SlideShare a Scribd company logo
1 of 40
Making Email a Useful Web App ,[object Object],[object Object],[object Object],[object Object],[object Object]
Email Bankruptcy “ I routinely declare email bankruptcy and simply delete my entire inbox.” - Michael Arrington, TechCrunch “ Wondering if I can get a Bear Sterns bailout for my email bankruptcy.”  - willpate on Twitter “ (He) just declared email bankruptcy. I've read those declarations enough to know it means our email tools aren't usable.”  - garrickvanburen on Twitter So, why is email still around despite all the challenges and criticism… ?
Email Is Still The “Killer App” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What More Can We Do With Email? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Does An Email App Make Sense? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prehistoric Email Apps
Domain Registration Email Sign-Up ,[object Object],[object Object],[object Object],[object Object]
Archie File Query Email Interface ,[object Object],[object Object],[object Object],[object Object],[object Object]
Browsing The Web Via Email “ For personal reasons, I do not browse the web from my computer. (I also have no net connection much of the time.) To look at page I send mail to a demon which runs wget and mails the page back to me. It is very efficient use of my time, but it is slow in real time.” -- Richard Stallman (2007-12-15)
About TripIt ?
 
 
***CONFIDENTIAL***
 
Forward  Any Confirmation Email Automated Online Master Itinerary Automated Weather, Maps, Guides… Trip Sharing & Social Alerts iCal & Atom Support  Email & Mobile Access Add Meetings, Activities, Restaurants, etc.
Why Email Made Sense For TripIt ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types Of Email App Services Command Line Interface Data Transfer Semantic Parsing Broadcast ?
Types Of Email App Services Command Line Interface Data Transfer Semantic Parsing Broadcast ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example: Mailing Lists Searchable knowledge base built as a by-product of natural human communication
Example: Google Alerts ,[object Object],[object Object],[object Object]
Types Of Email App Services Command Line Interface Data Transfer Semantic Parsing Broadcast ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example: I Want Sandy http://iwantsandy.com/
Example: TripIt
Example: Twitter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types Of Email App Services Command Line Interface Data Transfer Semantic Parsing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Broadcast
Example: Flickr
Example: Blogger
Types Of Email App Services Command Line Interface Data Transfer Semantic Parsing Broadcast ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example: TrackMyShipments
Example: TripIt Timezone Online Checkin Flight Status Seat Advice Flight Details Weather
Types Of Email App Services Command Line Interface Data Transfer Semantic Parsing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Broadcast ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Caution: Email Is Full Of Problems CAUTION STANDARDS CAUTION CAUTION SPAM CAUTION CAUTION PRIVACY CAUTION CAUTION DELIVERABILITY CAUTION
Deliverability Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CAUTION DELIVERABILITY CAUTION
Spam Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CAUTION SPAM CAUTION
Privacy Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CAUTION PRIVACY CAUTION
Standards Issues ,[object Object],[object Object],[object Object],[object Object],CAUTION STANDARDS CAUTION
Key Take-aways ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions ,[object Object],[object Object]
Appendix ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Appendix cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot (20)

E mail features
E mail featuresE mail features
E mail features
 
Introduction To Email
Introduction To EmailIntroduction To Email
Introduction To Email
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
All about email
All about emailAll about email
All about email
 
Basics of E-Mail
Basics of E-MailBasics of E-Mail
Basics of E-Mail
 
Unit 5
Unit 5Unit 5
Unit 5
 
Intro to email for seniors
Intro to email for seniorsIntro to email for seniors
Intro to email for seniors
 
Email explained in 2 minutes
Email explained in 2 minutesEmail explained in 2 minutes
Email explained in 2 minutes
 
Email ppt
Email pptEmail ppt
Email ppt
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Basic Email
Basic EmailBasic Email
Basic Email
 
Tutorial 06 - Real-Time Communication on the Internet
Tutorial 06 - Real-Time Communication on the InternetTutorial 06 - Real-Time Communication on the Internet
Tutorial 06 - Real-Time Communication on the Internet
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Email - electronic mail
Email - electronic mailEmail - electronic mail
Email - electronic mail
 
Another one on Email...
Another one on Email...Another one on Email...
Another one on Email...
 
