HP Sponsor Talk

Total Page:16

File Type:pdf, Size:1020Kb

HP Sponsor Talk Mice, Elephants, Turtles Dimes & Dollars HPC & Big Data Marc Hamilton Hyperscale Business Unit HP Enterprise Group March, 2013 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Big Data is Accelerating Innovation & Change 347,000 kaggle Pandora Music tweets SolidFire Scribd. SmugMug iHandy Amazon Finance SuperCam salesforce.com 23,148 apps AppFog Travel Joyent Plex Systems Snapfish Urban downloaded DCC Google Xactly Facebook Parse Product SAP eBay Dragon Diction PingMe GoGrid LinkedIn Reference Configurator CCC HP CRM Hosting.com UPS Mobile Atlassian Tata Communications Bromium 400,710 ads Bills of Material buzzd Lifestyle Engineering Ariba NetReach Amazon Web Services SCM Splunk requests New technology Inventory Quickbooks Scanner Pro Sport NetDocuments Zoho LimeLight Quality Control ScaleXtreme EMC box.net Alterian Foursquare Pinterest Burroughs HCM Datapipe Qvidian Taleo Education Hitachi Cost Management OpenText Hyland every IBM Manufacturing Projects access methods MRM Workscape Sage NetSuite Mobile, Social, Unisys Order Entry Mainframe Client/Server The Internet Big Data & The Cloud 60 seconds Cash Management CyberShift PaperHost DocuSign CloudSigma Bull Yandex Baidu NEC ERP Hootsuite Games HCM Xerox Yahoo! YouTube Time and Expense Serif nebula Fijitsu Microsoft HP ePrint Atlassian Fixed Assets Workbrain Costing Accounts OpSource SLI Systems Zynga Navigation 2000 lyrics played Receivable Avid Mixi Elemica iSchedule Workday cloudability Billing ADP VirtualEdge • Change how technology is Yandex Photo & Video on Tunewiki Payroll SCM Activity PLM Corel Khan Academy Twitter Heroku Zillabyte Yammer Training Management Adobe CyberShift Renren Entertainment Sales tracking & Yahoo SuccessFactors Viber consumed & value it can bring Time & Rostering Kinaxis Marketing Microsoft News Atlassian Answers.com Attendance SugarCRM 1,500 pings Service Saba BrainPOP RightScale Social Networking Commissions PPM Sonar6 Quadrem CYworld sent on PingMe Database Kenexa Sonar6 MobileFrame.com Claim Processing Business Jive Software Saba myHomework • Open up new business models Softscape NetSuite Tumblr. Qzone Data Warehousing Intacct Toggl Fring Amazon dotCloud Cornerstone onDemand Exact Online 34,597 people Cookie Doodle Xing Mozy FinancialForce.com New Relic Softscape MailChimp PingMe are using Zinio Utilities Zynga Ah! Fasion Girl • Remove current inhibitors & IntraLinks Volusion Associatedcontent BeyondCore SmugMug MobilieIron 208,333 minutes Fed Ex Mobile Productivity unleash power of innovation Rackspace Flickr Twitter Angry Birds played Paint.NET TripIt 2 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Anywhere, anytime demand increases opportunities Hyperscale workloads growing significantly faster than overall market $45.0 Hyperscale to be 35% of x86 market $40.0 HPC, $6.4 $35.0 HPC, $5.2 27% Hosting, $2.4 Hosting, $3.3 35% Customer demand for content $30.0 SP, $2.8 SP, $4.2 Device proliferation $25.0 Competitive edge $20.0 Enterprise $15.0 Enterprise Driving the need for new and $28.0 $26.0 purpose built products! $10.0 $5.0 $0.0 2012 2015 3 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Mice, Elephants, and Turtles © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Mice and Elephants • The elephant in the room • Not all big data comes from mouse clicks • Hadoop becoming ubiquitous - good or bad? • Is storing 3 full copies of data really efficient or just easy? • Are Hadoop management tools ready for the enterprise? 5 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Breaking The Application Triangle • As more and more data is stored in Users select widely HDFS, disruptive innovation becomes available platforms difficult – you can’t break the APIs to solve their • So how can you drive disruptive business problems innovation? Vendors pursue Hadoop originally sustaining innovation ran on commonly of 2-socket x86 available 2-socket systems for Hadoop x86 systems 6 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. SSDs are Turtles • SSDs usage with Hadoop growing • Disk protocols too slow for SSD/Flash • Better hardware is available (PCIeGen3, etc.) • Flash nearing end of life just in time for new NVRAM • Now its time to address the software bottlenecks • HDFS on top, but what’s inside? 