Places Nearby
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
CS229 Project Report: Automated Photo Tagging in Facebook
CS229 Project Report: Automated photo tagging in Facebook Sebastian Schuon, Harry Robertson, Hao Zou schuon, harry.robertson, haozou @stanford.edu Abstract We examine the problem of automatically identifying and tagging users in photos on a social networking environment known as Facebook. The presented au- tomatic facial tagging system is split into three subsys- tems: obtaining image data from Facebook, detecting faces in the images and recognizing the faces to match faces to individuals. Firstly, image data is extracted from Facebook by interfacing with the Facebook API. Secondly, the Viola-Jones’ algorithm is used for locat- ing and detecting faces in the obtained images. Fur- thermore an attempt to filter false positives within the Figure 1: Schematic of the Facebook crawler face set is made using LLE and Isomap. Finally, facial recognition (using Fisherfaces and SVM) is performed on the resulting face set. This allows us to match faces 2 Collecting data from Facebook to people, and therefore tag users on images in Face- book. The proposed system accomplishes a recogni- To implement an automatic image tagging system, one tion accuracy of close to 40%, hence rendering such first has to acquire the image data. For the platform we systems feasible for real world usage. have chosen to work on, namely Facebook, this task used to be very sophisticated, if not impossible. But with the recent publication of an API to their platform, this has been greatly simplified. The API allows third party applications to integrate into their platform and 1 Introduction most importantly to access their databases (for details see figure 1 and [3]). -
Common Sites and Apps Used by Teens
Common Sites and Apps Used by Teens SOCIAL NETWORKING: Facebook is the top social network on the web as it is used by more than 1 billion people each month. You can access this service using an app on a mobile device or internet service for a computer. People set up a profile and accept “friend requests.” There is a timeline to post events and share “status updates.” Certain groups can be set up as private or public. Users can be referenced in someone else’s text or picture (tagged). Teens are moving away from fb because many parents and grandparents are on the site. Officially, individuals should be 13 years of age to create an account but students in elementary schools report using this social networking site. Like Facebook, Twitter is a social network centered on microblogging with a 140-character text limit. An uploaded picture or text message is called a “Tweet.” The public can “follow” friends, celebrities, causes, businesses or tv shows. You can “tweet” live during a show by using # (hashtag). Students report concerning “subtweets,” which are comments intended for someone to see without mentioning their username, usually with a derogatory tone. Ask.fm is another popular pre-teen social networking website where users can ask other users questions. Users have to create an account to leave or receive comments. Ask.Fm is different than Facebook and Twitter because users can ask questions or leave comments anonymously. However, there is the option for users to not receive comments unless a sender identifies himself. This has been a popular venue for cyber-bullying. -
Obtaining and Using Evidence from Social Networking Sites
U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks. -
The Meet Group Teams with Digital Identity Company Yoti to Help Create Safer Communities Online
The Meet Group teams with digital identity company Yoti to help create safer communities online NEW HOPE, Pa., July 24, 2019 - The Meet Group,Inc. (NASDAQ: MEET), a leading provider of interactive live streaming solutions, and Yoti, a digital identity company, today announced that The Meet Group plans to trial Yoti’s innovative age verification and age estimation technologies designed to create safer communities online. The Meet Group, with more than 15 million monthly active users, helps people to find connection and community through its social networking and dating apps. As a company committed to the protection of its users, The Meet Group devotes approximately half of its workforce to safety and moderation, and continuously reviews its safety procedures with the goal of meeting the highest standards of online safety and security. The relationship allows Yoti to enhance The Meet Group’s strong existing safety measures, letting users verify their age with Yoti’s age estimation technology Yoti Age Scan, or the free Yoti app where a date of birth is verified to a government issued photo ID. Yoti’s technology can help moderators at The Meet Group ensure that minors do not create accounts. Geoff Cook CEO at The Meet Group commented, “A key part of helping people to create meaningful connections is to keep them safe online. We have already committed ourselves to one-tap report abuse capability, clear and frequent safety education, and proactive and transparent moderation, and now with Yoti’s age verification and estimation technologies, we look forward to being one of the few app operators in social or dating who can respond to reports of underage users quickly and accurately. -
