S.Tramp Et Al. / an Architecture of a Distributed Semantic Social Network

Total Page:16

File Type:pdf, Size:1020Kb

S.Tramp Et Al. / an Architecture of a Distributed Semantic Social Network Semantic Web 1 (2012) 1–16 1 IOS Press An Architecture of a Distributed Semantic Social Network Sebastian Tramp a;∗, Philipp Frischmuth a, Timofey Ermilov a, Saeedeh Shekarpour a and Sören Auer a a Universität Leipzig, Institut für Informatik, AKSW, Postfach 100920, D-04009 Leipzig, Germany E-mail: {lastname}@informatik.uni-leipzig.de Abstract. Online social networking has become one of the most popular services on the Web. However, current social networks are like walled gardens in which users do not have full control over their data, are bound to specific usage terms of the social network operator and suffer from a lock-in effect due to the lack of interoperability and standards compliance between social networks. In this paper we propose an architecture for an open, distributed social network, which is built solely on Semantic Web standards and emerging best practices. Our architecture combines vocabularies and protocols such as WebID, FOAF, Se- mantic Pingback and PubSubHubbub into a coherent distributed semantic social network, which is capable to provide all crucial functionalities known from centralized social networks. We present our reference implementation, which utilizes the OntoWiki application framework and take this framework as the basis for an extensive evaluation. Our results show that a distributed social network is feasible, while it also avoids the limitations of centralized solutions. Keywords: Semantic Social Web, Architecture, Evaluation, Distributed Social Networks, WebID, Semantic Pingback 1. Introduction platform or information will diverge. Since there are only a few large social networking players, the Web Online social networking has become one of the also loses its distributed nature. According to a recent most popular service on the Web. Especially Facebook comScore study1, Facebook usage times already out- with its 600M+ million users creates a web inside the number traditional Web usage by factor two and this Web. Drawing on the metaphor of islands, Facebook divergence is continuing to increase. is becoming more like a continent. However, users are We argue that social networking must be distributed locked up on this continent with hardly any opportu- and users should be empowered to regain control over nity to communicate easily with users on other islands their data. The currently vast oceans between social and continents or even to relocate trans-continentally. networking continents and islands should be bridged Users are bound to a certain platform and hardly have by high-speed connections allowing data and users to the chance to migrate easily to another social network- travel easily and quickly between these places. In fact, ing platform if they want to preserve their connections. we envision the currently few social networking conti- Once users have published their personal information nents to be complemented by a large number of smaller within a social network, they often also lose control islands with a tight network of bridges and ferry con- over the data they own, since it is stored on a single nections between them. company’s servers. Interoperability between platforms In this paper we describe the main technological is very rudimentary and largely limited to proprietary ingredients for a distributed semantic social network APIs. In order to keep data up-to-date on multiple plat- (DSSN) as well as their interplay. The semantic rep- forms, users have to modify the data on every single resentation of personal information is facilitated by a *Corresponding author. 1http://allthingsd.com/20110623/ WebID: http://sebastian.tramp.name the-web-is-shrinking-now-what/ 1570-0844/12/$27.50 c 2012 – IOS Press and the authors. All rights reserved 2 S.Tramp et al. / An Architecture of a Distributed Semantic Social Network WebID profile. The WebID protocol allows the use of Service Decoupling. A second fundamental design a WebID profile for authentication and access control principle is the decoupling of user data from services purposes. Semantic Pingback facilitates the first con- as well as applications [8]. It ensures that users of the tact between users of the social network and provides network are able to choose between different services a method for communication about resources (such and applications. In addition, this principle helps users as images, status messages, comments, activities) on of the DSSN to distinguish between their own data, the social network. Finally, PubSubHubbub-based sub- which they share with and license to other people and scription services allow obtaining near-instant notifica- services, and foreign data, which they create by using these services and which they do not own. tions of specific information as WebID profile change sets and activity streams from people in one’s so- Protocol Minimalism. The main task for social net- cial network. Combined these standards, protocols and working protocols is to communicate RDF triples be- technologies provide all necessary ingredients to re- tween DSSN nodes, not to enforce a specific work flow alize a distributed social network having all the cru- nor an exact interpretation of the data. This constraint cial social networking features provided by centralized ensures the extensibility of the data model and keeps ones. the overall architecture clean. This article is structured as follows: We present our 2.2. Data Layer reference architecture of a distributed social semantic network in Section 2. Our implementation based on The data layer comprises two main data structures: the OntoWiki framework is demonstrated in Section 3, resources for the description of static entities and feeds while the evaluation results of our approach are dis- for the representation and publishing of events and ac- cussed in Section 4. Finally, we give an overview of re- tivities. lated work in Section 5 and conclude with an outlook 2.2.1. Resources on future work in Section 6. We distinguish between three main categories of DSSN resources: WebIDs for