Tribune Gives Zap2it a Face-Lift, Acquires TV by the Numbers

Total Page:16

File Type:pdf, Size:1020Kb

Tribune Gives Zap2it a Face-Lift, Acquires TV by the Numbers Tribune Gives Zap2it a Face-Lift, Acquires TV by the Numbers 04.04.2014 "With so much outstanding TV programming available on so many different platforms today, there has never been a better time to be a TV fan." So said Brian Campbell, executive director of sales for the Tribune-owned online TV industry resource, Zap2it, in a statement announcing its overhaul. "It's the perfect chance for us to make the site cleaner, more modern, and more image-heavy, so it really engages users more and helps them discover content," he continued in a phone conversation with Brief. Campbell spoke on a big Thursday for Tribune's technology and innovation arm, Tribune Digital Ventures, which also announced the acquisition of TV by the Numbers, an industry blog that has powered Zap2it's TV ratings editorial content since 2010. The purchase expands Tribune's entertainment data business, which already included Gracenote and Tribune Media Services. With Tribune's backing, TV by the Numbers' tiny 10-worker operation is poised to become a "must-have analytics and data resource for passionate viewers and Hollywood insiders alike," said Shashi Seth, president of Tribune Digital Ventures, in the statement. "Viewership numbers, audience reviews and social data are increasingly becoming reliable indicators of TV show popularity, making TV by the Numbers analysis data essential to the evolving ecosystem." In the meantime, Zap2it's refreshed website is already making a splash. Enjoying more than 7 million unique monthly visitors before the upgrade, the company can expect that total to grow with a newly responsive, mobile-friendly user interface complimented by a sleek and stylish marriage of form and function. A revolving carousel kicks the homepage off with a glorious full-screen image design reminiscent of Hulu, and content grounded largely in premieres, finales, notable guest stars and other trending TV stories. The main objective, said Campbell, was to "be much more visually stimulating to get users to interact with the shows, go to the show page, watch the trailer, etc." Scrolling down the page finds that trend continuing into a section called "Your Entertainment Today," featuring current news, blog posts and photo galleries. A sidebar, "What's on Tonight," displays the day's programming highlights, and links to a full schedule across all the networks. Up above, two tabs link to Zap2it's ratings page and again to the schedule page. All in all, it's an incredibly simple redesign with unlimited opportunities to not only read about and discover new television, but for TV marketers to participate in that discovery process. Offering smooth integration of product placement with editorial content, the top carousel is available for a full-day sponsored takeover, as are select boxes in the "Your Entertainment Today" section. And on the schedule page, networks can supply a trailer in the time slot of any given episode - a fantastically helpful addition for potential viewers curious enough to see what's playing, but not sure what exactly they want to watch yet. "We recognize that people who love TV - and the advertisers who want to reach them - need an integrated TV discovery and editorial source," said Campbell, "so we're excited to unveil the all-new Zap2it to meet those needs.".
Recommended publications
  • Call Numbers
    Call numbers: It is our recommendation that libraries NOT put J, +, E, Ref, etc. in the call number field in front of the Dewey or other call number. Use the Home Location field to indicate the collection for the item. It is difficult if not impossible to sort lists if the call number fields aren’t entered systematically. Dewey Call Numbers for Non-Fiction Each library follows its own practice for how long a Dewey number they use and what letters are used for the author’s name. Some libraries use a number (Cutter number from a table) after the letters for the author’s name. Other just use letters for the author’s name. Call Numbers for Fiction For fiction, the call number is usually the author’s Last Name, First Name. (Use a comma between last and first name.) It is usually already in the call number field when you barcode. Call Numbers for Paperbacks Each library follows its own practice. Just be consistent for easier handling of the weeding lists. WCTS libraries should follow the format used by WCTS for the items processed by them for your library. Most call numbers are either the author’s name or just the first letters of the author’s last name. Please DO catalog your paperbacks so they can be shared with other libraries. Call Numbers for Magazines To get the call numbers to display in the correct order by date, the call number needs to begin with the date of the issue in a number format, followed by the issue in alphanumeric format.
