Submit Search
Upload
Open Source Microblogging With Laconica
•
Download as ODP, PDF
•
5 likes
•
6,140 views
Evan Prodromou
Follow
My talk from Open Web Vancouver.
Read less
Read more
Technology
News & Politics
Report
Share
Report
Share
1 of 121
Download now
Recommended
Using social media to boost your ministrys online presence
Using social media to boost your ministrys online presence
Ernest Staats
Presentation given for Eurpean Actemium 2008 conference in Cannes
Cannes 2008 Presentation
Cannes 2008 Presentation
ary stuifbergen
Community Development How to engage your community using Social Media
Community Development How to engage your community using Social Media
Community Development How to engage your community using Social Media
Community Legal Education Ontario (CLEO)
A talk done at BarCamp London 4 on how to break the internet using social applications
How to break the internet
How to break the internet
Paul Johnston
A presentation given at the University of Arkansas on how disparate internet services are converging.
Service and Technology Convergence
Service and Technology Convergence
bryankemp
This is a very simple guide to getting started, by Mary Hall. Twitter @Recessionista. http://www.therecessionista.com
Twitter Basics for Beginners
Twitter Basics for Beginners
Mary Hall
Meshtop Slideshare Ppt
Meshtop Slideshare Ppt
MeshTop
The handout that has been given to participants containting useful ressources for Journalist
Telomiova Friday Talk Club
Telomiova Friday Talk Club
Hery Zo Rakotondramanana
Recommended
Using social media to boost your ministrys online presence
Using social media to boost your ministrys online presence
Ernest Staats
Presentation given for Eurpean Actemium 2008 conference in Cannes
Cannes 2008 Presentation
Cannes 2008 Presentation
ary stuifbergen
Community Development How to engage your community using Social Media
Community Development How to engage your community using Social Media
Community Development How to engage your community using Social Media
Community Legal Education Ontario (CLEO)
A talk done at BarCamp London 4 on how to break the internet using social applications
How to break the internet
How to break the internet
Paul Johnston
A presentation given at the University of Arkansas on how disparate internet services are converging.
Service and Technology Convergence
Service and Technology Convergence
bryankemp
This is a very simple guide to getting started, by Mary Hall. Twitter @Recessionista. http://www.therecessionista.com
Twitter Basics for Beginners
Twitter Basics for Beginners
Mary Hall
Meshtop Slideshare Ppt
Meshtop Slideshare Ppt
MeshTop
The handout that has been given to participants containting useful ressources for Journalist
Telomiova Friday Talk Club
Telomiova Friday Talk Club
Hery Zo Rakotondramanana
How does serverless impact the IT department and what skillsets are you going to need in to bring this future technology into your organisation?
How Serverless Changes the IT Department - November 2018 - Serverless Computi...
How Serverless Changes the IT Department - November 2018 - Serverless Computi...
Paul Johnston
What are some best practices for serverless applications? Paul Johnston gives his opinion based on his widely shared blog post bit.ly/serverlessbestpractices
Serverless Best Practices - Serverless Computing London
Serverless Best Practices - Serverless Computing London
Paul Johnston
Presented at beCamp2008 in Charlottesville, VA.
Ahson Wardak Web 3.0 Be Camp 2008
Ahson Wardak Web 3.0 Be Camp 2008
uvahson
Presentation to the Southeast PA Webmaster Association regarding social media use in government
2010: SEPA Web Assoc: Getting Your Agency's Message Out
2010: SEPA Web Assoc: Getting Your Agency's Message Out
Carol Spencer
Slides for my talk at the IABC luncheon March 16th, 2009. You can view a video presentation (with audio) on: sixty4media or Miss604.com
Twitter For Business
Twitter For Business
miss604
Social Media presentation for Think. Learn. Libraries.
Social media presentation
Social media presentation
Chris Wilson
Santy Webworm
Santy Webworm
phantom320
My talk at OSCON 2008 about Identi.ca, Free Network Services, and stuff like that.