Mobile Instant Messaging
Mobile Instant MessagingMobile Instant Messaging
Mobile Instant Messaging
 
email basics for yahoo
email basics for yahooemail basics for yahoo
email basics for yahoo
 
Instant Messaging Trends & Practice
Instant Messaging Trends & PracticeInstant Messaging Trends & Practice
Instant Messaging Trends & Practice
 
402 406
402 406402 406
402 406
 

Viewers also liked

Scheiner + tignanelli elaboración de trabajos de fc
Scheiner + tignanelli   elaboración de trabajos de fcScheiner + tignanelli   elaboración de trabajos de fc
Scheiner + tignanelli elaboración de trabajos de fcelizabeth guanuco
 
I Jornada Gastronómica Orihuela Costa 2011
I Jornada Gastronómica Orihuela Costa 2011I Jornada Gastronómica Orihuela Costa 2011
I Jornada Gastronómica Orihuela Costa 2011esterferrandez
 
Comparison of Sweden and EU data
Comparison of Sweden and EU dataComparison of Sweden and EU data
Comparison of Sweden and EU dataErik Borälv
 
25 años 3ª Parte Jornadas
25 años 3ª Parte Jornadas25 años 3ª Parte Jornadas
25 años 3ª Parte Jornadasjosefermin
 
Manual Pegaso Expander Esp2
Manual Pegaso Expander Esp2Manual Pegaso Expander Esp2
Manual Pegaso Expander Esp2JAVIER j
 
English summer camp_2011_llamado[1]
English summer camp_2011_llamado[1]English summer camp_2011_llamado[1]
English summer camp_2011_llamado[1]Graciela Bilat
 
Packers And Movers In Kolkata
Packers And Movers In KolkataPackers And Movers In Kolkata
Packers And Movers In KolkataEuro Movers
 
Endeavor rosario 120627
Endeavor rosario 120627Endeavor rosario 120627
Endeavor rosario 120627Ariel Muslera
 
Sem 1 -_4.03_ppt
Sem 1 -_4.03_pptSem 1 -_4.03_ppt
Sem 1 -_4.03_pptgrantdeaton
 
Blueberry Field Day (parte 3)
Blueberry Field Day (parte 3)Blueberry Field Day (parte 3)
Blueberry Field Day (parte 3)Cooprinsem
 
Euphoria Media present new
Euphoria Media present newEuphoria Media present new
Euphoria Media present newYuriy Ryzhkov
 
J&P Building Systems Ltd - Effective Sealing Technology
J&P Building Systems Ltd - Effective Sealing TechnologyJ&P Building Systems Ltd - Effective Sealing Technology
J&P Building Systems Ltd - Effective Sealing TechnologyJ and P Building Systems
 
BUSINESS MODEL OPEN SOURCE
BUSINESS MODEL OPEN SOURCEBUSINESS MODEL OPEN SOURCE
BUSINESS MODEL OPEN SOURCEgillesmu
 
Feasibility study 2015
Feasibility study 2015Feasibility study 2015
Feasibility study 2015Rihel Calma
 
Selenium 2 - PyCon 2011
Selenium 2 - PyCon 2011Selenium 2 - PyCon 2011
Selenium 2 - PyCon 2011hugs
 

Viewers also liked (20)

Jornal dos Comerciários (Novembro 2014) - Nº 162
Jornal dos Comerciários (Novembro 2014) - Nº 162Jornal dos Comerciários (Novembro 2014) - Nº 162
Jornal dos Comerciários (Novembro 2014) - Nº 162
 
Scheiner + tignanelli elaboración de trabajos de fc
Scheiner + tignanelli   elaboración de trabajos de fcScheiner + tignanelli   elaboración de trabajos de fc
Scheiner + tignanelli elaboración de trabajos de fc
 