    [Show full text]
  • Minorities and Women in Television See Little Change, While Minorities Fare Worse in Radio
    RunningRunning inin PlacePlace Minorities and women in television see little change, while minorities fare worse in radio. By Bob Papper he latest figures from the RTNDA/Ball State Uni- Minority Population vs. Minority Broadcast Workforce versity Annual Survey show lit- 2005 2004 2000 1995 1990 tle change for minorities in tel- evision news in the past year but Minority Population in U.S. 33.2% 32.8% 30.9% 27.9% 25.9% slippage in radio news. Minority TV Workforce 21.2 21.8 21.0 17.1 17.8 TIn television, the overall minority Minority Radio Workforce 7.9 11.8 10.0 14.7 10.8 workforce remained largely un- Source for U.S. numbers: U.S. Census Bureau changed at 21.2 percent, compared with last year’s 21.8 percent. At non-Hispanic stations, the the stringent Equal Employment minority workforce in TV news is up minority workforce also remained Opportunity rules were eliminated in 3.4 percent. At the same time, the largely steady at 19.5 percent, com- 1998. minority population in the U.S. has pared with 19.8 percent a year ago. News director numbers were increased 7.3 percent. Overall, the After a jump in last year’s minority mixed, with the percentage of minor- minority workforce in TV has been at radio numbers, the percentage fell this ity TV news directors down slightly to 20 percent—plus or minus 3 per- year.The minority radio news work- 12 percent (from 12.5 percent last cent—for every year in the past 15.
    [Show full text]
  • Precise Radioactivity Measurements a Controversy
    http://cyclotron.tamu.edu Precise Radioactivity Measurements: A Controversy Settled Simultaneous measurements of x-rays and gamma rays emitted in radioactive nuclear decays probe how frequently excited nuclei release energy by ejecting an atomic electron THE SCIENCE Radioactivity takes several different forms. One is when atomic nuclei in an excited state release their excess energy (i.e., they decay) by emitting a type of electromagnetic radiation, called gamma rays. Sometimes, rather than a gamma ray being emitted, the nucleus conveys its energy electromagnetically to an atomic electron, causing it to be ejected at high speed instead. The latter process is called internal conversion and, for a particular radioactive decay, the probability of electron emission relative to that of gamma-ray emission is called the internal conversion coefficient (ICC). Theoretically, for almost all transitions, the ICC is expected to depend on the quantum numbers of the participating nuclear excited states and on the amount of energy released, but not on the sometimes obscure details of how the nucleus is structured. For the first time, scientists have been able to test the theory to percent precision, verifying its independence from nuclear structure. At the same time, the new results have guided theorists to make improvements in their ICC calculations. THE IMPACT For the decays of most known excited states in nuclei, only the gamma rays have been observed, so scientists have had to combine measured gamma-ray intensities with calculated ICCs in order to put together a complete picture known as a decay scheme, which includes the contribution of electron as well as gamma-ray emission, for every radioactive decay.
    [Show full text]
  • Girls' Elite 2 0 2 0 - 2 1 S E a S O N by the Numbers
    GIRLS' ELITE 2 0 2 0 - 2 1 S E A S O N BY THE NUMBERS COMPARING NORMAL SEASON TO 2020-21 NORMAL 2020-21 SEASON SEASON SEASON LENGTH SEASON LENGTH 6.5 Months; Dec - Jun 6.5 Months, Split Season The 2020-21 Season will be split into two segments running from mid-September through mid-February, taking a break for the IHSA season, and then returning May through mid- June. The season length is virtually the exact same amount of time as previous years. TRAINING PROGRAM TRAINING PROGRAM 25 Weeks; 157 Hours 25 Weeks; 156 Hours The training hours for the 2020-21 season are nearly exact to last season's plan. The training hours do not include 16 additional in-house scrimmage hours on the weekends Sep-Dec. Courtney DeBolt-Slinko returns as our Technical Director. 4 new courts this season. STRENGTH PROGRAM STRENGTH PROGRAM 3 Days/Week; 72 Hours 3 Days/Week; 76 Hours Similar to the Training Time, the 2020-21 schedule will actually allow for a 4 additional hours at Oak Strength in our Sparta Science Strength & Conditioning program. These hours are in addition to the volleyball-specific Training Time. Oak Strength is expanding by 8,800 sq. ft. RECRUITING SUPPORT RECRUITING SUPPORT Full Season Enhanced Full Season In response to the recruiting challenges created by the pandemic, we are ADDING livestreaming/recording of scrimmages and scheduled in-person visits from Lauren, Mikaela or Peter. This is in addition to our normal support services throughout the season. TOURNAMENT DATES TOURNAMENT DATES 24-28 Dates; 10-12 Events TBD Dates; TBD Events We are preparing for 15 Dates/6 Events Dec-Feb.