7 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Insight Cluster Management Utility 8 8 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Dimes and Dollars © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Dimes and Dollars Are HPC compute nodes getting too powerful for big data use? • Relative performance of mobile processors increasing quicker than server processors • Typical HPC compute node today, 300 watts, $300/year power • Nvidia Tegra 5 mobile processor will be the size of a dime, run CUDA and OpenGL apps • 60 5-watt mobile processors = $300/year power 10 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Relative Performance Good Xeon performance ratios 100.0 73.0 Good ARM /Atom 26.8 29.3 performance ratios 22.2 23.1 25.0 25.4 18.2 15.7 17.2 11.9 10.0 10.5 11.2 4.9 1.7 1.5 1.0 Relative perforamance Relative perforamance (Higher better) is 0.1 11 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Relative Performance per Watt 100.00 29.92 12.00 10.00 Good ARM /Atom performance/ watt ratios 4.39 3.20 2.50 1.00 1.02 0.66 0.70 Relative performance/watt (higher is better) is (higher performance/watt Relative 0.43 0.16 12 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 0.10 2H’13 HP Projections: big leap in mobile performance 12.16 10.00 8.93 5.56 4.55 4.63 5.08 4.44 3.14 3.20 3.44 2.63 2.98 1.25 1.00 1.15 0.10 Relative Relative performance (higher is better) 0.01 13 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Project Moonshot © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Project Moonshot: A new era of extreme scale computing Redefining server infrastructure for rapid application optimization Application-driven designs Project Moonshot Space Energy Costs • 1,000s of servers per rack • Workload - tuned servers • Federated infrastructure scales seamlessly with additional servers Device agnostic architecture scales from extreme low energy CPUs to high performance GPGPUs 15 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Supercomputers That Reuse Energy? DOE’s National Renewable Energy Lab purchases $10M HP Supercomputer - New ProLiant server platform will delivery 1 Pflop of Intel IvyBridge and Xeon Phi - http://www.nrel.gov/news/press/2012/1985.html - Power and warm water cooling system co-designed to work with NREL’s new $100M Energy Systems Integration Facility (pictured below) - Waste heat used to heat office space & melt snow in winter 16 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 16 National Renewable Energy Lab 200 TF Linpack – Feb 27, 2013 17 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Expanding the purpose-built portfolio for big data High-end nodes ProLiant SL Core Customer specific Accelerators Big Data SL270 SL250 SL230 High-efficiency computing SL2500 18 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained hereinSolutions is subject to change without notice. Thank you © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. .
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • The Korean Internet Freak Community and Its Cultural Politics, 2002–2011
    The Korean Internet Freak Community and Its Cultural Politics, 2002–2011 by Sunyoung Yang A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Anthropology University of Toronto © Copyright by Sunyoung Yang Year of 2015 The Korean Internet Freak Community and Its Cultural Politics, 2002–2011 Sunyoung Yang Doctor of Philosophy Department of Anthropology University of Toronto 2015 Abstract In this dissertation I will shed light on the interwoven process between Internet development and neoliberalization in South Korea, and I will also examine the formation of new subjectivities of Internet users who are also becoming neoliberal subjects. In particular, I examine the culture of the South Korean Internet freak community of DCinside.com and the phenomenon I have dubbed “loser aesthetics.” Throughout the dissertation, I elaborate on the meaning-making process of self-reflexive mockery including the labels “Internet freak” and “surplus (human)” and gender politics based on sexuality focusing on gender ambiguous characters, called Nunhwa, as a means of collective identity-making, and I explore the exploitation of unpaid immaterial labor through a collective project making a review book of a TV drama Painter of the Wind. The youth of South Korea emerge as the backbone of these creative endeavors as they try to find their place in a precarious labor market that has changed so rapidly since the 1990s that only the very best succeed, leaving a large group of disenfranchised and disillusioned youth. I go on to explore the impact of late industrialization and the Asian financial crisis, and the nationalistic desire not be left behind in the age of informatization, but to be ahead of the curve.
    [Show full text]
  • Obtaining and Using Evidence from Social Networking Sites
    U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks.
