Research and Development in E-Business Through Service-Oriented Solutions

Total Page:16

File Type:pdf, Size:1020Kb

Research and Development in E-Business Through Service-Oriented Solutions Research and Development in E-Business through Service-Oriented Solutions Katalin Tarnay University of Pannonia, Hungary & Budapest University of Technology and Economics, Hungary Sandor Imre Budapest University of Technology and Economics, Hungary Lai Xu Bournemouth University, UK A volume in the Advances in E-Business Research (AEBR) Book Series Managing Director: Lindsay Johnston Editorial Director: Joel Gamon Production Manager: Jennifer Yoder Publishing Systems Analyst: Adrienne Freeland Development Editor: Myla Merkel Assistant Acquisitions Editor: Kayla Wolfe Typesetter: Christina Henning Cover Design: Jason Mull Published in the United States of America by Business Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2013 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Research and development in e-business through service-oriented solutions / Katalin Tarnay, Sandor Imre and Lai Xu, editors. pages cm Includes bibliographical references and index. Summary: “This book highlights the main concepts of e-business as well as the advanced methods, technologies, and aspects that focus on technical support for professors, students, researchers, developers, and other industryexperts in order to provide a vast amount of specialized knowledge sources for promoting e-business”--Provided by publisher. ISBN 978-1-4666-4181-5 (hardcover) -- ISBN 978-1-4666-4182-2 (ebook) -- ISBN 978-1-4666-4183-9 (print & perpetual access) 1. Service-oriented architecture (Computer science) 2. Data mining. 3. Electronic commerce. I. Tarnay, Katalin. II. Imre, S?ndor. III. Xu, Lai, 1970- TK5105.5828.R47 2013 658.8’72--dc23 2013009512 This book is published in the IGI Global book series Advances in E-Business Research (AEBR) Book Series (ISSN: 1935- 2700; eISSN: 1935-2719) British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. 134 Chapter 7 Tracking and Fingerprinting in E-Business: New Storageless Technologies and Countermeasures Károly Boda Gábor György Gulyás Budapest University of Technology and Budapest University of Technology and Economics, Hungary Economics, Hungary Ádám Máté Földes Sándor Imre Budapest University of Technology and Budapest University of Technology and Economics, Hungary Economics, Hungary ABSTRACT Online user tracking is a widely used marketing tool in e-business, even though it is often neglected in the related literature. In this chapter, the authors provide an exhaustive survey of tracking-related identification techniques, which are often applied against the will and preferences of the users of the Web, and therefore violate their privacy one way or another. After discussing the motivations behind the information-collecting activities targeting Web users (i.e., profiling), and the nature of the information that can be collected by various means, the authors enumerate the most important techniques of the three main groups of tracking, namely storage-based tracking, history stealing, and fingerprinting. The focus of the chapter is on the last, as this is the field where both the techniques intended to protect users and the current legislation are lagging behind the state-of-the-art technology; nevertheless, the authors also discuss conceivable defenses, and provide a taxonomy of tracking techniques, which, to the authors’ knowledge, is the first of its kind in the literature. At the end of the chapter, the authors attempt to draw the attention of the research community of this field to new tracking methods. DOI: 10.4018/978-1-4666-4181-5.ch007 Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Tracking and Fingerprinting in E-Business INTRODUCTION as pursuing behavioral advertising or monetiz- ing user profiles by other means. According to Many Website operators involved in end-user the report of IAB Internet Advertising Revenue oriented e-business have an interest in monetizing Report (IAB, 2012), the advertising revenues set their user base (e.g., by realizing as many clicks a new record at $8.4 billion in Q1 2012, clearly on their advertisements as possible). One way of showing the significance and the growth of the achieving this goal is collecting diverse informa- advertising industry. tion about the user (or profiling her), the vehicles In two recent studies, Goldfarb & Tucker of which are technologies that can be used for (January and May, 2011) concluded that targeted identifying returning visitors, and those that infer advertising can successfully influence individuals sensitive information (such as browsing history) in favor of buying a product, and targeted advertis- that users are not necessarily willing to disclose ing has a significant positive (economic) impact (e.g., purchase preferences). This controversial on advertising. These claims are consistent with method may be a necessity for better serving the the ever-increasing presence of Web tracking needs of online customers, but it often goes beyond techniques (the