    [Show full text]
  • Season 6, Episode 4: Airstream Caravan Tukufu Zuberi
    Season 6, Episode 4: Airstream Caravan Tukufu Zuberi: Our next story investigates the exotic travels of this vintage piece of Americana. In the years following World War II, Americans took to the open road in unprecedented numbers. A pioneering entrepreneur named Wally Byam seized on this wanderlust. He believed his aluminium-skinned Airstream trailers could be vehicles for change, transporting Americans to far away destinations, and to a new understanding of their place in the world. In 1959, he dreamt up an outlandish scheme: to ship 41 Airstreams half way around the globe for a 14,000-mile caravan from Cape Town to the pyramids of Egypt. Nearly 50 years later, Doug and Suzy Carr of Long Beach, California, think these fading numbers and decal may mean their vintage Airstream was part of this modern day wagon train. Suzy: We're hoping that it's one of forty-one Airstreams that went on a safari in 1959 and was photographed in front of the pyramids. Tukufu: I’m Tukufu Zuberi, and I’ve come to Long Beach to find out just how mobile this home once was. Doug: Hi, how ya doing? Tukufu: I'm fine. How are you? I’m Tukufu Zuberi. Doug: All right. I'm Doug Carr. This is my wife Suzy. Suzy: Hey, great to meet you. Welcome to Grover Beach. Tukufu: How you doing? You know, this is a real funky cool pad. Suzy: It's about as funky as it can be. Tukufu: What do you have for me? Suzy: Well, it all started with a neighbor, and he called over and said, “I believe you have a really famous trailer.” He believed that ours was one of a very few that in 1959 had gone on a safari with Wally Byam.
    [Show full text]
  • Fracking by the Numbers
    Fracking by the Numbers The Damage to Our Water, Land and Climate from a Decade of Dirty Drilling Fracking by the Numbers The Damage to Our Water, Land and Climate from a Decade of Dirty Drilling Written by: Elizabeth Ridlington and Kim Norman Frontier Group Rachel Richardson Environment America Research & Policy Center April 2016 Acknowledgments Environment America Research & Policy Center sincerely thanks Amy Mall, Senior Policy Analyst, Land & Wildlife Program, Natural Resources Defense Council; Courtney Bernhardt, Senior Research Analyst, Environmental Integrity Project; and Professor Anthony Ingraffea of Cornell University for their review of drafts of this document, as well as their insights and suggestions. Frontier Group interns Dana Bradley and Danielle Elefritz provided valuable research assistance. Our appreciation goes to Jeff Inglis for data assistance. Thanks also to Tony Dutzik and Gideon Weissman of Frontier Group for editorial help. We also are grateful to the many state agency staff who answered our numerous questions and requests for data. Many of them are listed by name in the methodology. The authors bear responsibility for any factual errors. The recommendations are those of Environment America Research & Policy Center. The views expressed in this report are those of the authors and do not necessarily reflect the views of our funders or those who provided review. 2016 Environment America Research & Policy Center. Some Rights Reserved. This work is licensed under a Creative Commons Attribution Non-Commercial No Derivatives 3.0 Unported License. To view the terms of this license, visit creativecommons.org/licenses/by-nc-nd/3.0. Environment America Research & Policy Center is a 501(c)(3) organization.
    [Show full text]
  • Trustworthy Whole-System Provenance for the Linux Kernel
    Trustworthy Whole-System Provenance for the Linux Kernel Adam Bates, Dave (Jing) Tian, Thomas Moyer Kevin R.B. Butler University of Florida MIT Lincoln Laboratory {adammbates,daveti,butler}@ufl.edu [email protected] Abstract is presently of enormous interest in a variety of dis- In a provenance-aware system, mechanisms gather parate communities including scientific data processing, and report metadata that describes the history of each ob- databases, software development, and storage [43, 53]. ject being processed on the system, allowing users to un- Provenance has also been demonstrated to be of great derstand how data objects came to exist in their present value to security by identifying malicious activity in data state. However, while past work has demonstrated the centers [5, 27, 56, 65, 66], improving Mandatory Access usefulness of provenance, less attention has been given Control (MAC) labels [45, 46, 47], and assuring regula- to securing provenance-aware systems. Provenance it- tory compliance [3]. self is a ripe attack vector, and its authenticity and in- Unfortunately, most provenance collection mecha- tegrity must be guaranteed before it can be put to use. nisms in the literature exist as fully-trusted user space We present Linux Provenance Modules (LPM), applications [28, 27, 41, 56]. Even kernel-based prove- the first general framework for the development of nance mechanisms [43, 48] and sketches for trusted provenance-aware systems. We demonstrate that LPM provenance architectures [40, 42] fall short of providing creates a trusted provenance-aware execution environ- a provenance-aware system for malicious environments. ment, collecting complete whole-system provenance The problem of whether or not to trust provenance is fur- while imposing as little as 2.7% performance overhead ther exacerbated in distributed environments, or in lay- on normal system operation.