persons as well as appli- cations, data artefacts and media artefacts. The prop- 2. Architecture of a Distributed Semantic Social erties, conditions and roles in the network of these re- sources are described in the next paragraphs. Network WebID [17]2 is a best practice recently conceived in In this section we describe the DSSN reference ar- order to simplify the creation of a digital ID for end chitecture. After introducing a few design principles users. Since its focus lies on simplicity, the require- ments for a WebID profile are minimal. In essence, on which the architecture is based, we present its dif- a WebID profile is a de-referenceable RDF document ferent layers, i.e. the data, protocol, service and appli- (possibly even an RDFa-enriched HTML page) de- cation layers. The overall architecture is depicted in scribing its owner3. That is, a WebID profile con- Figure 1. tains RDF triples which have the IRI identifying the owner as subject. The description of the owner can be 2.1. Basic Design Principles performed in any (mix of) suitable vocabulary (-ies), but FOAF [6] has emerged as the ‘industry standard’ Our DSSN architecture is based on the following for that purpose. An example WebID profile compris- three design principles. ing some personal information (lines 8-12) and two rel:worksWith4 links to co-workers (lines 6-7) is Linked Data. The main protocol for data publishing, shown in Listing 1. retrieval and integration is based on the Linked Data principles [3]. All of the information contained in the 2The latest spec is available at http://webid.info/spec/. DSSN is represented according to the RDF paradigm, 3The usage of an IRI with a fragment identifier allows the indi- made de-referencable and interlinked with other re- rect identification of an owner by reference to the (FOAF) profile sources. This principle facilitates heterogeneity and document. 4Taken from RELATIONSHIP: A vocabulary for describing enables the distribution of data and services on the relationships between people at http://purl.org/vocab/ Web. relationship. S.Tramp et al. / An Architecture of a Distributed Semantic Social Network 3 Profile Bookmark Foto ''' Blog Manager Collection Sharing Application Layer + ping ) create update 5 search push subscribe - * delegeate access to Ping Update Search Push , Service Layer + announce ( create update 5 index ( announce - read access #ebI s Activity History Streams Feeds Data & Media announce Artefacts ( Resources Feeds Data Layer Fig. 1. Architecture of a Distributed Semantic Social Network (without protocol layer): (1) Resources announce services and feeds, feeds announce services – in particular a push service. (2) Applications initiate ping requests to spin the Linked Data Network. (3) Applications subscribe to feeds on push services and receive instant notifications on updates. (4) Update services are able to modify resources and feeds (e.g. on demand of an application). (5) Personal and global search services can index resources and are used by applications. (6) Access to resources and services can be delegated to applications by a WebIDs, i.e. the application can act in the name of the WebID owner. (7) The majority of all access operations is executed through standard web requests. Apart from the main focus on representing user pro- parts of the profile data and can add or change some files, our architecture extends the WebID concept by of the profile information, e.g. create activities or cre- facilitating two additional tasks: service discovery and ate and link images. Applications on the DSSN are access delegation. also identified by using WebID profiles, but are not Service discovery is used to equip a WebID with re- described as a person but as an application. They can lations to trusted services which have to be used with act on behalf of a person but rely on delegated access that WebID. The usage of the WebID itself ensures rights for such an activity. This process is described in that an agent can trust this service in the same way as Section 2.3.1.
Recommended publications
  • A Longitudinal Study of Follow Predictors on Twitter C.J
    A Longitudinal Study of Follow Predictors on Twitter C.J. Hutto Sarita Yardi Eric Gilbert School of Interactive Computing School of Information School of Interactive Computing Georgia Institute of Technology University of Michigan Georgia Institute of Technology [email protected] [email protected] [email protected] ABSTRACT ness; and profile completeness [30]. We also assessed nu- Follower count is important to Twitter users: it can indicate merous attributes specific to the content of users’ tweets, popularity and prestige. Yet, holistically, little is understood such as: propensity to express positive versus negative sen- about what factors – like social behavior, message content, timent [26,37]; topical focus [40]; proportions of tweets and network structure – lead to more followers. Such in- with “meformer” content versus informational content [33]; formation could help technologists design and build tools frequency of others “retweeting” a user’s content [5]; lin- that help users grow their audiences. In this paper, we study guistic sophistication (reading difficulty) of tweets; and 507 Twitter users and a half-million of their tweets over 15 hashtag usage. Finally, we evaluated the impact of users’ months. Marrying a longitudinal approach with a negative evolving social network structure, collecting snapshots of binomial auto-regression model, we find that variables for their friends and followers every three months for fifteen message content, social behavior, and network structure should be given equal consideration when predicting link months. With this, we can evaluate the effects of network formations on Twitter. To our knowledge, this is the first status, reciprocity [18], and common network neighbors. longitudinal study of follow predictors, and the first to show Our variables were selected from prominent theoretical that the relative contributions of social behavior and mes- constructs bridging social science, linguistics, computer sage content are just as impactful as factors related to social mediated communications, and network theory.