I Jornada Gastronómica Orihuela Costa 2011
I Jornada Gastronómica Orihuela Costa 2011I Jornada Gastronómica Orihuela Costa 2011
I Jornada Gastronómica Orihuela Costa 2011
 
Comparison of Sweden and EU data
Comparison of Sweden and EU dataComparison of Sweden and EU data
Comparison of Sweden and EU data
 
25 años 3ª Parte Jornadas
25 años 3ª Parte Jornadas25 años 3ª Parte Jornadas
25 años 3ª Parte Jornadas
 
Manual Pegaso Expander Esp2
Manual Pegaso Expander Esp2Manual Pegaso Expander Esp2
Manual Pegaso Expander Esp2
 
Bosque da Aldeia.
Bosque da Aldeia.Bosque da Aldeia.
Bosque da Aldeia.
 
Avestruz
AvestruzAvestruz
Avestruz
 
English summer camp_2011_llamado[1]
English summer camp_2011_llamado[1]English summer camp_2011_llamado[1]
English summer camp_2011_llamado[1]
 
Packers And Movers In Kolkata
Packers And Movers In KolkataPackers And Movers In Kolkata
Packers And Movers In Kolkata
 
Endeavor rosario 120627
Endeavor rosario 120627Endeavor rosario 120627
Endeavor rosario 120627
 
Sem 1 -_4.03_ppt
Sem 1 -_4.03_pptSem 1 -_4.03_ppt
Sem 1 -_4.03_ppt
 
Blueberry Field Day (parte 3)
Blueberry Field Day (parte 3)Blueberry Field Day (parte 3)
Blueberry Field Day (parte 3)
 
Euphoria Media present new
Euphoria Media present newEuphoria Media present new
Euphoria Media present new
 
J&P Building Systems Ltd - Effective Sealing Technology
J&P Building Systems Ltd - Effective Sealing TechnologyJ&P Building Systems Ltd - Effective Sealing Technology
J&P Building Systems Ltd - Effective Sealing Technology
 
OMG Cyber!
OMG Cyber!OMG Cyber!
OMG Cyber!
 
Facts and details
Facts and detailsFacts and details
Facts and details
 
BUSINESS MODEL OPEN SOURCE
BUSINESS MODEL OPEN SOURCEBUSINESS MODEL OPEN SOURCE
BUSINESS MODEL OPEN SOURCE
 
Feasibility study 2015
Feasibility study 2015Feasibility study 2015
Feasibility study 2015
 
Selenium 2 - PyCon 2011
Selenium 2 - PyCon 2011Selenium 2 - PyCon 2011
Selenium 2 - PyCon 2011
 

Similar to Web 2.0: Making Email a Useful Web App

Building Email Apps
Building Email AppsBuilding Email Apps
Building Email AppsAndy Denmark
 
Email and groupware
Email and groupwareEmail and groupware
Email and groupwareRoy Thomas
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...IRJET Journal
 
miniproject.ppt.pptx
miniproject.ppt.pptxminiproject.ppt.pptx
miniproject.ppt.pptxAnush90
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?Tayfun TEK
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentationWan Solo
 
Chapter 10Email Forensics1Email is Often the Bes.docx
Chapter 10Email Forensics1Email is Often the Bes.docxChapter 10Email Forensics1Email is Often the Bes.docx
Chapter 10Email Forensics1Email is Often the Bes.docxbartholomeocoombs
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refinedWan Solo
 
Chapter 10Email Forensics1Email is Often the Bes.docx
Chapter 10Email Forensics1Email is Often the Bes.docxChapter 10Email Forensics1Email is Often the Bes.docx
Chapter 10Email Forensics1Email is Often the Bes.docxketurahhazelhurst
 