Oscon 2008 Open Micro Blogging Presentation
Oscon 2008 Open Micro Blogging Presentation
Evan Prodromou
A .net developer experiences with web2.0 and social media
A .net developer experiences with web2.0 and social media
Roy Lachica
Presented at the Pittsburgh Technology Council on January 20, 2010.
Workshop Trends In Open Source Tech 1 20 10
Workshop Trends In Open Source Tech 1 20 10
NuRelm
Introduction to web 2
Introduction to web 2
Introduction to web 2
Nick Hodge
Who provides your e-mail service? Where do you post your photos? Do you download music still? When all of our data is spread amongst multiple devices between multiple locations – home, office, and mobile – then it becomes clear why on-line network services rule supreme over managing personal computers in providing synchronized capable services that don't require us to update software or hack-in fixes. The modern person's primary concern in using a computer is to get things done and stay connected with others globally in the most effective ways possible. The shift to on-line network services, often partnered with cloud computing, requires us all to question whose cloud our data is in, what can the cloud owner do with it, and what rights are we forking over to be on cloud nine. For example, if I use Google's Gmail service, what can Google do with my e-mail data? This last summer 2008 a great example emerged when the mega-popular micro-blogging service Twitter failed regularly resulting in pop-culture fall-out with sightings of the fail whale. Open Source hero Evan Prodromou of WikiTravel-fame stepped up and realized the shortcomings of Twitter's locked approach and created Identi.ca, an Open Software Service based micro-blogging web service that both worked solidly, replicated common functionality from similar services, and allowed for others to hack on the project, or set-up their own connected site if so desired. This presentation looks at the landscape of services like Identi.ca which are adapting the Free and Open Source Software approach to on-line network services publicly championed from the Autonomo.us blog. This is timely because the personal computing shift from the desktop to the web is a hot topic with the Gnome Online Desktop and Gnome 3.0 initiatives. However, with long development cycles, arduous community learning curves and reliance upon cranky software languages, the simple accessible nature of web application development is thriving. This presentation instigates increased development on web services that protect user autonomy by commonly using the GNU Affero GPL 3.0 software license, creating free services to replace popular non-free alternatives, and by replacing centralized services with open distributed ones when possible. This presentation emphasizes the role of the Gnome Desktop to be a lean mean on-line desktop machine and what role Chinese businesses can play in accelerating this next dynamic wave of the FLOSS movement.
The Autonomo.us Open Software Services Evolution, featuring Identi.ca
The Autonomo.us Open Software Services Evolution, featuring Identi.ca
Jon Phillips
Engaging The Conversation ( Homeland Security Conference)
Engaging The Conversation ( Homeland Security Conference)
Fort Bend County Office of Emergency Management
Microblogging is synonymous with twitter, or at least it seems that way. In reality Facebook and many other social networking environments have adopted this communication paradigm extremely successfully. The question really is how does this play in the enterprise space? Ian McNairn will discuss how IBM has adapted to this social computing phenomenon and exploits it internally extensively. He will look at some of the reasons behind the exponential growth in activity as well as the tools and clients being used both within and outside IBM.
Micro Blogging In The Enterprise Final
Micro Blogging In The Enterprise Final
Ian McNairn
Before the Web... Then came the Web... Then happened Web2.0... How Web2.0 Got its Name Web2.0: An Overview Web2.0: Web as a Platform Web2.0: Harnessing Collective Intelligence Web2.0: Rich User Experience Web2.0: Visual Design? Web2.0: Design Patterns Web2.0: What is proprietary? What is the biz model? Web2.0: Beyond the web, beyond the community: Web3? Web2.0: Implications for Media Are we going into a Bubble? Some creative Web2.0 applications? Nimish Vohra, Regalix
Web2.0 Basics
Web2.0 Basics
Nimish Vohra
WEB 2.0 project for the official school of english
EOI Web 20
EOI Web 20
Mariano Aguirre Paredes
web2.0 what it is all about
Web2.0 : an introduction
Web2.0 : an introduction
Anant Shrivastava
Intergen's newsletter, Smarts, now available for online reading. Intergen provides information technology solutions across Australia, New Zealand and the world based exclusively on Microsoft’s tools and technologies.
Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)
Intergen
Presentacion a cargo de Martín Salvadori y Gustavo Guaragna en marco del UpDate08 realizado por Snoop Consulting www.update08.org
Update08 Web2
Update08 Web2
Snoop Consulting
Sheets for workshop I gave about Web 2.0 for an IT department
Workshop implications web 2.0 for IT
Workshop implications web 2.0 for IT
Samuel Driessen
Agencies Developer Products
Agencies Developer Products
Jeff Eddings
Course on "Web 2.0" at University of Camerino - 2011 prof. Carlo Vaccari
Web 2.0: a course
Web 2.0: a course
Carlo Vaccari
More Related Content
What's hot
How does serverless impact the IT department and what skillsets are you going to need in to bring this future technology into your organisation?
How Serverless Changes the IT Department - November 2018 - Serverless Computi...
How Serverless Changes the IT Department - November 2018 - Serverless Computi...
Paul Johnston
What are some best practices for serverless applications? Paul Johnston gives his opinion based on his widely shared blog post bit.ly/serverlessbestpractices
Serverless Best Practices - Serverless Computing London
Serverless Best Practices - Serverless Computing London
Paul Johnston
Presented at beCamp2008 in Charlottesville, VA.
Ahson Wardak Web 3.0 Be Camp 2008
Ahson Wardak Web 3.0 Be Camp 2008
uvahson
Presentation to the Southeast PA Webmaster Association regarding social media use in government
2010: SEPA Web Assoc: Getting Your Agency's Message Out
2010: SEPA Web Assoc: Getting Your Agency's Message Out
Carol Spencer
Slides for my talk at the IABC luncheon March 16th, 2009. You can view a video presentation (with audio) on: sixty4media or Miss604.com
Twitter For Business
Twitter For Business
miss604
Social Media presentation for Think. Learn. Libraries.
Social media presentation
Social media presentation
Chris Wilson
Santy Webworm
Santy Webworm
phantom320
What's hot
(7)
How Serverless Changes the IT Department - November 2018 - Serverless Computi...
How Serverless Changes the IT Department - November 2018 - Serverless Computi...
Serverless Best Practices - Serverless Computing London
Serverless Best Practices - Serverless Computing London
Ahson Wardak Web 3.0 Be Camp 2008
Ahson Wardak Web 3.0 Be Camp 2008
2010: SEPA Web Assoc: Getting Your Agency's Message Out
2010: SEPA Web Assoc: Getting Your Agency's Message Out
Twitter For Business
Twitter For Business
Social media presentation
Social media presentation
Santy Webworm
Santy Webworm
Similar to Open Source Microblogging With Laconica
My talk at OSCON 2008 about Identi.ca, Free Network Services, and stuff like that.
Oscon 2008 Open Micro Blogging Presentation
Oscon 2008 Open Micro Blogging Presentation
Evan Prodromou
A .net developer experiences with web2.0 and social media
A .net developer experiences with web2.0 and social media
Roy Lachica
Presented at the Pittsburgh Technology Council on January 20, 2010.