most used tools for profiling) and user demands, and is used for business purposes the revenues the industry reached in 2012, presum- against the will of the clients. ably with a continuously increasing proportion It is not surprising that certain users are of behavioral advertising. By summarizing the concerned about pervasive profiling. In fact, measurements of Krishnamurthy & Wills between this problem has been discussed from so many 2006 and 2012 (Krishnamurthy & Wills, 2006; viewpoints in academia that not only effective 2009; Krishnamurthy, 2010), Mayer & Mitchell technological, but also more or less effective leg- (2012) highlighted that the coverage on top sites islative countermeasures have been implemented of large tracking companies increased during these in order to mitigate the privacy risks arising from years, and so did the number of trackers per page. the proliferation of a subset of profiling-related Today, researchers estimate that there are track- technologies. That said, this chapter is inspired ers capable of monitoring more than one fifth of by the rest (primarily by fingerprinting attacks), user activity while browsing online (Roesner et for which neither defensive technology nor the al., 2012). law seems to be able to keep up with the pace However, as can be expected, tracking for of development dictated by pro-profiling actors, targeted advertising is not favored by users. A leaving users of the Web powerless against and Harris Interactive poll (Krane, 2008), a TRUSTe vulnerable to them. survey (2009), and a nationally representative telephone survey in the USA conducted by Turow et al. (2009) uniformly confirmed that the majority PROFILING AND USER of individuals (around 60% in all cases) found it PRIVACY ON THE WEB uncomfortable when they faced advertisements on Websites adjusted to their preferences by pre- There are several motives of profiling users on viously observing their online activities. A more the Web. For instance, an enormous number of recent online survey conducted by McDonald & Web services can be accessed for free; however, Cranor (2010) also confirmed this result with contrary to how it looks (or is communicated), 55% of respondents rejecting targeted advertising; free access often comes with a greater sacrifice another recent survey conducted by TRUSTe in of user privacy, as many of these companies gain partnership with Harris Interactive (2011) reported revenue from profiling-related activities, such a higher rate of respondents, namely 85%, who 135 Tracking and Fingerprinting in E-Business would not consent to being tracked for targeted fingerprints all types of devices (Oracle, 2011). advertising. Somewhat in contrast with user attitude towards Nevertheless, targeted advertising is not the commercial tracking, a survey of TRUSTe & only goal of tracking and profiling; there are several Harris Interactive (2011) shows that 42% of re- other commercial use cases. Besides monetizing spondents would consent to tracking to enhance profiles in trades (i.e., exchanging large databases security and to detect frauds. It must be noted that of pseudonymous profiles), they can be utilized such identification can be used for quite different to provide additional user interface features; for and questionable purposes, such as identification example, recommendations on news or Web shop for censorship or surveillance, too. items, customized user interfaces, or to facilitate price discrimination (dynamic pricing, i.e., adjust- Who Needs Users to be Identified? ing price tags for customer price sensitivity for profit maximization of the vendor). There are several actors in the online era arguing The case of Amazon.com–namely when the against
Recommended publications
  • Free Social Media Monitoring Tool ² Setup Guide
    Free Social Media Monitoring Tool ² Setup Guide Overview: If you are looking for an overview before you actually start, please go thought my blog for a basic idea on how the tool works. Setting up: The setup process consists of two main steps. First, fetching the RSS feeds and second, adding it to the RSS reader (Google Reader) and organizing it for easy reference. Step 1: Fetching RSS Feeds from different kinds of social networking websites 1. Blogs 1.1. Go to http://blogsearch.google.com/ 1.2. Enter the search term and hit ´Search Blogsµ (Tip: the search term can be your brand name, product, services or competitor·s brand) 1.3. Copy the Atom feed URL and save it 2. Forums 2.1. Go to http://www.google.com/alerts/ 2.2. Enter the search term 2.3. Select ´Discussionµ as type 2.4. Select email length ´50µ 2.5. Deliver to ´Feedµ 2.6. Hit ´Create Alertµ 2.7. Copy the Feed URL and save it 3. Video Websites 3.1. Go to http://www.google.com/alerts/ 3.2. Enter the search term 3.3. Select ´Videoµ as type 3.4. Select email length ´50µ 3.5. Deliver to ´Feedµ 3.6. Hit ´Create Alertµ 3.7. Copy the Feed URL and save it 4. News 4.1. Go to http://news.google.com/ 4.2. Enter the search term and hit ´Search Newsµ 4.3. Copy the RSS feed URL and save it 5. Twitter 5.1. Go to http://twitter.com/ and login 5.2.
