Characterization of Friendfeed – a Web-Based Social Aggregation Service

Total Page:16

File Type:pdf, Size:1020Kb

Characterization of Friendfeed – a Web-Based Social Aggregation Service Characterization of FriendFeed – A Web-based Social Aggregation Service Trinabh Gupta Sanchit Garg Anirban Mahanti Niklas Carlsson Martin Arlitt IIT Delhi IIT Delhi NICTA University of Calgary HP Labs India India Australia Canada USA Abstract This paper studies the FriendFeed service, with emphasis on social aggregation properties and user activity patterns. Many Web users have accounts with multiple different social We are interested in understanding what types of services networking services. This scenario has prompted develop- users aggregate content from, who follows the aggregated ment of “social aggregation” services such as FriendFeed that content, and why. We are also interested in understanding aggregate the information available through various services. Using five weeks of activity of more than 100,000 Friend- the characteristics of the FriendFeed social network and how Feed users, we consider questions such as what types of ser- they relate to the characteristics of the social network ser- vices users aggregate content from, the relative popularity of vices that it aggregates. Note that FriendFeed being an ag- services, who follows the aggregated content feeds, and why. gregation service enables us to study different services from one common observation point, and allows us to get a unique “sneak peek” on how these social networking and content Introduction sharing services are being used by a common set of users. We believe that social aggregation services are of interest to With the increasing popularity of online social networking information hungry Web users, especially those that like to (OSN) and content sharing services, many Web users have always stay connected with the ongoings in the cyber world. accounts on many of these services. This scenario results Social aggregation services are a recent phenomena, and, in the scattering of information, and has motivated the de- to the best of our knowledge, there has been no prior work velopment of “social aggregation” services that seamlessly on characterizing such services. Our work fills this void and collate content posted by a user on various services and facil- provides the following insights (Gupta et al. 2009): itate easy dissemination of the collated content. FriendFeed (www.friendfeed.com) is one such service. • The FriendFeed social network has significantly smaller FriendFeed allows aggregation of information from a network distances than some of the OSNs it aggregates. number of services that include popular social network- This is likely due to its “celebrity” driven nature, wherein ing, video sharing, photo sharing, and blogging services. a large fraction of the users are friends to a small set of A FriendFeed user can choose to aggregate content from users (e.g., famous bloggers). The node degree distribu- among the supported services into the user’s FriendFeed tion properties of the FriendFeed network, however, are profile page. A FriendFeed user can “follow” the activity of very similar to those reported for other OSNs. other users of this service by subscribing them as “friends”. • The active usage of services (as measured by the number A friend on FriendFeed is a unidirectional relationship. Note of posts, for example) is significantly more skewed than that a user following another need not be collating informa- the passive usage of services (as measured by subscrip- tion from the same set of services, and that any user with a tions to services, for example). Micro-blogging services public profile can be subscribed to as a friend. are the most popular in terms of both active and passive On FriendFeed users can comment and start discussions usage. Services such as video sharing (e.g., YouTube) on the aggregated content, similar to functionalities pro- and photo sharing (e.g., Flickr) observe high subscription vided by typical OSNs. Commenting on aggregated con- rates but relatively low activity. tent facilitates information dissemination in the FriendFeed • The activity level of users is independent of the number network. For example, consider three users A, B, and C. of followers (or friends) they have and also the number of Suppose that A follows B, and B follows C, but A does not services they aggregate content from. Instead, it is typi- follow C. If B comments on some of C’s aggregated content, cally dependent on the type of services subscribed. A will become aware of both B’s comment and the aggre- • gated content under consideration on C’s profile page. This We observe higher user retention rates for certain services process may also result in A deciding to follow C as well. than has been previously reported for them. This is likely due to low activity users being more reluctant to join a ser- Copyright !c 2009, Association for the Advancement of Artificial vice like FriendFeed. This hypothesis is further supported Intelligence (www.aaai.org). All rights reserved. by the short tail of low activity users that we observe. Table 1: Summary of Data Set. Table 2: Properties of the FriendFeed Social Network. Number of users 111,877 Network Reciprocity Diameter Path Length Private users (%) 12.7 FriendFeed 0.53 12 4.02 Total number of directed edges 1,404,446 Twitter 0.58 - 6 Average degree of a user 25.21 Flickr 0.70 27 5.67 Content data collection period 30 Sept - 4 Nov 2008 LiveJournal - 20 5.58 Total number of observed posts 10,678,120 YouTube - 21 5.10 Related Work 2008. Each post contains the time when it was published, the Properties of the network graph formed by users of vari- service on which it was published (“internal” being Friend- ous OSNs have been studied. Kumar et al. (2006) studied Feed itself) and comments (if any) made on this post. how the density, average diameter, and effective diameter of Table 1 summarizes our data set. We found 111,877 users, the Yahoo! 