SlideShare una empresa de Scribd logo
1 de 21
Programming Social Applications
                               SXSWi Book Reading




Jonathan LeBlanc
Twitter: @jcleblanc
Hashtag: #FutureSoc
E-Mail: jleblanc@x.com
Github: github.com/jcleblanc
The Foundation Topics


                  The Foundations of Human Identity

                  Tribalism and Social Grouping

                  The Big Bag of Social Identity Fail



http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
The Foundation Topics


                  The Foundations of Human Identity

                  Tribalism and Social Grouping

                  The Big Bag of Social Identity Fail



http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: User Types




       Anonymous Users                        Real Identity Login


http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Open Identity Programming

       OAuth (1.0a + 2.0)
       PayPal Access, Facebook, Twitter

       OpenID (…and the upcoming OpenID Connect)
       PayPal Access, Google, Yahoo!

       Emerging Identity
       Mozilla BrowserID, WebFinger, LRDD

http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Anonymous Users




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Tracking Anonymous Users

                There are a few common options




             Tracking Cookie                   Local Storage


http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Real Identity Users




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Human Identity: Real Identity Sources

                        Sources of Real Identity




        Social (perceived)                    Concrete (true)

http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
The Foundation Topics


                  The Foundations of Human Identity

                  Tribalism and Social Grouping

                  The Big Bag of Social Identity Fail



http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: It’s Not A New Thing…




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: Foundation in Tribalism


    Tribalism started as a way to keep us safe

    …it has lead to some horrible parts of history

    but is also a foundation of many of our social
    relationships


http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: The Real Life Social Graph




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: The Online Social Graph




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: Group Types


                                  Follower Type


                                  Connection Type

                                  Group Type


http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Grouping: Data Miners are Rock Stars




http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
The Foundation Topics


                  The Foundations of Human Identity

                  Tribalism and Social Grouping

                  The Big Bag of Social Identity Fail



http://oreil.ly/FutureSoc   Programming Social Applications   Hashtag: #FutureSoc
Social Identity Fail: Personal Safety


   When Social Discovery Impacts Personal Safety


                            “My privacy concerns are not trite.
                            They are linked to my actual
                            physical safety”
                            --Harriet Jacobs (Gizmodo)



http://oreil.ly/FutureSoc    Programming Social Applications   Hashtag: #FutureSoc
Social Identity Fail: Privacy Concerns


        When Making Things Easy Impairs Privacy


                            “Path Uploads Your Entire iPhone
                            Contact List By Default”
                            --Mark Hachman (PCMag)




http://oreil.ly/FutureSoc    Programming Social Applications   Hashtag: #FutureSoc
Social Identity Fail: The Fine Line


     The Fine Line Between Insightful and Creepy


                            “How Target Figured Out A Teen Girl
                            Was Pregnant Before Her Father Did”
                            --Kashmir Hill (Forbes)




http://oreil.ly/FutureSoc        Programming Social Applications   Hashtag: #FutureSoc
Thank You! Questions?
                  Slides: http://slidesha.re/programmingsocial




Jonathan LeBlanc
Twitter: @jcleblanc
Hashtag: #FutureSoc
E-Mail: jleblanc@x.com
Github: github.com/jcleblanc

Más contenido relacionado

La actualidad más candente

Liaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social mediaLiaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social mediaMelissa Cheater
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?Blue Coat
 
Guidance Counsellor Forum, November 2009
Guidance Counsellor Forum, November 2009Guidance Counsellor Forum, November 2009
Guidance Counsellor Forum, November 2009Melissa Cheater
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the CyberspaceEmil Tan
 
API: Advertising Propagation Interface
API: Advertising Propagation InterfaceAPI: Advertising Propagation Interface
API: Advertising Propagation InterfaceArmando Alves
 
Big Informality
Big InformalityBig Informality
Big InformalityChangeist
 
LinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLancope, Inc.
 