Some Mobile Apps Add Anonymity to Social Networking
Log in / Create an account Search Subscribe Topics+ The Download Magazine Events More+ Connectivity Some Mobile Apps Add Anonymity to Social Networking Social-networking apps that eschew real names are gaining ground. by Rachel Metz February 6, 2014 On social networks like Facebook, Twitter, and LinkedIn, most people do not communicate freely, for fear of the repercussions. For just over a decade, Facebook has enforced the idea of an authentic online identity tied to each user of a social network. This might be fine for sharing news of a promotion or new baby with friends, but sometimes you’d probably like to post a status update that won’t go on your permanent record. This urge might explain why millions of people, many of them under the age of 25, are flocking to a free smartphone app called Whisper, which lets you share thoughts—a few lines of text set against a background image—without adding your real name. Secret, a newer free app for the iPhone that shares posts anonymously through your existing social networks, is based on the same idea. After years spent filling social networks like Facebook and Twitter with the minutiae of our lives, we’ve left permanent, heavily curated trails of personal data in our wake—over 1.2 billion of them on Facebook alone, judging by its user count. New apps allow us to continue being social without worrying about the repercussions of sharing the most personal confessions. “Facebook is more like the global social network; it’s like our communication layer to the world,” says Anthony Rotolo, an assistant professor at Syracuse University, who studies social networks. -
Privacy Perceptions of Photo Sharing in Facebook
Privacy Perceptions of Photo Sharing in Facebook Andrew Besmer, Heather Richter Lipford Department of Software and Information Systems University of North Carolina at Charlotte 9201 University City Blvd. Charlotte, NC 28223 {arbesmer, Heather.Lipford}@uncc.edu 1. INTRODUCTION Online photo sharing applications are increasingly popular, offering users new and innovative ways to share photos with a variety of people. Many social networking sites are also incorporating photo sharing features, allowing users to very easily upload and post photos for their friends and families. For example, Facebook is the largest photo sharing site on the Internet with 14 million photos uploaded daily [2]. Integrating photo Figure 1. Example of Facebook and Prototype sharing within social networking communities has also provided the opportunity for user-tagging, annotating and linking images to the identities of the people in them. This feature further increases 3. RESULTS the opportunities to share photos among people with established As with other photo sharing sites, users expressed the social value offline relationships and has been largely successful. However, of being able to upload and view photos within their social this increased access to an individual’s photos has led to these networks. No doubt this social value is the reason 14 million new images being used for purposes that were not intended. For photos are added on Facebook each day. However, not example, photos on Facebook profiles have been used by surprisingly, users do have privacy concerns that are difficult to employers [5] and law enforcement [6] to investigate the behavior deal with due the wide reach of their images and the lack of of individuals. -
Observer5-2015(Health&Beauty)
the Jewish bserver www.jewishobservernashville.org Vol. 80 No. 5 • May 2015 12 Iyyar-13 Sivan 5775 Nashville crowd remembers Israel’s fallen and celebrates its independence By CHARLES BERNSEN atching as about 230 people gath- ered on April 23 for a somber remem- brance of Israel’s fallen soldiers and Wterrors victims followed immediately by a joyful celebration of the 67th anniversary of the Jewish’ state’s birth, Rabbi Saul Strosberg couldn’t help but marvel. After all, it has been only eight years since the Nashville Jewish community started observing Yom Hazikaron, the Israeli equivalent of Memorial Day. Organized by several Israelis living in Nashville, including the late Miriam Halachmi, that first, brief ceremony was held in his office at