Remove auth
article thumbnail

2022 Predictions

Eric Friedman

7/ Authentication as an Experience – whether it’s a crypto wallet, physical key, or other auth method, websites and entire platform experiences are determined by a login. Identities can be real or not, but if if you don’t have an auth you don’t have an experience. .

article thumbnail

2023 Predictions

Eric Friedman

7/ Authentication as an Experience – whether it’s a crypto wallet, physical key, or other auth method, websites and entire platform experiences are determined by a login. Identities can be real or not, but if if you don’t have an auth you don’t have an experience. -1: . -1: Failed it. 1: Failed it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2023 Predictions

Eric Friedman

7/ Authentication as an Experience – whether it’s a crypto wallet, physical key, or other auth method, websites and entire platform experiences are determined by a login. Identities can be real or not, but if if you don’t have an auth you don’t have an experience. -1: . -1: Failed it. 1: Failed it.

article thumbnail

Requests for Startups in 2024

VC Cafe

One Giant Leap for Healthcare Admin -Breakthroughs in transcription, speaker diarization, translation, summarization, LLM web navigation/form filling, and general retrieval and reasoning will revolutionize the patient encounter and claims / prior auth workflows Your Personal Seller – Foundation models enable the at-scale generation of alternative (..)

article thumbnail

Founder’s Choice VC Firm Ranking

Feld Thoughts

For context, the general way it works is founders auth with LinkedIn and then the product tosses away their identity (or, more accurately, only keeps a hash and disconnects it from their ratings). Roy had a thoughtful answer that made me a believer after a few more questions.

Metrics 160
article thumbnail

Cybersecurity Tips To Protect Your Business This Year

YoungUpstarts

The 2FA is an auth approach that will add a second step in the usual log-in process. The security level provided by the cloud is far beyond the one provided in-house, especially if you have limited resources. Enhance two-factor authentication.

Caching 182
article thumbnail

Connect to Facebook, LinkedIn, Twitter, and G+

Feld Thoughts

Almost everything else I use is based on either my email address or auth with one of these four services. I wonder if this will change with Office 365 – I hope Microsoft is building a trivial to use oauth to O365 so it’s easy to connect to, along with a good sync API.

Oauth 126