Workshop Trends In Open Source Tech 1 20 10
Workshop Trends In Open Source Tech 1 20 10
NuRelm
Introduction to web 2
Introduction to web 2
Introduction to web 2
Nick Hodge
Who provides your e-mail service? Where do you post your photos? Do you download music still? When all of our data is spread amongst multiple devices between multiple locations – home, office, and mobile – then it becomes clear why on-line network services rule supreme over managing personal computers in providing synchronized capable services that don't require us to update software or hack-in fixes. The modern person's primary concern in using a computer is to get things done and stay connected with others globally in the most effective ways possible. The shift to on-line network services, often partnered with cloud computing, requires us all to question whose cloud our data is in, what can the cloud owner do with it, and what rights are we forking over to be on cloud nine. For example, if I use Google's Gmail service, what can Google do with my e-mail data? This last summer 2008 a great example emerged when the mega-popular micro-blogging service Twitter failed regularly resulting in pop-culture fall-out with sightings of the fail whale. Open Source hero Evan Prodromou of WikiTravel-fame stepped up and realized the shortcomings of Twitter's locked approach and created Identi.ca, an Open Software Service based micro-blogging web service that both worked solidly, replicated common functionality from similar services, and allowed for others to hack on the project, or set-up their own connected site if so desired. This presentation looks at the landscape of services like Identi.ca which are adapting the Free and Open Source Software approach to on-line network services publicly championed from the Autonomo.us blog. This is timely because the personal computing shift from the desktop to the web is a hot topic with the Gnome Online Desktop and Gnome 3.0 initiatives. However, with long development cycles, arduous community learning curves and reliance upon cranky software languages, the simple accessible nature of web application development is thriving. This presentation instigates increased development on web services that protect user autonomy by commonly using the GNU Affero GPL 3.0 software license, creating free services to replace popular non-free alternatives, and by replacing centralized services with open distributed ones when possible. This presentation emphasizes the role of the Gnome Desktop to be a lean mean on-line desktop machine and what role Chinese businesses can play in accelerating this next dynamic wave of the FLOSS movement.
The Autonomo.us Open Software Services Evolution, featuring Identi.ca
The Autonomo.us Open Software Services Evolution, featuring Identi.ca
Jon Phillips
Engaging The Conversation ( Homeland Security Conference)
Engaging The Conversation ( Homeland Security Conference)
Fort Bend County Office of Emergency Management
Microblogging is synonymous with twitter, or at least it seems that way. In reality Facebook and many other social networking environments have adopted this communication paradigm extremely successfully. The question really is how does this play in the enterprise space? Ian McNairn will discuss how IBM has adapted to this social computing phenomenon and exploits it internally extensively. He will look at some of the reasons behind the exponential growth in activity as well as the tools and clients being used both within and outside IBM.
Micro Blogging In The Enterprise Final
Micro Blogging In The Enterprise Final
Ian McNairn
Before the Web... Then came the Web... Then happened Web2.0... How Web2.0 Got its Name Web2.0: An Overview Web2.0: Web as a Platform Web2.0: Harnessing Collective Intelligence Web2.0: Rich User Experience Web2.0: Visual Design? Web2.0: Design Patterns Web2.0: What is proprietary? What is the biz model? Web2.0: Beyond the web, beyond the community: Web3? Web2.0: Implications for Media Are we going into a Bubble? Some creative Web2.0 applications? Nimish Vohra, Regalix
Web2.0 Basics
Web2.0 Basics
Nimish Vohra
WEB 2.0 project for the official school of english
EOI Web 20
EOI Web 20
Mariano Aguirre Paredes
web2.0 what it is all about
Web2.0 : an introduction
Web2.0 : an introduction
Anant Shrivastava
Intergen's newsletter, Smarts, now available for online reading. Intergen provides information technology solutions across Australia, New Zealand and the world based exclusively on Microsoft’s tools and technologies.
Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)
Intergen
Presentacion a cargo de Martín Salvadori y Gustavo Guaragna en marco del UpDate08 realizado por Snoop Consulting www.update08.org
Update08 Web2
Update08 Web2
Snoop Consulting
Sheets for workshop I gave about Web 2.0 for an IT department
Workshop implications web 2.0 for IT
Workshop implications web 2.0 for IT
Samuel Driessen
Agencies Developer Products
Agencies Developer Products
Jeff Eddings
Course on "Web 2.0" at University of Camerino - 2011 prof. Carlo Vaccari
Web 2.0: a course
Web 2.0: a course
Carlo Vaccari
Features Of The Internet
Features Of The Internet
kimromero
Presention used in July 23 UNL Extension, Panhandle District discussion on education and technology.
Extension 2.0
Extension 2.0
cccowman
Presentation material from a Workshop in RITECH EXPO 2008.