    [Show full text]
  • ISCRAM2005 Conference Proceedings Format
    Yee et al. The Tablecast Data Publishing Protocol The Tablecast Data Publishing Protocol Ka-Ping Yee Dieterich Lawson Google Medic Mobile [email protected] [email protected] Dominic König Dale Zak Sahana Foundation Medic Mobile [email protected] [email protected] ABSTRACT We describe an interoperability challenge that arose in Haiti, identify the parameters of a general problem in crisis data management, and present a protocol called Tablecast that is designed to address the problem. Tablecast enables crisis organizations to publish, share, and update tables of data in real time. It allows rows and columns of data to be merged from multiple sources, and its incremental update mechanism is designed to support offline editing and data collection. Tablecast uses a publish/subscribe model; the format is based on Atom and employs PubSubHubbub to distribute updates to subscribers. Keywords Interoperability, publish/subscribe, streaming, synchronization, relational table, format, protocol INTRODUCTION After the January 2010 earthquake in Haiti, there was an immediate need for information on available health facilities. Which hospitals had been destroyed, and which were still operating? Where were the newly established field clinics, and how many patients could they accept? Which facilities had surgeons, or dialysis machines, or obstetricians? Aid workers had to make fast decisions about where to send the sick and injured— decisions that depended on up-to-date answers to all these questions. But the answers were not readily at hand. The U. S. Joint Task Force began a broad survey to assess the situation in terms of basic needs, including the state of health facilities. The UN Office for the Coordination of Humanitarian Affairs (OCHA) was tasked with monitoring and coordinating the actions of the many aid organizations that arrived to help.
    [Show full text]
  • Minelli-Et-Al(Eds)
    ZOOTAXA 1950 Updating the Linnaean Heritage: Names as Tools for Thinking about Animals and Plants ALESSANDRO MINELLI, LUCIO BONATO & GIUSEPPE FUSCO (EDS) Magnolia Press Auckland, New Zealand ALESSANDRO MINELLI, LUCIO BONATO & GIUSEPPE FUSCO (EDS) Updating the Linnaean Heritage: Names as Tools for Thinking about Animals and Plants (Zootaxa 1950) 163 pp.; 30 cm. 5 Dec. 2008 ISBN 978-1-86977-297-0 (paperback) ISBN 978-1-86977-298-7 (Online edition) FIRST PUBLISHED IN 2008 BY Magnolia Press P.O. Box 41-383 Auckland 1346 New Zealand e-mail: [email protected] http://www.mapress.com/zootaxa/ © 2008 Magnolia Press All rights reserved. No part of this publication may be reproduced, stored, transmitted or disseminated, in any form, or by any means, without prior written permission from the publisher, to whom all requests to reproduce copyright material should be directed in writing. This authorization does not extend to any other kind of copying, by any means, in any form, and for any purpose other than private research use. ISSN 1175-5326 (Print edition) ISSN 1175-5334 (Online edition) Zootaxa 1950: 3–4 (2008) ISSN 1175-5326 (print edition) www.mapress.com/zootaxa/ ZOOTAXA Copyright © 2008 · Magnolia Press ISSN 1175-5334 (online edition) Updating the Linnaean Heritage: Names as Tools for Thinking about Animals and Plants ALESSANDRO MINELLI FLS, LUCIO BONATO & GIUSEPPE FUSCO (EDS) Department of Biology, University of Padova, Via Ugo Bassi 58B, I 35131 Padova, Italy Email: [email protected], [email protected], [email protected] Table of contents 4 Preface ALESSANDRO MINELLI FLS, LUCIO BONATO, GIUSEPPE FUSCO (ITALY) 5 Actual usage of biological nomenclature and its implications for data integrators; a national, regional and global perspective CHARLES HUSSEY (UK), YDE DE JONG (THE NETHERLANDS), DAVID REMSEN (DENMARK) 9 The Linnean foundations of zoological and botanical nomenclature OTTO KRAUS (GERMANY) 21 Zoological vs.