    [Show full text]
  • The Wavelet Tutorial Second Edition Part I by Robi Polikar
    THE WAVELET TUTORIAL SECOND EDITION PART I BY ROBI POLIKAR FUNDAMENTAL CONCEPTS & AN OVERVIEW OF THE WAVELET THEORY Welcome to this introductory tutorial on wavelet transforms. The wavelet transform is a relatively new concept (about 10 years old), but yet there are quite a few articles and books written on them. However, most of these books and articles are written by math people, for the other math people; still most of the math people don't know what the other math people are 1 talking about (a math professor of mine made this confession). In other words, majority of the literature available on wavelet transforms are of little help, if any, to those who are new to this subject (this is my personal opinion). When I first started working on wavelet transforms I have struggled for many hours and days to figure out what was going on in this mysterious world of wavelet transforms, due to the lack of introductory level text(s) in this subject. Therefore, I have decided to write this tutorial for the ones who are new to the topic. I consider myself quite new to the subject too, and I have to confess that I have not figured out all the theoretical details yet. However, as far as the engineering applications are concerned, I think all the theoretical details are not necessarily necessary (!). In this tutorial I will try to give basic principles underlying the wavelet theory. The proofs of the theorems and related equations will not be given in this tutorial due to the simple assumption that the intended readers of this tutorial do not need them at this time.
    [Show full text]
  • FAA Aviation News for an Article on Developing Your Indi- Vidual Personal Minimums.)
    More than Math Understanding Performance Limits DAVE SwaRTZ hate it when you complete the takeoff run hang- ing upside down from the seat belts. A few years ago, that happened to me, and I really should Ihave known better. You see, I’m an aeronautical engi- neer and I occasionally do performance calculations for a living, so I have no excuse. That fateful day the conditions looked marginal, so I looked at “the book.” It said I could make it. One of my mistakes was taking the book numbers too seriously. They didn’t take into account the tailwind I didn’t know I had. Since that day, I have been thinking and learn- ing a lot about what went wrong. I hope you find my mistakes useful in avoiding some of your own. According to the 2006 Nall Report, published by the Aircraft Owners and Pilots Association’s Air Safety Foundation (AOPA/ASF), about one out of six takeoff accidents is fatal. It’s sobering to realize that you have the same odds in Russian roulette. I am one of the lucky ones. Where Do Performance Numbers Come From? Honestly, it’s really a mixed bag. In the case of many older airplanes, the Pilot’s Operating Handbook (POH) contains limited information at best. Yet, you can still be confident that most airplanes have been tested by steely-eyed test pilots to determine what the airplane can, and will, do under specific conditions. Then, engineers try to replicate what they think an average pilot will do. Engineers start with the takeoff distances that the test pilots achieve and correct them for things like density altitude and runway conditions.
    [Show full text]
  • Analysis of the Airline Pilot Shortage
    Scientia et Humanitas: A Journal of Student Research Analysis of the Airline Pilot Shortage Victoria Crouch Abstract The pilot shortage in the United States currently affects airlines and pilots drastically. The airlines have been forced to implement new solutions to recruit and retain pilots. These solutions include dramatic pay raises and cadet programs. One of the most significant causes of the pilot shortage is the aviation industry’s rapid growth. Other factors include the aging pilot popula- tion and high flight training costs. In addition, regional airlines, a major source of pilots for major airlines, have a historically low pay rate, which deters pilots from wanting to work for them. This situation is compounded by a lack of hiring in the 2000s for various reasons. The effects of the pilot shortage include decreased flights, loss of revenue, and closing of some re- gional airlines. Airlines have implemented various solutions aimed at increasing the number of pilots. These include an increased pay rate, job pathway programs through universities, and guaranteed interviews or jobs. The solutions proposed will likely prove their effectiveness in minimizing the pilot shortage over the next decade. Note: This research was correct prior to the onset of the Covid-19 pandemic, which has affected the airline industry. 92 Spring 2020 Scientia et Humanitas: A Journal of Student Research A global pilot shortage currently affects not only pilots but also their employ- ers. As a result, commercial airlines are forced to ground aircrafts because there are not enough pilots to fly them. Analysts project that the airlines will be short 8,000 pilots by 2023 and 14,139 pilots by 2026 (Klapper and Ruff-Stahl, 2019).