Facebook Business
Facebook BusinessFacebook Business
Facebook BusinessBilgiEC149
 
NM Department of Agriculture
NM Department of AgricultureNM Department of Agriculture
NM Department of AgricultureJulia Parra
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
KEYNOTE: The Unlikely Romance: Part 2 - What Now?
KEYNOTE: The Unlikely Romance: Part 2 - What Now?KEYNOTE: The Unlikely Romance: Part 2 - What Now?
KEYNOTE: The Unlikely Romance: Part 2 - What Now?Casey Ellis
 
Using emerging technologies for open access Best practices for dissemination ...
Using emerging technologies for open access Best practices for dissemination ...Using emerging technologies for open access Best practices for dissemination ...
Using emerging technologies for open access Best practices for dissemination ...Tiffini Travis
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011Donald E. Hester
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Aleque Juneau
 

La actualidad más candente (18)

Liaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social mediaLiaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social media
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Guidance Counsellor Forum, November 2009
Guidance Counsellor Forum, November 2009Guidance Counsellor Forum, November 2009
Guidance Counsellor Forum, November 2009
 
Smartphone Penetration Exceeds 50 Percent in Major Markets by Augustine Fou
Smartphone Penetration Exceeds 50 Percent in Major Markets by Augustine FouSmartphone Penetration Exceeds 50 Percent in Major Markets by Augustine Fou
Smartphone Penetration Exceeds 50 Percent in Major Markets by Augustine Fou
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the Cyberspace
 
API: Advertising Propagation Interface
API: Advertising Propagation InterfaceAPI: Advertising Propagation Interface
API: Advertising Propagation Interface
 
Big Informality
Big InformalityBig Informality
Big Informality
 
LinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering Threat
 
Facebook Business
Facebook BusinessFacebook Business
Facebook Business
 
NM Department of Agriculture
NM Department of AgricultureNM Department of Agriculture
NM Department of Agriculture
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
KEYNOTE: The Unlikely Romance: Part 2 - What Now?
KEYNOTE: The Unlikely Romance: Part 2 - What Now?KEYNOTE: The Unlikely Romance: Part 2 - What Now?
KEYNOTE: The Unlikely Romance: Part 2 - What Now?
 
Using emerging technologies for open access Best practices for dissemination ...
Using emerging technologies for open access Best practices for dissemination ...Using emerging technologies for open access Best practices for dissemination ...
Using emerging technologies for open access Best practices for dissemination ...
 
Errors
ErrorsErrors
Errors
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 

Destacado

Securing and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data MiningSecuring and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data MiningJonathan LeBlanc
 
Creating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data MiningCreating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data MiningJonathan LeBlanc
 
Browser MVC with YQL and YUI
Browser MVC with YQL and YUIBrowser MVC with YQL and YUI
Browser MVC with YQL and YUIJonathan LeBlanc
 
Rrv head & shoulders new
Rrv head & shoulders newRrv head & shoulders new
Rrv head & shoulders newBhupesh sahu
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensJonathan LeBlanc
 
The 5 API Monetization Models and How to Measure Their Success
The 5 API Monetization Models and How to Measure Their SuccessThe 5 API Monetization Models and How to Measure Their Success
The 5 API Monetization Models and How to Measure Their SuccessRob Zazueta
 
SOA in the API World - Facades, Transactions, Stateless Services
SOA in the API World - Facades, Transactions, Stateless Services SOA in the API World - Facades, Transactions, Stateless Services
SOA in the API World - Facades, Transactions, Stateless Services Apigee | Google Cloud
 
The Five API Monetization Models - Rob Zazueta, RESTFest 2016
The Five API Monetization Models - Rob Zazueta, RESTFest 2016The Five API Monetization Models - Rob Zazueta, RESTFest 2016
The Five API Monetization Models - Rob Zazueta, RESTFest 2016Rob Zazueta
 
Application Portfolio Management
Application Portfolio ManagementApplication Portfolio Management
Application Portfolio ManagementAlain Charpentier
 
Secure Your APIs with Amazon API Gateway
Secure Your APIs with Amazon API GatewaySecure Your APIs with Amazon API Gateway
Secure Your APIs with Amazon API GatewayMohammed Badran
 

Destacado (13)

Securing and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data MiningSecuring and Personalizing Commerce Using Identity Data Mining
Securing and Personalizing Commerce Using Identity Data Mining
 
Creating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data MiningCreating Operational Redundancy for Effective Web Data Mining
Creating Operational Redundancy for Effective Web Data Mining
 
Browser MVC with YQL and YUI
Browser MVC with YQL and YUIBrowser MVC with YQL and YUI
Browser MVC with YQL and YUI
 
2011 HackU UCSD
2011 HackU UCSD2011 HackU UCSD
2011 HackU UCSD
 
Rrv head & shoulders new
Rrv head & shoulders newRrv head & shoulders new
Rrv head & shoulders new
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web Tokens
 
The 5 API Monetization Models and How to Measure Their Success
The 5 API Monetization Models and How to Measure Their SuccessThe 5 API Monetization Models and How to Measure Their Success
The 5 API Monetization Models and How to Measure Their Success
 