Open Source is Not An Alternative, It is The Solution
Open Source is Not An Alternative, It is The Solution
wiradikusuma
Presentation material from the 2008 UK Lotus User Group session.
Connectr #6
Connectr #6
Neil Burston
Compilation and introduction to online sales & marketing. Other parts include Web analytics, Web SEA and SEO, etc. Available on request on mail@rudolph.net
Intro Course Online Sales & Marketing - Part2
Intro Course Online Sales & Marketing - Part2
rregter
Similar to Open Source Microblogging With Laconica
(20)
Oscon 2008 Open Micro Blogging Presentation
Oscon 2008 Open Micro Blogging Presentation
A .net developer experiences with web2.0 and social media
A .net developer experiences with web2.0 and social media
Workshop Trends In Open Source Tech 1 20 10
Workshop Trends In Open Source Tech 1 20 10
Introduction to web 2
Introduction to web 2
The Autonomo.us Open Software Services Evolution, featuring Identi.ca
The Autonomo.us Open Software Services Evolution, featuring Identi.ca
Engaging The Conversation ( Homeland Security Conference)
Engaging The Conversation ( Homeland Security Conference)
Micro Blogging In The Enterprise Final
Micro Blogging In The Enterprise Final
Web2.0 Basics
Web2.0 Basics
EOI Web 20
EOI Web 20
Web2.0 : an introduction
Web2.0 : an introduction
Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)
Update08 Web2
Update08 Web2
Workshop implications web 2.0 for IT
Workshop implications web 2.0 for IT
Agencies Developer Products
Agencies Developer Products
Web 2.0: a course
Web 2.0: a course
Features Of The Internet
Features Of The Internet
Extension 2.0
Extension 2.0
Open Source is Not An Alternative, It is The Solution
Open Source is Not An Alternative, It is The Solution
Connectr #6
Connectr #6
Intro Course Online Sales & Marketing - Part2
Intro Course Online Sales & Marketing - Part2
Recently uploaded
UXPA Boston presentation by Leigh Ann Caulfield and Caitlin Gebhard, BORN Group.
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
caitlingebhard1
We start by setting up a common ground introducing why relational databases fall short, addressing common EDA characteristics such as the need for real-time response times and schemaless approaches to address recurring changes to adapt and on-board new use cases. Next, interact with a sample Rust-based application: a social network app demonstrating an integration of both ScyllaDB and Redpanda.
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
ScyllaDB
FIDO Seminar RSAC 2024
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
FIDO Alliance
FIDO Seminar RSAC 2024
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
FIDO Alliance
Webinar Recording: https://www.panagenda.com/webinars/alles-neu-macht-der-mai-wir-durchleuchten-den-verbesserten-notes-eigenschaftendialog/ Haben Sie sich schon einmal über den zu kleinen Eigenschaftendialog in Notes geärgert? Mussten Sie einen Agenten oder eine Aktion erstellen, um schnell mal ein Feld zu ändern? Haben Sie jedes mal endlos nach dem zu vergleichenden Feld gesucht, nachdem Sie ein neues Dokument ausgewählt haben? Wollten Sie das verdammte Ding einfach nur größer machen? Zum Glück gibt es dafür eine Lösung – und sie ist wahrscheinlich bereits installiert! Mit dem kostenlosen panagenda Document Properties (Pro) erhalten Sie den Eigenschaftendialog, den Sie schon immer haben wollten. Größer, anpassbar, und im Volltext durchsuchbar. Sehen Sie mehrere Dokumente gleichzeitig oder vergleichen Sie mit einem Diff-Viewer. Ändern Sie beliebige Felder und haben Sie endlich eine einfache Möglichkeit, Profildokumente für alle Benutzer zu verwalten. Entdecken Sie mit HCL Ambassador Marc Thomas, wie Document Properties Ihre Arbeit vereinfachen und Sie bei der täglichen Verwendung von Domino-Anwendungen unterstützen kann – im Client oder im Designer. Sie werden es nicht bereuen! Für Sie in diesem Webinar - Was Document Properties ist, welche Editionen es gibt und wo es in Notes und Domino Designer zu finden ist - Wie Sie nach einem beliebigen Feld suchen und es bearbeiten, Dokumente vergleichen oder alle Daten per CSV exportieren können - Suchen, Bearbeiten und auch Löschen von Profildokumenten - Welche Konfigurationseinstellungen verfügbar sind, um Funktionen anzupassen - Wie Ihre Endbenutzer davon profitieren - Sehen Sie alles in einer Live-Demo
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