    [Show full text]
  • Social Media: Recommendations to Optimize Social Media for Situational Awareness and Risk Mitigation
    NOTRE DAME COLLEGE, OHIO MASTER’S CAPSTONE Social Media: Recommendations to Optimize Social Media for Situational Awareness and Risk Mitigation TO: THE NORTHEAST OHIO REGIONAL FUSION CENTER Work of Stephanie Barnes, Akif Eren, Brian Lemasters, Izolda Masic, Amy Poklar, Patrick Thomas, Brandon Vallee Mentors: Dr. Kelley Cronin and Dr. John Hatzadony Master of Arts in Security Policy Studies April 26, 2013 Social Media: Recommendations to Optimize Social Media for Situational Awareness and Risk Mitigation Purpose The purpose of this project is to provide recommendations to the Northeast Ohio Regional Fusion Center (NEORFC) on how to optimize social media for risk mitigation and situational awareness. In order to provide relevant and meaningful recommendations, and to provide detailed reference information, this project will complete the following: 1. Review the history of social media to ensure knowledge of the development and identify future trends. 2. Research how social media is utilized before, during, and after disasters, emergencies, and attacks. 3. Document a diverse group of case studies that will cover a variety of events, locations, and social media applications. 4. Identify trends in social media, review volume challenges, aggregation software, and several types of language barriers. 5. Identify best practices related to the dissemination of information for situational awareness during and after an event. 6. Provide recommendations for utilization and application of these identified challenges. 7. Provide recommendations based on identified best practices in homeland security intelligence analysis, collection, and dissemination using social media. NDC Capstone: April 2013 1 Social Media: Recommendations to Optimize Social Media for Situational Awareness and Risk Mitigation Table of Contents: 1.
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]
  • 19 the Influence of Culture on the Motivation
    Beykoz Akademi Dergisi, 2021; 9(1), 19-33 ARAŞTIRMA MAKALESİ Gönderim tarihi: 17.10.2020 Kabul tarihi: 23.02.2021 DOI: 10.14514/BYK.m.26515393.2021.9/1.19-33 THE INFLUENCE OF CULTURE ON THE MOTIVATION FOR THE USE OF SOCIAL MEDIA: A COMPARATIVE STUDY OF TURKISH AND GERMAN HIGH SCHOOL STUDENTS Selçuk KIRAN1, Fatma Göksu DEMİRÇEVİREN2 Abstract This study is an attempt to investigate how cultural contexts determine the use of communication technology by examining the motivations and patterns of using SNS, mainly “Instagram” among teenagers from Turkey and Germany, through a survey. The survey data of total 340 participants were analyzed by using reliability analysis, t-test and Chi-square test. According to the results of the research, Turkish students use social-media with significantly higher motivations of Seeking-Friends and for Entertainment while German students had greater motivation for Seeking-Information. Turkish students have been using Instagram for a longer time and following more accounts in Instagram than German students. While Turkish students use Instagram, LinkedIn and Twitter more, German students use Whatsapp and Tiktok. While Turkish students follow Kim-Kardashian and Kendall-Jenner more, German students follow Cristiano-Ronaldo and Neymar significantly. Turkish students share their posts in Instagram- Stories and use their accounts as private more than expected compared to German students. Turkish students use their real names and spend more time daily in Instagram compared to German students. Keywords: Social Media, Social Networking Sites, Cultural Difference, Instagram JEL Classification: D80, M31, L8 KÜLTÜRÜN SOSYAL MEDYA KULLANIM MOTİVASYONU ÜZERİNDEKI ETKİSİ: TÜRK VE ALMAN LİSE ÖĞRENCİLERİ İÇİN KARŞILAŞTIRMALI BİR ÇALIŞMA Öz Bu çalışma, Türkiye ve Almanya'daki gençlerin sosyal paylaşım sitelerini, özellikle “Instagram” kullanma nedenlerini ve kalıplarını bir anket yoluyla inceleyerek, kültürel özelliklerin iletişim teknolojisinin kullanımını nasıl etkilediğini incelemeyi amaçlamaktadır.