    [Show full text]
  • Numb3rs Episode Guide Episodes 001–118
    Numb3rs Episode Guide Episodes 001–118 Last episode aired Friday March 12, 2010 www.cbs.com c c 2010 www.tv.com c 2010 www.cbs.com c 2010 www.redhawke.org c 2010 vitemo.com The summaries and recaps of all the Numb3rs episodes were downloaded from http://www.tv.com and http://www. cbs.com and http://www.redhawke.org and http://vitemo.com and processed through a perl program to transform them in a LATEX file, for pretty printing. So, do not blame me for errors in the text ^¨ This booklet was LATEXed on June 28, 2017 by footstep11 with create_eps_guide v0.59 Contents Season 1 1 1 Pilot ...............................................3 2 Uncertainty Principle . .5 3 Vector ..............................................7 4 Structural Corruption . .9 5 Prime Suspect . 11 6 Sabotage . 13 7 Counterfeit Reality . 15 8 Identity Crisis . 17 9 Sniper Zero . 19 10 Dirty Bomb . 21 11 Sacrifice . 23 12 Noisy Edge . 25 13 Man Hunt . 27 Season 2 29 1 Judgment Call . 31 2 Bettor or Worse . 33 3 Obsession . 37 4 Calculated Risk . 39 5 Assassin . 41 6 Soft Target . 43 7 Convergence . 45 8 In Plain Sight . 47 9 Toxin............................................... 49 10 Bones of Contention . 51 11 Scorched . 53 12 TheOG ............................................. 55 13 Double Down . 57 14 Harvest . 59 15 The Running Man . 61 16 Protest . 63 17 Mind Games . 65 18 All’s Fair . 67 19 Dark Matter . 69 20 Guns and Roses . 71 21 Rampage . 73 22 Backscatter . 75 23 Undercurrents . 77 24 Hot Shot . 81 Numb3rs Episode Guide Season 3 83 1 Spree .............................................
    [Show full text]
  • A Brief Tour Through Provenance in Scientific Workflows and Databases
    A Brief Tour through Provenance in Scientific Workflows and Databases Bertram Ludascher¨ Graduate School of Library and Information Science & National Center for Supercomputing Applications University of Illinois at Urbana-Champaign [email protected] Abstract Within computer science, the term provenance has multiple meanings, due to differ- ent motivations, perspectives, and assumptions prevalent in the respective communities. This chapter provides a high-level “sightseeing tour” of some of those different notions and uses of provenance in scientific workflows and databases. Keywords: prospective provenance, retrospective provenance, lineage, provenance polynomials, why-not provenance, provenance games. Contents 1 Provenance in Art, Science, and Computation2 1.1 Transparency and Reproducibility in Science . .3 2 Provenance in Scientific Workflows4 2.1 Workflows as Prospective Provenance . .5 2.2 Retrospective Provenance from Workflow Execution Traces . .6 2.3 Models of Provenance and Scientific Workflows . .7 2.4 Relating Retrospective and Prospective Provenance . .7 3 Provenance in Databases 10 3.1 A Brief History of Database Provenance . 11 3.2 Running Example: The Three-Hop Query (thop).............. 13 3.3 The Great Unification: Provenance Semirings . 14 3.4 Unifying Why and Why-Not Provenance through Games . 15 4 Conclusions 17 A Query Rewriting for Provenance Annotations 23 1 Provenance in Art, Science, and Computation The Oxford English Dictionary (OED) defines provenance as “the place of origin or ear- liest known history of something; the beginning of something’s existence; something’s ori- gin.” Another meaning listed in the OED is “a record of ownership of a work of art or an antique, used as a guide to authenticity or quality.” In the fine arts, the importance of this notion of provenance can often be measured with hard cash.
    [Show full text]