    [Show full text]
  • Unleash the Power Of]
    [Unleash the Power of] Marketing The Complete Step-by-Step Guide for Marketers on How to Profitably Implement RSS Marketing to Generate Traffic, Increase Sales, Manage Customer Relationships and Conduct Business Intelligence the Easy Way Written by Rok Hrastnik, MarketingStudies.net [Unleash the Power of] RSS Marketing Table of Contents Table of Contents ................................................................................2 Introduction: Setting the Stage for RSS Marketing ........................................3 I. Know! What is RSS? ......................................................................... 15 The Quick Introduction to RSS.............................................................. 16 Understanding How RSS Works & Comparing It With E-mail........................... 35 What Kind of Content Can You Publish via RSS? … Or How RSS Isn't Just About Delivering Blog Content and Getting News From The New York Times.............. 49 Seeing the Technical Side of RSS From the Business Perspective .................... 50 II. Understand! The Business Case for RSS................................................ 67 Why RSS Really Matters for Marketers: The Business Case for RSS ................... 68 Taking a Structured View of the Business Case for RSS ................................ 87 The Disadvantages of RSS .................................................................. 120 III. Integrate! RSS Marketing Strategies.................................................. 122 RSS Marketing Mix Integration............................................................
    [Show full text]
  • Public Health Division Hhsa Emergency Operations Plan
    Howard K Himes Director Karen L. Smith, M.D., M.P.H. Public Health Officer 2344 Old Sonoma Road Building G Napa, California 94559 HHSA EMERGENCY OPERATIONS PUBLIC HEALTH PLAN (EOP) – APPENDIX 3 DIVISION and STATE PLAN REVISED May 2014 NAPA COUNTY HEALTH AND HUMAN SERVICES AGENCY (HHSA) ANNEX H - APPENDIX 3: HHSA STRATEGIC NATIONAL STOCKPILE PLAN Revised May 2014 Intentionally Blank Page NAPA COUNTY HHSA PUBLIC HEALTH DIVISION page ii ANNEX H - APPENDIX 3: HHSA STRATEGIC NATIONAL STOCKPILE PLAN Revised May 2014 ACKNOWLEDGEMENTS AND SOURCES Procedures included in this plan are intended as guidelines for response. Actual actions will vary depending on the requirements of the emergency and available resources. This plan is based on guidelines from the California Department of Public Health. The plan was originally published in 2005 and updated in January 2009, August 2010, January 2011, May 2012 and May 2014. PLAN APPROVAL This plan has been reviewed and approved by the Napa County Health and Human Services Agency Director and the Public Health Officer and is the official Bioterrorism Countermeasure Distribution Plan for Napa County. The plan is effective as of January 31, 2010. RECORD OF CHANGES, UPDATES AND REVISIONS Plan Section Description of Change Date Signature and Page #. Sections 2, Updated to reflect the State of California’s May 2012 3.4, 3.5, and Medical/Health Emergency Operations Appdx A Manual and related guidance for the MHOAC program. Cover Page Updated HHSA Director’s name May 2014 NAPA COUNTY HHSA PUBLIC HEALTH DIVISION page iii ANNEX H - APPENDIX 3: HHSA STRATEGIC NATIONAL STOCKPILE PLAN Revised May 2014 NAPA COUNTY HHSA PUBLIC HEALTH DIVISION page iv ANNEX H - APPENDIX 3: HHSA STRATEGIC NATIONAL STOCKPILE PLAN Revised May 2014 CONTENTS 1.