Here comes another enlightening document that dives into the thrilling world of breaking BitLocker, Windows' attempt at full disk encryption. This analysis will walk you through the myriad of creative hacks, from the classic cold boot attacks—because who doesn't love freezing their computer to steal some data—to exploiting those oh-so-reliable TPM chips that might as well have a "hack me" sign on them. We'll also cover some software vulnerabilities, because Microsoft just wouldn't be the same without a few of those sprinkled in for good measure. And let's not forget about intercepting those elusive decryption keys; it's like a digital treasure hunt! So, whether you're a security expert, a forensic analyst, or just a curious cat in the world of cybersecurity, enjoy the read, and maybe keep that data backed up somewhere safe, yeah? ------- This document provides a comprehensive analysis of the method demonstrated in the video "Breaking Bitlocker - Bypassing the Windows Disk Encryption" where the author showcases a low-cost hardware attack capable of bypassing BitLocker encryption. The analysis will cover various aspects of the attack, including the technical approach, the use of a Trusted Platform Module (TPM) chip, and the implications for security practices. The analysis provides a high-quality summary of the demonstrated attack, ensuring that security professionals and specialists from different fields can understand the potential risks and necessary countermeasures. The document is particularly useful for cybersecurity experts, IT professionals, and organizations that rely on BitLocker for data protection and to highlight the need for ongoing security assessments and the potential for similar vulnerabilities in other encryption systems.
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
In the ever-evolving landscape of data management, Zero-ETL is an approach that is reshaping how businesses handle and integrate their data. This webinar explores Zero-ETL, a paradigm shift from the traditional Extract, Transform, Load (ETL) process, offering a more streamlined, efficient, and real-time data integration method. We will begin with an introduction to the concept of Zero-ETL, including how it allows direct access to data in its native environment and real-time data transformation, providing up-to-date information with significantly reduced data redundancy. Next, we'll take you through several demonstrations showing how Zero-ETL can deliver real-time data and enable the free movement of data between systems. We will also discuss the various tools that support all aspects of Zero-ETL, providing attendees with an understanding of how they can adopt this innovative approach in their organizations. Lastly, the session will conclude with an interactive Q&A segment, allowing participants to gain deeper insights into how Zero-ETL can be tailored to their specific business needs and how they can get started today. Join us to discover how Zero-ETL can elevate your organization's data strategy.
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
Safe Software
نظرات حول الأمن السيبراني
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
Mohamed Sweelam
Created for Professor Marwan Omar, Embry-Riddle Aeronautical University May 12, 2024
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
MasterG
In the dynamic field of DevOps, the quest for efficiency and productivity is endless. This talk introduces a revolutionary toolkit: Large Language Models (LLMs), including ChatGPT, Gemini, and Claude, extending far beyond traditional coding assistance. We'll explore how LLMs can automate not just code generation, but also transform day-to-day operations such as crafting compelling cover letters for TPS reports, streamlining client communications, and architecting innovative DevOps solutions. Attendees will learn effective prompting strategies and examine real-life use cases, demonstrating LLMs' potential to redefine productivity in the DevOps landscape. Join us to discover how to harness the power of LLMs for a comprehensive productivity boost across your DevOps activities.
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
VictorSzoltysek
Discuss the core tradeoffs and considerations involved in order-free and ordered stream processing. Brian Taylor walks through the pros and cons of three different approaches: no data dependency, deferred inter-event data dependency, and streaming inter-event data dependency.