    [Show full text]
  • E-Commerce in South Korea: a Canadian Perspective
    E-COMMERCE IN SOUTH KOREA: A CANADIAN PERSPECTIVE REPORT PREPARED BY: Theresa Eriksson, Luleå University of Technology, Sweden Kristin Matheson, Luleå University of Technology, Sweden Dr. Leyland Pitt, Professor of Marketing, Beedie School of Business, Simon Fraser University Dr. Kirk Plangger, King’s College, London, UK Dr. Karen Robson, University of Windsor 1 2 TABLE OF CONTENTS EXECUTIVE SUMMARY 4 INTRODUCTION 5 SOUTH KOREA: THE COUNTRY, THE ECONOMY 7 METHODOLOGY 8 THE SOUTH-KOREAN E-COMMERCE CONTEXT 9 Customer Context 9 The E-commerce Shopping process 11 Products and Brands 15 Online Behaviour 16 Shopping Events and Timing 20 Main Stakeholders 24 Technology and Infrastructure Landscape 27 For Canadian Firms Contemplating E-commerce in South Korea: 32 Marketing Considerations FUTURE OUTLOOK 40 CONCLUSION 41 CASE STUDIES 42 Case Study I: Yogiyo 42 Case Study II: Pinkfong and Baby Shark 46 APPENDIX 53 Digital Technology in South Korea and Canada — A Comparison of Digital Device Ownership, Digital Media Consumption, and Digital Behaviour. ABOUT THE AUTHORS 68 3 EXECUTIVE SUMMARY This report focuses on e-commerce opportunities for Canadian firms in South Korea, one of the world’s most connected markets. Korea is not for the faint-hearted: consumers are very sophisticated and markets are very competitive. Nevertheless, for Canadian firms with excellent offerings and a willingness to provide excellent service, coupled with patience and an ability to build good relationships at all levels, Korea offers significant opportunities. The report proceeds as follows: First, it provides a broad overview of the nation of South Korea with particular focus on e-commerce and online connectivity in that country.
    [Show full text]
  • Cyclub Whitepaper EN
    In the market where social media based on photos and videos such as Facebook, Instagram, Twitter, YouTube, etc., has been prevalent, new voice-based social media has obtained popularity used by 1,000 people only in one year after it was launched, thus, it began to attract a lot of public attention. Living in the era where people easily feels tired of the video-based content a nd existing media methods as well as the rapid spread of COVID-19, celebrities started to connect at the same time and enjoy voice-based social media through the real-time streaming method with others of the same interest, and this effect has now r apidly spread. People are enthusiastic about voice-based social media, for the following reasons: In the sense that it allows people in various fields to communicate only with real-time “voices” based on the horizontal features; it eases psychological burden from the p erspective of users or content creators; the closed features permitting the entry only by invitation arises FOMO (Fear of Missi ng Out) to people; it allows multi-tasking while listening to the conversation because it belong to social media counting on voi ces only; it is not sensitive to “Like,” “Share” or “Follow” compared to other social networks, because its main purpose is in co nversation. However, the voice-based audio content encounters some limitations in the following aspects. It is difficult to carry out situat ion management when people break some community rules (regarding not making statements against the sensitive topics rel ated to the disadvantaged groups, women, third gender and colored people, as well as basic rules such as prohibition of abusi ve/offensive/obscene languages); It has weak search functions; It allows only real-time participation; It offers limited informa tion security.
    [Show full text]
  • Gilbert SHANG NDI Faculty of Social Sciences, Universidad De Los Andes Bogota, Colombia [email protected]
    Gilbert SHANG NDI Faculty of Social Sciences, Universidad de los Andes Bogota, Colombia [email protected] WRITING THE WALL, RIGHTING THE WORLD. EXPLORING THE DIONYSIAN DIMENSIONS OF WALL GRAFFITI FROM THE AGORA TO FACEBOOK Recommended Citation: Shang Ndi, Gilbert. “Writing the Wall, Righting the World. Exploring the Dionysian Dimensions of Wall Graffiti from the Agora to Facebook.” Metacritic Journal for Comparative Studies and Theory 4.2 (2018): https://doi.org/10.24193/mjcst.2018.6.07 Abstract: The turn of the current century has witnessed the re-negotiation of materiality and the growing ascendancy of the virtual, the immaterial over the real or tangible. Though it would be presumptuous to claim that the virtual has totally assumed control over the real, it can be asserted that the figure of the wall as a transfusion between the real/virtual and the self/other has emerged between the two. Based on constructions of textuality articulated by theorists such as Roland Barthes and Friedrich Nietzsche, and a pastiche format that mimics the functionality of the wall of scription, this article brings together multiple enactments of mural scriptions that include the concrete, textual, textile, vegetative and the virtual in order to articulate the Dionysian property of wall-effects. It traces successive actualisations of the wall, analysing how the virtual Facebook wall assimilates and re-dynamizes the traits of the tangible walls through an array of intertextual/inter-medial modalities. Keywords: wall, graffiti, scription, wall-effects, abjection. Introduction The turn of the twenty-first century has witnessed the re-negotiation of materiality and the growing ascendancy of the virtual or immaterial over the real or tangible.
