. The Foundation Topics The Foundations of Human Identity Tribalism and Social Grouping The Big Bag of Social Identity Fail http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 18. Social Identity Fail: Personal Safety When Social Discovery Impacts Personal Safety “My privacy concerns are not trite. They are linked to my actual physical safety” --Harriet Jacobs (Gizmodo) http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 19. Social Identity Fail: Privacy Concerns When Making Things Easy Impairs Privacy “Path Uploads Your Entire iPhone Contact List By Default” --Mark Hachman (PCMag) http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 20. Social Identity Fail: The Fine Line The Fine Line Between Insightful and Creepy “How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did” --Kashmir Hill (Forbes) http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 21. Thank You! Questions? Slides: http://slidesha.re/programmingsocial Jonathan LeBlanc Twitter: @jcleblanc Hashtag: #FutureSoc E-Mail: jleblanc@x.com Github: github.com/jcleblanc

Hinweis der Redaktion

  1. http://gizmodo.com/5470696/fck-you-google
  2. http://www.pcmag.com/article2/0,2817,2399970,00.asp
  3. http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/The statistician is now a rock star