    [Show full text]
  • Marketing and Communications for Artists Boost Your Social Media Presence
    MARKETING AND COMMUNICATIONS FOR ARTISTS BOOST YOUR SOCIAL MEDIA PRESENCE QUESTIONS FOR KIANGA ELLIS: INTERNET & SOCIAL MEDIA In 2012, social media remains an evolving terrain in which artists and organizations must determine which platforms, levels of participation, and tracking methods are most effective and sustainable for their own needs. To inform this process, LMCC invited six artists and arts professionals effectively using social media to share their approaches, successes, and lessons learned. LOWER MANHATTAN CULTURAL COUNCIL (LMCC): Briefly describe your work as an artist and any other roles or affiliations you have as an arts professional. KIANGA ELLIS (KE): Following a legal career on Wall Street in derivatives and commodities sales and trading, I have spent the past few years as a consultant and producer of art projects. My expertise is in patron and audience development, business strategy and communications, with a special focus on social media and Internet marketing. I have worked with internationally recognized institutions such as The Museum of Modern Art, The Metropolitan Museum of Art, Sotheby’s, SITE Santa Fe, and numerous galleries and international art fairs. I am a published author and invited speaker on the topic of how the Internet is changing the business of art. In 2011, after several months meeting with artists in their studios and recording videos of our conversations, I began exhibiting and selling the work of emerging and international artists through Kianga Ellis Projects, an exhibition program that hosts conversations about the studio practice and work of invited contemporary artists. I launched the project in Santa Fe, New Mexico ⎯Kianga Ellis Projects is now located in an artist loft building in Bedford Stuyvesant, Brooklyn.
    [Show full text]
  • How Can Social Networking Help Enhance My Business? Presented By
    How Can Social Networking Help Enhance My Business? Presented by: Women, Work & Community Sunrise County Economic Council Northern Maine Development Commission Maine Woods Consortium © 2011 Women, Work & Community Developed by: Erica Quin-Easter, Microenterprise Coordinator [email protected] (207) 764-0050 – Aroostook County center © 2011 Women, Work & Community Workshop Goals • Introduce you to social media applications you can use to expand your business marketing • Inspire you to integrate social media into your marketing plan • Help you develop next steps for using social media to stay informed and connect with customers • Minimal lingo, maximum empowerment © 2011 Women, Work & Community What This Workshop Is Not: • Click-by-click “how-to” for specific applications – Broad overview will introduce you to social media options and successful models – Individual assistance available 1-on-1 • Specific advice for your situation – General questions and personal experiences welcome! – Specific questions may be referred for individual response and 1-on-1 support © 2011 Women, Work & Community Introductions • Your Name, Town, and Business • Current uses of social media? (business or personal) • Goals for this workshop © 2011 Women, Work & Community A World Online: Basics Before Social Media • Website – Clean, coherent, depth of content • Maps, Places, other directory listings – Google, Yahoo, Bing, etc. • Email marketing – Constant Contact ($) or your own email (<500) • Business phone and address – Can people find and contact you? ©
    [Show full text]
  • Social Media
    Social Media Social media is media designed to be distributed through social interaction using Internet and web-based technologies. Social media use is said to be the defining factor in the idea that the current period in time will be defined as the “Attention Age.” Wikipedia lists the following information and examples of social media: Social media can take many different forms, including Internet forums, weblogs, social blogs, wikis, podcasts, pictures, video, rating and bookmarking. Technologies include: blogs, picture-sharing, vlogs, wall-postings, email, instant messaging, music-sharing, crowdsourcing, and voice over IP, to name a few. Many of these social media services can be integrated via social network aggregation platforms like Mybloglog and Plaxo. Examples: Communication Blogs: Blogger, LiveJournal, Open Diary, TypePad, WordPress, Vox, ExpressionEngine, Xanga Micro-blogging / Presence applications: FMyLife, Jaiku, Plurk, Twitter, Tumblr, Posterous, Yammer Social networking: Bebo, Elgg, Facebook, Geni.com, Hi5, LinkedIn, MySpace, Ning, Orkut, Skyrock Social network aggregation: NutshellMail, FriendFeed Events: Upcoming, Eventful, Meetup.com Collaboration Wikis: Wikipedia, PBworks, Wetpaint Social bookmarking (or social tagging): Delicious, StumbleUpon, Google Reader, CiteULike Social news: Digg, Mixx, Reddit, NowPublic Opinion sites: epinions, Yelp Multimedia Photography and art sharing: deviantArt, Flickr, Photobucket, Picasa, SmugMug, Zooomr Video sharing: YouTube, Viddler, Vimeo, sevenload Livecasting: Ustream.tv, Justin.tv, Stickam, Skype Music and audio sharing: imeem, The Hype Machine, Last.fm, ccMixter, ShareTheMusic Reviews and opinions Product reviews: epinions.com, MouthShut.com Business reviews: Customer Lobby, yelp.com Community Q&A: Yahoo! Answers, WikiAnswers, Askville, Google Answers Entertainment Media and entertainment platforms: Cisco Eos Virtual worlds: Second Life, The Sims Online, Forterra Game sharing: Miniclip, Kongregate .
    [Show full text]
  • Comparing Tumblr and Posterous | 40Tech
    ABOUT ADVERTISE CONTACT US GUEST POST GUIDELINES EMAIL POSTS Android iOS Mac Windows Google Cloud Evernote Springpad Productivity Enter keywords... Follow Us POPULAR LATEST COMMENTS TAGS Comparing Tumblr and Springpad vs Pinte re st vs Eve rnote Posterous vs… Nobody? JUNE 16 , 20 11 BY KARMA 19 COMMENTS APRIL 12, 20 12 Hello there! If you are new here, please consider subscribing to the X Could Google Drive Be An Eve rnote RSS feed or following us on Twitter to receive site updates. Alte rnative ? APRIL 28 , 20 12 PDFmyURL.com What Chrome Apps Do You Actually Use ? [Re ade r Fe e dback] MAY 11, 20 12 How Many Unre ad Me ssage s Are in Your Inbox? MAY 28 , 20 12 Should This Android Love r Switch Back to iOS? MAY 13, 20 12 Today, 40Tech is pleased to present a guest post by Karma. You suave and debonaire 40Tech readers likely know all about microblogging. If you like the ease of sharing things through Facebook and Twitter but wish you could post longer Premium WP Hosting entries with more f ormatting, Tumblr or Posterous might be what you need. Alternatively, if Premium Hosting Tuned For Speed, you want to start a blog but have been overwhelmed by WordPress, Movable Type, or Reliability & Security. Shop Today www.wp e ng ine .co m Blogger – Tumblr and Posterous are a dream come true. Posting to both sites allows all the standard f eatures of a blog post: you can toggle between rich text and HTML, ITT Tech - Official Site customize your theme, split your entries into multiple pages and alter the f ormatting.
    [Show full text]
  • Use of Social Media Policy
    Bradley University College of Education and Health Science Department of Nursing (DON) Policy: Use of Social Media Policy Purpose: Nursing students need to recognize that they are contributing to the global image of nursing when they post to social networking sites. Even when nursing students intend for social media postings to be “private” the concept of privacy does not exist in social networking. Anything posted to a social media site is potentially open to public viewing creating potential unintended outcomes. Deleting content never removes the material from potential internet access. Nursing students must maintain strict adherence to standards of professionalism when posting to social media sites. Social media as a form of communication can be an effective way to promote nursing and have a positive effect on the lives of patients and their families. However, appropriate use of social media is essential to protect the student nurse and/or patients. Social media is defined as internet web-based platforms where individuals can generate content that creates a dialogue which is easily accessible to other users or often times open to public view. Social media platforms may include (but are not limited to) the following: Blogging – Blogger, LiveJournal, Xanga Instagram Microblogging – Dailybooth, Foursquare, Google Buzz, Posterous, Tumblr, Twitter Postcasting – Blubrry Snapchat Social Networking – Bebo, Facebook, Google+, LinkedIn, MySpace, Orkut Social News Sharing – Digg, Reddit Social Bookmarking/social tagging – Delicious, Diigo, Google Reader, StumbleUpon Video Hosting – Vimeo, YouTube Procedure: Privacy and Confidentiality Nursing students must maintain strict adherence to privacy and confidentiality standards and should be familiar with the Health Insurance Portability and Accountability Act (HIPAA), including, but not limited to, the HIPAA Privacy Rule (45 CFR Part 160 and Subparts A and E of Part 164).
