Communies of the future

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Are you being a safe and successful digital citizen? E-safety
ICT iGCSE.  You should be able to describe the use of Internet developments such as:  Web 2.0  blogs  wikis  digital media uploading websites  social.
Helpful Guide for Members IMFFA Social Community 1.
Electrical Engineering Department Software Systems Lab TECHNION - ISRAEL INSTITUTE OF TECHNOLOGY Persistent chat room Authors: Hazanovitch Evgeny Hazanovitch.
Web 2.0 Web 2.0 is the term given to describe a second generation of the World Wide Web (WWW) that is focused on the ability for people to collaborate.
S A B D C T = 0 S gets message from above and sends messages to A, C and D S.
 Why would you want to be connected? o To make online connections that will improve your efficiency and speed o To provide a near instant platform.
By Nathan McCann. Blogs  
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Online & Social Strategy with Patrick Blampied.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Employee Guidelines for Acceptable Use of Technology Resources.
Secure Social Networking By Zackary Allred.  How can we improve the RAs’ ability to involve residents in dorm life?  Social Network sites are popular.
Mackenzie Hazelwood.  Stores and allows users to share documents  Document types include word, spreadsheet, drawings, and power points  Allows owner.
Laulima Workshop for Instructors Solutions to help you engage your students through Laulima.
Who is on… Introduction Using social media entails particular kind of literacies i.e. skills which include the ability to engage in a medium for production.
Presented by: Sanketh Beerabbi University of Central Florida.
Let’s Overview The Three Main Areas We Need: Domain Name Web Hosting Website.
Lincolnshire and Rutland Public Service Compact “Using new technologies to deliver Leadership and Management Programmes” The role of social networking.
About Deploy360. The Internet Society About Deploy360 The Challenge: –The IETF creates protocols based on open standards, but.
Social Media – Why It Matters & Why You Should CONNECT to.
Learning Management System. Introduction Software application or Web-based technology used to plan, implement, and assess a specific learning process.
BeaconPush Lynnea Krajco. "Push service for creating real- time web apps"
Knowledge Hub Walkthrough August
Knowledge Hub Walkthrough August
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
SocialBoards Self-Service, Multichannel Support Ticket Notifications in Microsoft Office 365 Groups Help Customer Care Teams to Provide Better Care OFFICE.
Project Management Tools
Acceptable Use Policy (Draft)
Secure your complete data lifecycle using Azure Information Protection
Where it is today and how it is used.
What are digital skills?
Internet Business Associate v2.0
Understanding Android Security
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
A secure communication platform
Developing an Online Community for the Sharing of Research
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Secure your complete data lifecycle using Azure Information Protection
Introduction to Justin R. Scott CIS Introduction to .
SocialBoards Self-Service, Multichannel Support Ticket Notifications in Microsoft Office 365 Groups Help Customer Care Teams to Provide Better Care OFFICE.
Choosing the Discovery Model Martin Forsberg
Secure Social Networking By Zackary Allred
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
PostBeyond Delivers an Enterprise Solution That Strengthens Communications with Employees and Integrates Seamlessly with Microsoft Office 365 OFFICE 365.
Entrepreneurial Journalism
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
Communications and Collaboration
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
HOW BLOCK CHAIN COULD SHAPE THE FUTURE OF WEB DESIGN Many governments in the world have come up with laws of protecting data. This is meant to ensure the.
Communications and Collaboration
Faculty of Science IT Department By Raz Dara MA.
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Secure Electronic Transactions (SET)
Understanding Android Security
Student User Agreement and Policy 2022
Computer Security By: Muhammed Anwar.
How to Set up Privacy Functions
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Take notes on your own paper
Reportnet 3.0 Database Feasibility Study – Approach
Communications and Collaboration
Optimzing the Use of Data Standards Calling for Volunteers
Presentation transcript:

Communies of the future People increasingly rely more on online communities People want to participate in many different communities: youtube, twitter, facebook, etc. People are becoming more cautious of their privacy: facebook, google, etc. Opensource and distributed systems can solve privacy and security problems: diaspora, etc. Or our solution: Dispersy

What makes a community? A community consists of several building blocks The ability to communicate The ability to gain and lose responsibility The ability to protect yourself There are more building blocks However, the above are a bare minimum for an online community to form

QPlatform: Dispersy Dispersy is a platform that provides the building blocks for a community Dispersy is used by a programmer to implement a community, i.e. a forum, a blog, messeging system, etc. Dispersy stands for: DIStributed: using P2P technology PERmission: different people have different rights SYstem: it is used to build applications

Dispersy: privileges Each Dispersy community will have a set of privileges Privileges can be granted to users, allowing them to use more community features Privileges can be revoked, allowing the community to protect itself from malicious users Authorizing, revoking, and using a privilege is handled by the Dispersy platform

Dispersy: communication Users sign their outgoing messages Hence they are responsible for what they do Messages can be send to a user, to a community, or to subgroups within a community When permitted, messages are stored and forwarded by other users All communication (direct, gossip, etc.) is handled by the the Dispersy platform

Deliverable The Febuary 2011 deliverable Technical documentation Discovery community (discover available users and communities) Test results for 10.000+ simulated users actively participating in the Discovery community An initial technical draft is available: http://svn.tribler.org/abc/branches/boudewijn/junkyard/clan/clan.pdf

Future work The Dispersy platform will be used for the Tribler community features (Niels' work) Distributing content Commenting on content and people Private file sharing communities The Dispersy platform will be used to build the worlds new financial system, replacing all banks... hopefully

Questions