    [Show full text]
  • OSINT Handbook September 2020
    OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 Aleksandra Bielska Noa Rebecca Kurz, Yves Baumgartner, Vytenis Benetis 2 Foreword I am delighted to share with you the 2020 edition of the OSINT Tools and Resources Handbook. Once again, the Handbook has been revised and updated to reflect the evolution of this discipline, and the many strategic, operational and technical challenges OSINT practitioners have to grapple with. Given the speed of change on the web, some might question the wisdom of pulling together such a resource. What’s wrong with the Top 10 tools, or the Top 100? There are only so many resources one can bookmark after all. Such arguments are not without merit. My fear, however, is that they are also shortsighted. I offer four reasons why. To begin, a shortlist betrays the widening spectrum of OSINT practice. Whereas OSINT was once the preserve of analysts working in national security, it now embraces a growing class of professionals in fields as diverse as journalism, cybersecurity, investment research, crisis management and human rights. A limited toolkit can never satisfy all of these constituencies. Second, a good OSINT practitioner is someone who is comfortable working with different tools, sources and collection strategies. The temptation toward narrow specialisation in OSINT is one that has to be resisted. Why? Because no research task is ever as tidy as the customer’s requirements are likely to suggest. Third, is the inevitable realisation that good tool awareness is equivalent to good source awareness. Indeed, the right tool can determine whether you harvest the right information.
    [Show full text]
  • Download This PDF File
    Library Technology R E P O R T S Expert Guides to Library Systems and Services Podcast Literacy: Educational, Accessible, and Diverse Podcasts for Library Users Nicole Hennig alatechsource.org American Library Association About the Author Library Technology Nicole Hennig is an independent user experience pro- REPORTS fessional, helping librarians and educators effectively use mobile technologies. See her educational offerings ALA TechSource purchases fund advocacy, awareness, and at http://nicolehennig.com. She is the author of sev- accreditation programs for library professionals worldwide. eral books, including Apps for Librarians: Using the Best Volume 53, Number 2 Mobile Technology to Educate, Create, and Engage. Her Podcast Literacy: Educational, Accessible, and Diverse online courses, such as Apps for Librarians & Educators, Podcasts for Library Users have enabled librarians from all types of institutions to ISBN: 978-0-8389-5985-5 effectively implement mobile technologies in their pro- American Library Association grams and services. Her newsletter, Mobile Apps News, 50 East Huron St. helps librarians stay current with mobile technologies. Chicago, IL 60611-2795 USA Hennig worked for the MIT Libraries for fourteen years alatechsource.org as head of user experience and web manager. She is the 800-545-2433, ext. 4299 312-944-6780 winner of several awards, including the MIT Excellence 312-280-5275 (fax) Award for Innovative Solutions. Advertising Representative Samantha Imburgia [email protected] Abstract 312-280-3244 Editors Podcasts are experiencing a renaissance today. More Patrick Hogan high-quality programming is available for more [email protected] diverse audiences than ever before. 312-280-3240 When librarians are knowledgeable about pod- Samantha Imburgia casts, how to find the best ones, and what purposes [email protected] they serve, we can point our users to the very best 312-280-3244 content and help increase digital literacy.
    [Show full text]
  • Dissertation Submitted to the Graduate Faculty of Auburn University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy
    Repatterning: Improving the Reliability of Android Applications with an Adaptation of Refactoring by Bradley Christian Dennis A dissertation submitted to the Graduate Faculty of Auburn University in partial fulfillment of the requirements for the Degree of Doctor of Philosophy Auburn, Alabama August 2, 2014 Keywords:Refactoring, Code Smells, Patterns, Non-functional Requirements, Verification Copyright 2014 by Bradley Christian Dennis Committee: David Umphress, Chair, Associate Professor of Computer Science and Software Engineering James Cross, Professor of Computer Science and Software Engineering Dean Hendrix, Associate Professor of Computer Science and Software Engineering Jeffrey Overbey, Assistant Research Professor of Computer Science and Software Engineering Abstract Studies of Android applications show that NullPointerException, OutofMemoryError, and BadTokenException account for a majority of errors observed in the real world. The technical debt being born by Android developers from these systemic errors appears to be due to insufficient, or erroneous, guidance, practices, or tools. This dissertation proposes a re- engineering adaptation of refactoring, called repatterning, and pays down some of this debt. We investigated 323 Android applications for code smells, corrective patterns, or enhancement patterns related to the three exceptions. I then applied the discovered patterns to the locations suggested by the code smells in fifteen randomly selected applications. I measured the before and after reliability of the applications and observed a statistically significant improvement in reliability for two of the three exceptions. I found repatterning had a positive effect on the reliability of Android applications. This research demonstrates how refactoring can be generalized and used as a model to affect non-functional qualities other than the restructuring related attributes of maintainability and adaptability.