    [Show full text]
  • Twitter Buys Mobile Blogging Startup Posterous 12 March 2012
    Twitter buys mobile blogging startup Posterous 12 March 2012 "The opportunities in front of Twitter are exciting," Posterous founder and chief executive Sachin Agarwal said in a message at the freshly-acquired San Francisco startup's website. "We couldn't be happier about bringing our team's expertise to a product that reaches hundreds of millions of users around the globe." Posterous Spaces will continue to operate with users of the firm's free application promised they would get plenty of notice of any changes to the Twitter on Monday announced that it has bought mobile service, according to Twitter. blogging startup Posterous and will put engineers behind the popular "lifestreaming" service to work on special (c) 2012 AFP projects. Twitter on Monday announced that it has bought mobile blogging startup Posterous and will put engineers behind the popular "lifestreaming" service to work on special projects. "This team has built an innovative product that makes sharing across the Web and mobile devices simple -- a goal we share," San Francisco-based Twitter said in a blog post. "Posterous engineers, product managers and others will join our teams working on several key initiatives that will make Twitter even better." Posterous launched in 2008 as a platform for blogging with an emphasis on letting people use smartphones to post pictures, videos, audio or other digital snippets and share them with groups in virtual "Spaces." The legions of Posterous fans have grown along with a "lifestreaming" trend in which moments are captured throughout the day and shared in online journals. 1 / 2 APA citation: Twitter buys mobile blogging startup Posterous (2012, March 12) retrieved 23 September 2021 from https://phys.org/news/2012-03-twitter-mobile-blogging-startup-posterous.html This document is subject to copyright.
    [Show full text]
  • Social Media White Paper
    Voloper Creations Inc., 3100 Steeles Avenue West Suite 400, Vaughan Ontario L4K 3R1. Canada Ph.: 905.660.1481 Fax: 905.660.6053 Toll Free: 1.888.252.4519 General Inquiries: [email protected] Sales: [email protected] Web: http://www.voloper.com All text is copyright 2009 Voloper Creations Inc. You may quote this document in whole or in part, online or in printed format, as long as proper attribution is given. Proper attribution should, at a minimum, include the following: Copyright 2009 Voloper Creations Inc. http://www.voloper.com 2 © 2009 Voloper Creations Inc. The Future of Social Media When Twitter Quitters Start Flocking Away A few short years ago top social media venues were sites like Friendster, MySpace, and Blogger. Today, Twitter, Facebook, YouTube, and LinkedIn are major social networking sites. In a couple more years that list might be replaced by a new suite of names. If you're committed to establishing a social media presence, it is important to keep an eye on developing trends. This eBook will take a look at some of the emerging social media venues. As well, we'll examine some of the smaller established "niche" platforms. A niche social media site has fewer users but, depending on one's business, a niche site might offer a better fit. Lifestreaming and Social Integration Wifi hotspots, netbooks, iPhones and other web enabled phones along with "micro blogging" sites like Twitter and Facebook are allowing the emergence of the "lifestreaming" phenomenon. Users have the ability at any moment, from almost any location, to immediately stream out the minutiae of their daily life: where they are, what they're about to eat, where they're shopping, etc.
    [Show full text]
  • Enrollment Management Marketing and New Media in the Era of Big Data
    Enrollment Management Marketing and New Media in the Era of Big Data AACRAO Webinar Jim Bouse University of Oregon March 31, 2015 What We Will Cover • Marketing and Communications • Viral and Personalized Video’s • Big Data • Social Media • CRM • Predictive Analytics • Mobile Call Me A Duck Videos helping expand brand awareness BYU New Spice Study Like a Scholar Perls of Knowledge Location, Location, Location Big Data “Linking data from disparate sources to answer questions you didn’t even know to ask.” Kent Kuo Oregon State, Dir. Ent. Computing Big Data “Sifting through the sea of information in search of trends and truths.” - Andrew Barbour, Campus Technology Big Data •The original V’s: Volume and Velocity •The 3 V’s •Volume •Velocity •Variety Graphic credit - Diya Soubra Big Data Graphic Credit: IBM Big Data • Many V’s • The most important V’s? • Volume • Veracity • Velocity • Visualization • Variety • Value • Variability • Veracity • Visualization • Value Photo credit: Slate.com Big Data: Analytics, Tracking, Prediction • Target pregnancy ads • RFID. Prism consortium. • Big Brother is here and he is us. Walmart infrared. Video tracking • Amazon to Facebook example “Free” internet. We are not the customer, we are the product. Social Media Perls of Knowledge The Insider (Check out Harvey’s eyes at the end) Listen and Monitor There are more channels than ever. • Facebook (1.23B +, 76% Mobile) • Google (24+ PB/day) • Twitter (500M+, 284M active) • College Confidential (Hobsons) • Instagram (200M) • YikYak • Google Maps, Apple iOS, review your campus Where are Teens on Social? Changes from January 2013 to February 2015 Teen Survey (sentiments) Gary Tan (founder of Posterous ), Jan.