Congregation Sherith For the third year, members of the community who have helped build relations between Nashville and Israel were given the honor of lighting Israel. About 20 people attended. torches at the annual celebration of Israel’s independence. Photos by Rick Malkin Now here he was in a crowd that of three fallen Israelis – a soldier killed in Catering and music by three Israeli Defense Martha and Alan Segal, who made filled the Gordon Jewish Community combat, a military pilot who died in a Force veterans who are members of the their first ever visits to Israel this spring Center auditorium to mark Yom training accident and a civilian murdered musical troupe Halehaka (The Band). on a congregational mission. Hazikaron and then Yom Ha’atzmaut, the in a terror attack. Their stories were pre- For the third year, the highlight of • Rabbi Mark Schiftan of The Temple Israeli independence day. -
Firing up Your Ipod and Iphone
Chapter 1 Firing Up Your iPod and iPhone In This Chapter ▶ Comparing iPod and iPhone models ▶ Powering up your iPod or iPhone ▶ Using and recharging your battery Pods and iPhones have completely changed the way people play music, iaudio books, and videos, and new models are changing the way people use computer applications, shoot photos and videos, play games, and use the Internet. But don’t just take my word for it. “It’s hard to remember what I did before the iPod,” said Grammy Award–winner Mary J. Blige in an Apple press release. “iPod is more than just a music player; it’s an extension of your personality and a great way to take your favorite music with you everywhere you go.” Lance Armstrong, seven-time Tour de France champion, takes his running shoes and iPod with him everywhere. “I listen to music when I run. Having my music with me is really motivating.” The iPod even plays an important role in Western culture. Pope Benedict XVI has an iPod engraved with his coat of arms. President Barack Obama gave the U.K.’s Queen Elizabeth II an iPod preloaded to play rare songs by Richard Rodgers. And when Bono of U2 gave an iPod shuffle to George H.W. Bush, the former President remarked, “I get the shuffle and then I shuffle the shuffle.” The iPodCOPYRIGHTED was first invented for playing music, MATERIAL and you can download entire albums from the iTunes Store and play them on any iPod or iPhone. You can also download movies and TV shows from the iTunes Store and play them on an iPod classic, iPod nano, iPod touch, or iPhone. -
Ephemeral Social Networks
Academia Sinica, Taipei, Taiwan SNHCC: Mobile Social Networks Ephemeral Social Networks Instructor: Cheng-Hsin Hsu (NTHU) 1 Online and Offline Social Networks ❒ Online social networks, like Facebook, allow users to manually record their offline social networks ❍ Tedious and error-prone ❒ Some mobile apps try to use location contexts to connect people we know offline (means in physical world) ❍ Sensors like, Bluetooth, WiFi, GPS, and accelerometers may be used ❒ Examples: Bump and Banjo 2 Bump 3 Banjo 4 Using Conferences as Case Studies ❒ Each conference has a series of social events and an organized program ❒ Hard for new conference attendees to locate people in the same research area and exchange contacts. ❒ In this chapter, we will study how to use a mobile app, called Find & Connect, to help attendees to meet the right persons! ❒ Attendees form ephemeral social networks at conferences 5 What is Ephemeral Social Network? ❒ In online social networks, our own social network consists of micro-social networks where we physically interact with and are surrounded by social networks as ephemeral social networks ❒ These network connections among people are spontaneous (not planned) and temporary (not persistent), which occur at a place or event in groups ❒ Example: conference attendees attending the same talk may form an ephemeral social community ❍ They likely either share the same interests or both know the speaker 6 Otherwise, Many Opportunities Will be Missed ❒ Social interactions are often not recorded ß attendees are busy with social events ❒ Ephemeral can help to record social events à organize future conference activity 7 Three Elements of Activities 1. Contact 2. -
Taxonomy of Mobile Web Applications from a Taxonomy and Business Analysis for Mobile Web Applications