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
ScyllaDB
FIDO Seminar RSAC 2024
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
FIDO Alliance
A talk given at the DATAPLAT workshop, co-located with the IEEE ICDE conference (May 2024, Utrecht, NL). Data Provenance for Data Science is our attempt to provide a foundation to add explainability to data-centric AI. It is a prototype, with lots of work still to do.
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
Paolo Missier
FIDO Seminar RSAC 2024
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
Question de pré-engagement à remplir !
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Exakis Nelite
In the digital age, accessing information has become increasingly convenient, and this holds true for checking CNIC (Computerized National Identity Card) information online.
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
danishmna97
RailsConf 2024 - Insights Gained From Developing A Hybrid Application Using Turbo-Native and Strada.
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard37
FIDO Seminar RSAC 2024
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
This Slide deck talk about how FHIR is being used in Ayushman Bharat Digital Mission (ABDM). It introduces the readers to ABDM and also to FHIR Documents paradigm. This is part of FHIR India community Basics learning initiative.
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
Kumar Satyam
Mobile accessibility can be a very difficult space to navigate. Let's make it easier to dive right in! From common terms, breakdown of application accessibility, and building up accessibility on mobile development teams, this session will help build the foundation to ensure your mobile applications are accessible.
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
MarkSteadman7
Recently uploaded
(20)
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
Open Source Microblogging With Laconica
1.
Open Source Microblogging
Evan Prodromou Control Yourself, Inc. Open Web Vancouver 2009
2.
My name is
Evan.
3.
My name is
Evan. I do microblogging.
4.
5.
6.
7.
I'm not Twitter.
That's OK.
8.
100% of money
on the Web is made by companies that aren't Twitter.
9.
Not that I'm
financially motivated.
10.
Not entirely.
11.
I am a
passionate believer in Open Source
12.
And Open Data
13.
And Open Content
14.
And Open Standards
15.
For an Open
Web.
16.
Because it's a
problem:
17.
Software is moving
into a “cloud”
18.
Dominated by a
few companies.
19.
We're moving from
an Open, distributed, internetworked Web
20.
To a collection
of Online services, barely connected.
21.
Facebook 2009 =
AOL 1992
22.
Google = Bitnet
MySpace = Prodigy Yahoo = Genie Amazon = Compuserv Microsoft = Microsoft
23.
Worst of all,
they're usurping our desktop and server software, too.
24.
This is bad
for the Web, Bad for business, Bad for society.
25.
Just ask Tim
O'Reilly, IBM, Or the Economist.
26.
I'm part of
a workgroup called autonomo.us
27.
We are working
on this problem from a number of angles.
28.
Franklin Street Statement
http://ur1.ca/tz
29.
Open Source +
Open Data + Open Standards = Open Software Services
30.
I like starting
Web sites. So that's how I'm contributing.
31.
But where to
start?
32.
33.
34.
35.
36.
Status matters.
37.
“ Microblogging”
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
One Big Twitter
58.
Publishers Subscribers Weather
Blogger New York Times CNN Google Enterprise Personal ISP Wireless Provider Twitter Identi.ca
59.
Thesis: successful distributed
communications media require 1 good protocol and an Open Source server.
60.
Email had SMTP
+ Sendmail.
61.
The Web had
HTTP + Apache.
62.
Blogging has... uh...
some stuff... + WordPress.
63.
Instant messaging has
2 protocols, one good server. Problems.
64.
Social networks have
no protocol, a couple of good servers. Problems.
65.
Conclusion: my awesome
thesis is indisputably correct.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
Small installations on
commodity Web hosting Medium installations on virtual or leased servers Large installations on many owned servers 10^0 10^1 10^2 10^3 10^4 10^5 10^5 10^6 10^7 10^8
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.
93.
94.
95.
96.
97.
98.
99.
100.
101.
102.
103.
104.
105.
106.
107.
108.
109.
110.
111.
112.
113.
114.
115.
116.
117.
118.
119.
120.
121.
http://identi.ca/ http://laconi.ca/ http://status.net/
http://openmicroblogging.org/ http://controlyourself.ca/ http://identi.ca/evan
Download now