SOA in the API World - Facades, Transactions, Stateless Services
SOA in the API World - Facades, Transactions, Stateless Services SOA in the API World - Facades, Transactions, Stateless Services
SOA in the API World - Facades, Transactions, Stateless Services
 
The Five API Monetization Models - Rob Zazueta, RESTFest 2016
The Five API Monetization Models - Rob Zazueta, RESTFest 2016The Five API Monetization Models - Rob Zazueta, RESTFest 2016
The Five API Monetization Models - Rob Zazueta, RESTFest 2016
 
Application Portfolio Management
Application Portfolio ManagementApplication Portfolio Management
Application Portfolio Management
 
Secure Your APIs with Amazon API Gateway
Secure Your APIs with Amazon API GatewaySecure Your APIs with Amazon API Gateway
Secure Your APIs with Amazon API Gateway
 
Securing API data models
Securing API data modelsSecuring API data models
Securing API data models
 

Similar a SXSWi 2012: Programming Social Applications

BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceBSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceJosephTesta9
 
2010 sept - mobile web africa - marc smith - says who - mapping social medi...
2010   sept - mobile web africa - marc smith - says who - mapping social medi...2010   sept - mobile web africa - marc smith - says who - mapping social medi...
2010 sept - mobile web africa - marc smith - says who - mapping social medi...Marc Smith
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebJamie Reffell
 
The Coevolution of Language & Social Technologies
The Coevolution of Language & Social TechnologiesThe Coevolution of Language & Social Technologies
The Coevolution of Language & Social TechnologiesRoland Smart
 
Social Web for VU Dagje Studeren
Social Web for VU Dagje Studeren Social Web for VU Dagje Studeren
Social Web for VU Dagje Studeren Victor de Boer
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)Michael Edson
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINTChandrapal Badshah
 
Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Bex Lewis
 
Brighten Your Future With IT : Why I Need to Start Learn Programming
Brighten Your Future With IT : Why I Need to Start Learn ProgrammingBrighten Your Future With IT : Why I Need to Start Learn Programming
Brighten Your Future With IT : Why I Need to Start Learn ProgrammingMuhammad Singgih Z.A
 
ReadWriteWeb Presentation Dec08
ReadWriteWeb Presentation Dec08ReadWriteWeb Presentation Dec08
ReadWriteWeb Presentation Dec08Richard MacManus
 
BCcampus a-great-babbling-bazaar
BCcampus a-great-babbling-bazaarBCcampus a-great-babbling-bazaar
BCcampus a-great-babbling-bazaarb p
 
Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Victor de Boer
 
Social Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceSocial Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceLaDonna Coy
 
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09Karl Kasca
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013Ray Brannon
 
The digital revolution and the future 2012
The digital revolution and the future 2012The digital revolution and the future 2012
The digital revolution and the future 2012Bex Lewis
 

Similar a SXSWi 2012: Programming Social Applications (20)

BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceBSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
 
Wizard of Apps Revised
Wizard of Apps RevisedWizard of Apps Revised
Wizard of Apps Revised
 
Technology for engagement
Technology for engagementTechnology for engagement
Technology for engagement
 
2010 sept - mobile web africa - marc smith - says who - mapping social medi...
2010   sept - mobile web africa - marc smith - says who - mapping social medi...2010   sept - mobile web africa - marc smith - says who - mapping social medi...
2010 sept - mobile web africa - marc smith - says who - mapping social medi...
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the Web
 
The Coevolution of Language & Social Technologies
The Coevolution of Language & Social TechnologiesThe Coevolution of Language & Social Technologies
The Coevolution of Language & Social Technologies
 
Social Web for VU Dagje Studeren
Social Web for VU Dagje Studeren Social Web for VU Dagje Studeren
Social Web for VU Dagje Studeren
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013
 
Brighten Your Future With IT : Why I Need to Start Learn Programming
Brighten Your Future With IT : Why I Need to Start Learn ProgrammingBrighten Your Future With IT : Why I Need to Start Learn Programming
Brighten Your Future With IT : Why I Need to Start Learn Programming
 
ReadWriteWeb Presentation Dec08
ReadWriteWeb Presentation Dec08ReadWriteWeb Presentation Dec08
ReadWriteWeb Presentation Dec08
 
BCcampus a-great-babbling-bazaar
BCcampus a-great-babbling-bazaarBCcampus a-great-babbling-bazaar
BCcampus a-great-babbling-bazaar
 
Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016
 
Social Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceSocial Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention Conference
 
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
The Importance Of Ethics In Social Media In Marketing&Advertising 03 10 09
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
The digital revolution and the future 2012
The digital revolution and the future 2012The digital revolution and the future 2012
The digital revolution and the future 2012
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 

Más de Jonathan LeBlanc

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJonathan LeBlanc
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsJonathan LeBlanc
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessJonathan LeBlanc
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with BoxJonathan LeBlanc
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer WorkshopJonathan LeBlanc
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security PracticesJonathan LeBlanc
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI ElementsJonathan LeBlanc
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingJonathan LeBlanc
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyJonathan LeBlanc
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data SecurityJonathan LeBlanc
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data SecurityJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityJonathan LeBlanc
 

Más de Jonathan LeBlanc (20)

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the Client
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data Insights
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and Serverless
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with Box
 
Box Platform Overview
Box Platform OverviewBox Platform Overview
Box Platform Overview
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer Workshop
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security Practices
 
Box Authentication Types
Box Authentication TypesBox Authentication Types
Box Authentication Types
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI Elements
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scoping
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments Globally
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data Security
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data Security
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable Security
 
Kill All Passwords
Kill All PasswordsKill All Passwords
Kill All Passwords
 
BattleHack Los Angeles
BattleHack Los Angeles BattleHack Los Angeles
BattleHack Los Angeles
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

SXSWi 2012: Programming Social Applications

  • 1. Programming Social Applications SXSWi Book Reading Jonathan LeBlanc Twitter: @jcleblanc Hashtag: #FutureSoc E-Mail: jleblanc@x.com Github: github.com/jcleblanc
  • 2. The Foundation Topics The Foundations of Human Identity Tribalism and Social Grouping The Big Bag of Social Identity Fail http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 3. The Foundation Topics The Foundations of Human Identity Tribalism and Social Grouping The Big Bag of Social Identity Fail http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 4. Human Identity: User Types Anonymous Users Real Identity Login http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 5. Human Identity: Open Identity Programming OAuth (1.0a + 2.0) PayPal Access, Facebook, Twitter OpenID (…and the upcoming OpenID Connect) PayPal Access, Google, Yahoo! Emerging Identity Mozilla BrowserID, WebFinger, LRDD http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 6. Human Identity: Anonymous Users http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 7. Human Identity: Tracking Anonymous Users There are a few common options Tracking Cookie Local Storage http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 8. Human Identity: Real Identity Users http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 9. Human Identity: Real Identity Sources Sources of Real Identity Social (perceived) Concrete (true) http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 10. The Foundation Topics The Foundations of Human Identity Tribalism and Social Grouping The Big Bag of Social Identity Fail http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 11. Social Grouping: It’s Not A New Thing… http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 12. Social Grouping: Foundation in Tribalism Tribalism started as a way to keep us safe …it has lead to some horrible parts of history but is also a foundation of many of our social relationships http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 13. Social Grouping: The Real Life Social Graph http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 14. Social Grouping: The Online Social Graph http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 15. Social Grouping: Group Types Follower Type Connection Type Group Type http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 16. Social Grouping: Data Miners are Rock Stars http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 17. The Foundation Topics The Foundations of Human Identity Tribalism and Social Grouping The Big Bag of Social Identity Fail http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 18. Social Identity Fail: Personal Safety When Social Discovery Impacts Personal Safety “My privacy concerns are not trite. They are linked to my actual physical safety” --Harriet Jacobs (Gizmodo) http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 19. Social Identity Fail: Privacy Concerns When Making Things Easy Impairs Privacy “Path Uploads Your Entire iPhone Contact List By Default” --Mark Hachman (PCMag) http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 20. Social Identity Fail: The Fine Line The Fine Line Between Insightful and Creepy “How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did” --Kashmir Hill (Forbes) http://oreil.ly/FutureSoc Programming Social Applications Hashtag: #FutureSoc
  • 21. Thank You! Questions? Slides: http://slidesha.re/programmingsocial Jonathan LeBlanc Twitter: @jcleblanc Hashtag: #FutureSoc E-Mail: jleblanc@x.com Github: github.com/jcleblanc

Notas del editor

  1. http://gizmodo.com/5470696/fck-you-google
  2. http://www.pcmag.com/article2/0,2817,2399970,00.asp
  3. http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/The statistician is now a rock star