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docxRunning header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docxjeffsrosalyn
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharyasankhadeep
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Mail Prediction Report.docx
Spam Mail Prediction Report.docxSpam Mail Prediction Report.docx
Spam Mail Prediction Report.docxShubham Jaybhaye
 
Email Is Dead... Long Live Email!
Email Is Dead... Long Live Email!Email Is Dead... Long Live Email!
Email Is Dead... Long Live Email!Wrike
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internetsameera.moparty
 
VOICE BASED EMAIL SYSTEM
VOICE BASED EMAIL SYSTEMVOICE BASED EMAIL SYSTEM
VOICE BASED EMAIL SYSTEMIRJET Journal
 

Similar to Web 2.0: Making Email a Useful Web App (20)

Building Email Apps
Building Email AppsBuilding Email Apps
Building Email Apps
 
Email and groupware
Email and groupwareEmail and groupware
Email and groupware
 
Email
EmailEmail
Email
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
 
miniproject.ppt.pptx
miniproject.ppt.pptxminiproject.ppt.pptx
miniproject.ppt.pptx
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Chapter 10Email Forensics1Email is Often the Bes.docx
Chapter 10Email Forensics1Email is Often the Bes.docxChapter 10Email Forensics1Email is Often the Bes.docx
Chapter 10Email Forensics1Email is Often the Bes.docx
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
Chapter 10Email Forensics1Email is Often the Bes.docx
Chapter 10Email Forensics1Email is Often the Bes.docxChapter 10Email Forensics1Email is Often the Bes.docx
Chapter 10Email Forensics1Email is Often the Bes.docx
 
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docxRunning header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Mail Prediction Report.docx
Spam Mail Prediction Report.docxSpam Mail Prediction Report.docx
Spam Mail Prediction Report.docx
 
Email Is Dead... Long Live Email!
Email Is Dead... Long Live Email!Email Is Dead... Long Live Email!
Email Is Dead... Long Live Email!
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
VOICE BASED EMAIL SYSTEM
VOICE BASED EMAIL SYSTEMVOICE BASED EMAIL SYSTEM
VOICE BASED EMAIL SYSTEM
 

Recently uploaded

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Web 2.0: Making Email a Useful Web App

  • 1.
  • 2. Email Bankruptcy “ I routinely declare email bankruptcy and simply delete my entire inbox.” - Michael Arrington, TechCrunch “ Wondering if I can get a Bear Sterns bailout for my email bankruptcy.” - willpate on Twitter “ (He) just declared email bankruptcy. I've read those declarations enough to know it means our email tools aren't usable.” - garrickvanburen on Twitter So, why is email still around despite all the challenges and criticism… ?
  • 3.
  • 4.
  • 5.
  • 7.
  • 8.
  • 9. Browsing The Web Via Email “ For personal reasons, I do not browse the web from my computer. (I also have no net connection much of the time.) To look at page I send mail to a demon which runs wget and mails the page back to me. It is very efficient use of my time, but it is slow in real time.” -- Richard Stallman (2007-12-15)
  • 11.  
  • 12.  
  • 14.  
  • 15. Forward Any Confirmation Email Automated Online Master Itinerary Automated Weather, Maps, Guides… Trip Sharing & Social Alerts iCal & Atom Support Email & Mobile Access Add Meetings, Activities, Restaurants, etc.
  • 16.
  • 17. Types Of Email App Services Command Line Interface Data Transfer Semantic Parsing Broadcast ?
  • 18.
  • 19. Example: Mailing Lists Searchable knowledge base built as a by-product of natural human communication
  • 20.
  • 21.
  • 22. Example: I Want Sandy http://iwantsandy.com/
  • 24.
  • 25.
  • 28.
  • 30. Example: TripIt Timezone Online Checkin Flight Status Seat Advice Flight Details Weather
  • 31.
  • 32. Caution: Email Is Full Of Problems CAUTION STANDARDS CAUTION CAUTION SPAM CAUTION CAUTION PRIVACY CAUTION CAUTION DELIVERABILITY CAUTION
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.