    [Show full text]
  • Authenticating the Fake: Linguistic Resources of Aegyo and Its Media Assessments
    Authenticating the fake: Linguistic resources of aegyo and its media assessments Kyuwon Moon Stanford University Abstract Cuteness has emerged among young women in East Asia as a way of performing youthfulness and freedom from the constraints of the traditional wise-mother ideal. However, it simultaneously limits women’s social independence in virtue of their docility and subordination. This paper focuses on a kind of cute, feminine act/attitude in South Korea known as aegyo, in which a manipulated cute act is performed to please others. Media create instantiations of aegyo, establishing the performance of “childish aegyo” as a gendered practice, and magnifying its exaggeratedly cute aspects. This childish style, with resources from immature language, has been enregistered as a new, authentic style of young women, and is featured in media events that police its form as they reproduce its role in the normative gender order. Introduction In the “Woman News” skit of the July 7, 2012 episode of SNL Korea, a Korean version of the U.S. late night sketch comedy show Saturday Night Live, the featured actress introduces a “woman’s speech translator machine,” which translates women’s words to “normal, comprehensible” words for men. The actress says to the machine, “Wow, this bag is really pretty,” which is immediately translated to “Buy me (this bag)” in an unnatural sounding automatic voice by the machine. She then says, “Honey, I am hungry,” and the machine again translates it as, “Buy me (food)” in the same automatic voice. Then, the actress says, “Oppa“ (a term of address for an older male) with an extremely elongated last syllable and wiggling tone, and in return the machine produces a high-pitched, girly, exaggerated voice saying, “Buy me (food),” also using the same elongation and the tonal contour as in the actress’s voice.
    [Show full text]
  • A History of Social Media
    2 A HISTORY OF SOCIAL MEDIA 02_KOZINETS_3E_CH_02.indd 33 25/09/2019 4:32:13 PM CHAPTER OVERVIEW This chapter and the next will explore the history of social media and cultural approaches to its study. For our purposes, the history of social media can be split into three rough-hewn temporal divisions or ages: the Age of Electronic Communications (late 1960s to early 1990s), the Age of Virtual Community (early 1990s to early 2000s), and the Age of Social Media (early 2000s to date). This chapter examines the first two ages. Beginning with the Arpanet and the early years of (mostly corpo- rate) networked communications, our history takes us into the world of private American online services such as CompuServe, Prodigy, and GEnie that rose to prominence in the 1980s. We also explore the internationalization of online services that happened with the publicly- owned European organizations such as Minitel in France. From there, we can see how the growth and richness of participation on the Usenet system helped inspire the work of early ethnographers of the Internet. As well, the Bulletin Board System was another popular and similar form of connection that proved amenable to an ethnographic approach. The research intensified and developed through the 1990s as the next age, the Age of Virtual Community, advanced. Corporate and news sites like Amazon, Netflix, TripAdvisor, and Salon.com all became recogniz- able hosts for peer-to-peer contact and conversation. In business and academia, a growing emphasis on ‘community’ began to hold sway, with the conception of ‘virtual community’ crystallizing the tendency.
    [Show full text]
  • Valdez Paez Et Al-11.1
    Peer-Reviewed Article © Journal of International Students Volume 11, Issue 1 (2021), pp. 156-175 ISSN: 2162-3104 (Print), 2166-3750 (Online) doi: 10.32674/jis.v11i1.1377 ojed.org/jis Helping International Students Identify Themselves: Social Media Usage and Organizational Attachment Gustavo Valdez Paez Ning Hou James A. Tan Zhan Wang St. Cloud State University Jing Hua Troy University ABSTRACT The relationship between social media usage and personality has received increased scrutiny recently. The current study studies international students’ organizational attachment through the exploration of their personality and usage of university social media. Participants were 51 international students from a Midwest State University and 49 domestic (U.S.) students for comparison purposes. Results showed some differences in the structure of personality, level of social media usage, and level of organizational attachment comparing international students and domestic students. Results also supported the complementary purpose of using social media for international students, where agreeableness and openness to experience are negatively associated with social media usage. Moreover, the relationship was stronger when students’ English proficiency is lower. An overall model demonstrated the relationship among international students’ personalities, university social media usage, and organizational attachment. Keywords: Big Five Personality, organizational attachment, social media usage 156 Journal of International Students INTRODUCTION Global academic
    [Show full text]