    [Show full text]
  • Brno University of Technology Implement Android Application for Audio Podcasts
    BRNO UNIVERSITY OF TECHNOLOGY VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF COMPUTER GRAPHICS AND MULTIMEDIA FAKULTA INFORMAČNÍCH TECHNOLOGIÍ ÚSTAV POČÍTAČOVÉ GRAFIKY A MULTIMÉDIÍ IMPLEMENT ANDROID APPLICATION FOR AUDIO PODCASTS IMPLEMENTUJTE ANDROID APLIKACI PRO STAHOVÁNÍ A POSLECH AUDIO PODCASTŮ MASTER’S THESIS DIPLOMOVÁ PRÁCE AUTHOR Bc. JÁN ŠVEHLA AUTOR PRÁCE SUPERVISOR Ing. IGOR SZŐKE, Ph.D. VEDOUCÍ PRÁCE BRNO 2016 Abstract This master’s thesis is aimed at the problems and issues which are encountered over the development of application for mobile devices. An application for managing and listening of audio podcasts was chosen to be developed. This thesis will guide the reader through general topics and issues of "User Experience" research, its usage and specification on mobile devices and actual design and the implementation of developed application. Results of this work can be used for the development of applications with respect to user centered design. Abstrakt Tato diplomová práce je zaměřená na problémy vyskytující se při tvorbě aplikace pro mobilní zařízení. Jako vyvíjená aplikace byla zvolena aplikace pro práci a poslech audio podcastů. Tato práce provede čtenáře základními tématami a problémy "User Experience" výzkumu, jeho využití a specializace na mobilních zařízeních a samotným návrhem a im- plementací vyvíjené aplikace. Výsledek této práce je možno využít pro vývoj mobilních aplikací s ohledem na "User centered design". Keywords Android, application, podcast, UX, user experience, mobile application, design, user re- search Klíčová slova Android, aplikace, podcast, UX, user experience, mobilní aplikace, design, uživatelský výzkum Reference ŠVEHLA, Ján. Implement Android Application for Audio Podcasts. Brno, 2016. Master’s thesis. Brno University of Technology, Faculty of Informa- tion Technology.
    [Show full text]
  • Bittorrent (Protocol) 1 Bittorrent (Protocol)
    BitTorrent (protocol) 1 BitTorrent (protocol) BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data over the Internet. BitTorrent is one of the most common protocols for transferring large files and it has been estimated that peer-to-peer networks collectively have accounted for roughly 43% to 70% of all Internet traffic (depending on geographical location) as of February 2009.[1] Programmer Bram Cohen designed the protocol in April 2001 and released a first implementation on July 2, 2001.[2] It is now maintained by Cohen's company BitTorrent, Inc. There are numerous BitTorrent clients available for a variety of computing platforms. As of January 2012 BitTorrent has 150 million active users according to BitTorrent Inc.. Based on this the total number of monthly BitTorrent users can be estimated at more than a quarter billion.[3] At any given instant of time BitTorrent has, on average, more active users than YouTube and Facebook combined. (This refers to the number of active users at any instant and not to the total number of unique users.)[4][5] Description The BitTorrent protocol can be used to reduce the server and network impact of distributing large files. Rather than downloading a file from a single source server, the BitTorrent protocol allows users to join a "swarm" of hosts to download and upload from each other simultaneously. The protocol is an alternative to the older single source, multiple mirror sources technique for distributing data, and can work over networks with lower bandwidth so many small computers, like mobile phones, are able to efficiently distribute files to many recipients.