Chapter 3: Taxonomy of Mobile Web Applications from A Taxonomy and Business Analysis for Mobile Web Applications By Kevin Hao Liu Ph.D. Computer Science Victoria University Submitted to the System Design and Management Program in Partial Fulfillment of the Requirements for the Degree of Master of Science in Management and Engineering At the Massachusetts Institute of Technology February 2009 © 2009 Kevin H Liu. All rights reserved The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. ABSTRACT Mobile web applications refer to web applications on mobile devices, aimed at personalizing, integrating, and discovering mobile contents in user contexts. This thesis presents a comprehensive study of mobile web applications by proposing a new taxonomy for mobile web applications, and conducting a business analysis in the field of mobile web applications. The thesis reviews the current surrounding environment for mobile web applications, namely, web 2.0 and 3.0, wireless communication technology, and Smartphone platform. The recent entry and success of Apple’s iPhone greatly enhanced the public awareness of the Smartphone technology. Google’s release of open-source Android platform and T-Mobile’s deployment of Android-powered “Dream” Smartphone not only intensify the competition among suppliers, but also provide an open-source foundation for mobile web applications. This thesis introduces a new mobile web application taxonomy to systematically study the values and the groupings of the mobile web applications. By introducing features and categories, the taxonomy provides a framework so the related companies and businesses can be comparatively analyzed and summarized. -
Nokia and UC Berkeley Captu
Nokia and UC Berkeley capture real-time traffic information using GPS en... file:///C:/Users/Justin/Documents/Websites/Bayen/Traffic/projects/2010-... Ads by Google Travel Updates Traffic Update Traffic News Traffic Cameras Traffic W atch Ads by GoogleAds by Google PDA Bible Software China Mobile Phone GPS Phone Software Cheap Phone Wireless Phone PDAs Search Home | All News | Forums | Gallery | Phone Wallpaper Mobile Version | RSS Feed Nokia and UC Berkeley capture real-time traffic information using GPS enabled Industry News mobile devices Mobile Phones Reviews Map of Traffic Videos Find Detailed Maps of Traffic Road Maps, Traffic Microsoft Reports, & More mytrafficmaps.net Palm SYNC Technology Symbian See the Intelligent Features of SYNC. Hands Gadgets Free, Voice Activated Ford.com/SYNC Linux Traffic Accident SavaJe Search multiple engines for traffic accident VoIP www.webcrawler.com Security Traffic Signs Events Discount Prices on Traffic Signs! Peruse Our Wide Selection Today. F.A.Q & Tips www.TrafficSafetyExperts.com RSS Feed Send us your tips GPS Navigation System Advertising Get GPS Now For Free! Don't Miss Out - Offer Ends Soon. MyGPSOffer.com/Garmin Bank of America - iPhone Mobile Banking on Your iPhone Download the Free iPhone App Today. www.BankofAmerica.com 1 of 5 11/26/2010 9:59 AM Nokia and UC Berkeley capture real-time traffic information using GPS en... file:///C:/Users/Justin/Documents/Websites/Bayen/Traffic/projects/2010-... Last update: 10-02-08 Submitted by ahbao Views: 632 Home Industry News Latest News Nokia and UC Berkeley researchers tested technology that could soon transform the way drivers navigate through congested highways and obtain information about road conditions. -
Comment Submitted by CTIA
May 1, 2008 Electronic Filing Mr. Donald S. Clark, Secretary Federal Trade Commission/Office of the Secretary 600 Pennsylvania Avenue, N.W. Room H-135 (Annex A) Washington, DC 20580 Re: Beyond Voice − Comment, Project No. P074403 Comments of CTIA – The Wireless Association® Dear Mr. Clark: CTIA – The Wireless Association®1 (“CTIA”) respectfully submits these comments for consideration by the Federal Trade Commission (“FTC”) and to supplement CTIA’s statements at the “Beyond Voice: Mapping the Mobile Marketplace” Town Hall meeting hosted by the FTC on May 6 and 7, 2008 in Washington, DC. CTIA joins the other meeting participants in thanking the FTC for addressing consumer protection issues in the rapidly expanding world of M-commerce. In these comments, CTIA describes the current state of location-based services (“LBS”) and gives an overview of wireless carrier and non-carrier LBS offerings. CTIA also discusses the wireless industry’s voluntary adoption of the Best Practices and Guidelines for Location-Based Services. LOCATION-BASED SERVICES Location-based services are information services that utilize the location of a mobile device and are accessible through the mobile network. LBS applications are 1 CTIA is the international organization of the wireless communications industry for both wireless carriers and manufacturers. Membership in the association covers Commercial Mobile Radio Service (“CMRS”) providers and manufacturers, including cellular, broadband PCS, ESMR, and AWS, as well as providers and manufacturers of wireless data services and products. 1 available from wireless carrier and non-carrier providers and include the public safety- oriented E911 services that wireless companies provide, as well as other commercial and non-commercial location-based services.