    [Show full text]
  • Privacy Faqs
    Privacy Frequently Asked Questions (FAQs) NIH Privacy FAQ (June 2017) Table of Contents Privacy Act .................................................................................................................................................. 1 1. What is Privacy? ................................................................................................................................ 1 2. Why is Privacy Important? ................................................................................................................ 2 3. What are the different Types of Private Information?................................................................... 2 4. When can Social Security Numbers be Collected? ...................................................................... 4 5. Where do Privacy laws Originate? .................................................................................................. 4 6. Why have a Privacy Act? .................................................................................................................. 7 7. What does the Privacy Act do?........................................................................................................ 7 8. Who does the Privacy Act cover and not cover? .......................................................................... 7 9. When is NIH allowed to collect my information? ........................................................................... 8 10. When are a supervisor’s notes considered agency records? ..................................................
    [Show full text]
  • 7 Steps to a New Name
    01 DECIDE WHAT’S IMPORTANT FOR YOUR NAME! Before embarking on the naming selection process, you must get familiar with what is important in a name. Above all else, it must be memorable! There are all sorts of components that can make a name memorable. Single words, such as Subway, Bass & Apple are most memorable, even though they have nothing to do with the products they sell. Is it memorable? Is it easy to pronounce? A Is it short & succinct? Does it help tell a story? F Does it sound local or global? Can you protect it and B Which should it sound like? G trademark it? Is the .com available? Does it have any negative C H E If not available, is it for sale? connotations or associations? Can it be confused with another Does it adhere to your overall GD company in your category? I brand strategy? Does it work within languages other Can it serve as an “umbrella” for EI than English? J other brands or products? BRANDING FOR THE PEOPLE, CORP. ALL RIGHTS RESERVED. 01 03 DECIDE ON THE ROOT WORDS THAT YOU WOULD 02 PICK THE TYPES OF NAMES THAT WILL WORK LIKE IN YOUR NAME. FOR YOUR AUDIENCE Of the following 11 options, which style of name do you think will work for you and your audience? Pick a few, and then head to step three! A. REAL WORDS Names like this are quite simply words from the dictionary. They are sometimes descriptive of the company, and sometimes simply chosen because they are distinctive.
    [Show full text]
  • The Rape of Emergency Medicine
    The Rape of Emergency Medicine James Keaney, M.D. © 2004 by the American Academy of Emergency Medicine Table of Contents Prologue..............................................................................1 Chapter One: Steinerman................................................. 8 Chapter Two: The Contracts and Their Holders ....... 13 Chapter Three: Suits and Scrubs....................................25 Chapter Four: Origin of a Species..................................45 Chapter Five: Crips and Bloods......................................54 Chapter Six: The Anderson Syndrome .......................... 62 Chapter Seven: Caveat Emptor .......................................82 Chapter Eight: Cro-Magnon ......................................... 99 Chapter Nine: The Quiet Room.................................... 108 Chapter Ten: The Other Side of Midnight ................ 126 Chapter Eleven: A One Way Ticket to Palookaville . 142 Chapter Twelve: Utah ................................................... 154 Chapter Thirteen: Pinnacle, Inc. .................................167 Chapter Fourteen: The Missing Chapter .................... 187 Chapter Fifteen: Chart Wars ....................................... 188 Chapter Sixteen: Physicians of a Lesser God ............. 200 Chapter Seventeen: Mea Culpa..................................... 214 Chapter Eighteen: California Dreamin’......................220 Chapter Nineteen: The Empire Strikes Back...............237 Chapter Twenty: The One Hundred and Eighty Thousand Dollar Pair of Sunglasses ...........................246
    [Show full text]