    [Show full text]
  • Bittorrent - Wikipedia, the Free Encyclopedia 11/12/13 Create Account Log In
    BitTorrent - Wikipedia, the free encyclopedia 11/12/13 Create account Log in Article Talk Read Edit View history BitTorrent From Wikipedia, the free encyclopedia Main page Contents This article is about the file sharing protocol. For other uses, see BitTorrent (disambiguation). Featured content This article may be too technical for most readers to Current events understand. Please help improve this article to make it Random article understandable to non-experts, without removing the technical Donate to Wikipedia details. The talk page may contain suggestions. (May 2011) Wikimedia Shop BitTorrent is a protocol supporting the practice of Part of a series on Interaction peer-to-peer file sharing that is used to distribute large File sharing Help amounts of data over the Internet. BitTorrent is one of About Wikipedia the most common protocols for transferring large files, Community portal and peer-to-peer networks have been estimated to Recent changes collectively account for approximately 43% to 70% of Technologies Contact page all Internet traffic (depending on geographical location) Peer to peer · BitTorrent­ · Tools as of February 2009.[1] In November 2004, BitTorrent ­File hosting services was responsible for 35% of all Internet traffic.[2] As of Development and societal aspects Print/export February 2013, BitTorrent was responsible for 3.35% Timeline · Legal­ aspects Non-public file sharing Languages of all worldwide bandwidth, more than half of the 6% Anonymous P2P Friend-to-friend­ Darknet­ of total bandwidth dedicated to file sharing.[3] · · · Private P2P­ العربية Azərbaycanca Programmer Bram Cohen, a former University at File sharing networks and services [4] Беларуская Buffalo graduate student in Computer Science, Gnutella / Gnutella2 (G2) · FastTrack­ · Български designed the protocol in April 2001 and released the ­eDonkey · Direct­ Connect · Mininova­ · ­isoHunt The­ Pirate Bay ­Bitcoin Bosanski first available version on July 2, 2001,[5] and the final · · [6] By country or region Català version in 2008.
    [Show full text]
  • ROB WALCH [email protected] @ My Background
    YES - That Marketing Advice for your Podcast is BS ROB WALCH [email protected] @ My Background 2004 2006 Apr 2007 Aug 2007 Porters The Feed KC Startup 411 2016 Podcast @podcast411 How Will Your Podcast Benefit Your Listeners? @podcast411 How Will Your Podcast Benefit Your Listeners? @podcast411 Is Apple Podcasts Still #1??? @podcast411 YES!!!!!!! @podcast411 Aggregator Apps - July 2021 % Share Podcast Platform / Destination between 0.20% & 56.6% Apple Podcasts / iTunes 0.02%- in order: 15.02% Spotify PodcastRepublic Gaana 2.61% Google Podcasts TuneIn Radio 2.06% Overcast (iOS) Pandora 1.42% Podcast Addict (Android) Downcast Deezer 1.21% CastBox Acast 1.12% PocketCast AntennaPod 1.15% Stitcher Castro Podimo 0.97% iHeartRadio RSSRadio 0.95% Podbean Podkicker 0.50% PodNods iCatcher 0.30% Amazon Music Luminary Himalaya 0.28% Player.FM Breaker 0.26% The Podcast App SmartSpeakers + Set Top = 0.30% @podcast411 PODCAST DESTINATIONS - JUL 21 Google Social Media Apple Podcasts Podcasts 70% 3% Aggregators Blogs 8% 1% 91% 15% ~2% 1% SPOTIFY Personal Apps Music First Destinations @podcast411 MYTH: The Podcasting Space is too Crowded ~+90k new shows per month??? Podcast Industry Insights courtesy of Daniel J. Lewis https://podcastindustryinsights.com, 7/30/21 @podcast411 MYTH: The Podcasting Space is too Crowded >500,000 - 1 and DONE Podcast Industry Insights courtesy of Daniel J. Lewis https://podcastindustryinsights.com, 7/30/21 @podcast411 MYTH: The Podcasting Space is too Crowded Active Podcasts = A show with a new episode released in the Millions last 90 days AND 10 or more episodes released. 322k = Active Blogs Podcasts ~2,350 : 1 Ratio 322k from 472 mil Tumblr blogs - Jan19 - Statista.
    [Show full text]