360 and Flickr OSNs have evolved over time. with over 1 million directed edges among them. Among the Their work categorized the users as passive members (sin- users discovered, 12.7% had “private” profiles. For these gletons), users who migrate their offline social network to users, we could not gather any information on posts and the online (isolated communities), and linkers who fully par- users they follow; we ignore these private users in our anal- ticipate in the evolution of the network. Java et al. (2007) yses. In total, there were more than 10 million posts aggre- studied Twitter’s social network and found that users gener- gated from various services; non-stationarities with respect ally reciprocate links, and that the node degree distribution to the amount of activity per day were seen, with there being follows power law. Characteristics of three social network- more activity on weekdays than on weekends. ing services were compared by Ahn et al. (2007); they re- port a multi-scaling behavior of the degree-distribution and Characterization Results attribute it to the presence of heterogeneous types of users on the network. Shi et al. (2007) compare several network Network Properties properties of two network samples of Blogosphere, differing Table 2 summarizes some fundamental metrics capturing in time duration and data collection methodology, and find important network properties of FriendFeed’s social net- them to be remarkably consistent. Leskovec et al. (2008) work, along with known results for some OSNs (Ahn et analyzed link formation in four OSNs and then presented a al. 2007; Mislove et al. 2007; Kumar, Novak, and Tomkins model to synthesize networks of arbitrary scale. 2006; Java et al. 2007). Recent work has considered how users use OSNs. Krish- FriendFeed’s social network follows power-law (Gupta et namurthy et al. (2008) studied Twitter usage. They found al. 2009). Specifically, the number of users subscribed to an that users can be classified as broadcasters, acquaintances, user (indegree) and the number of users followed by an user or spammers, based on indegree, outdegree, and number of (outdegree) both follow power laws. Using techniques de- tweets transmitted. Java et al. (2007) characterized Twit- scribed by Clauset et al. (2007), we find that both indegree ter users into information source, information seeker, and and outdegree distributions follow power law with shape pa- friends, based on the content of the tweets. Caverlee and rameters 2.28 and 2.12, respectively. Although FriendFeed Webb (2008) studied characteristics of MySpace users such allows for directional connections, these results are starkly as the number of friends they have, the number of comments similar to those typically observed for OSNs in which bidi- they make, their gender, and their privacy preferences. rectional relationships are required. Another dimension of interest is the degree of reci- Data Collection Methodology procity in relationships between nodes (Kumar, Novak, and Our data collection consisted of two phases. The first phase Tomkins 2006). The FriendFeed network has a reciprocity captured the network of FriendFeed users, while the second of 0.53, which suggests that it is 53% probable for a directed phase captured the activity of the users identified in the first edge to be present between two nodes in both directions, if phase over a period of five weeks. Please consult (Gupta et there is an edge in a single direction. Similar reciprocity val- al. 2009) for details of the data collection. ues have been observed in other non-aggregating networks. At the end of the first phase, for all users with publicly We studied whether or not the “small world” phenomena visible profiles, we had information on the users they fol- applies here and if it does, to what extent and why. We evalu- lowed and the services they were subscribed to. Because ated the diameter and average path length of the FriendFeed the FriendFeed API does not directly provide the users fol- network (Gupta et al.
Recommended publications
  • Principles, Models, and Methods for the Characterization and Analysis of Lurkers in Online Social Networks
    Principles, models, and methods for the characterization and analysis of lurkers in online social networks Roberto Interdonato, Andrea Tagarelli DIMES Dept., Università della Calabria, Italy The 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining Lurking in OSNs: Principles, Models, and Methods Lurking in OSNs: Principles, Models, and Methods Lurk(er): what meanings Lurking in OSNs: Principles, Models, and Methods “Lurker”: let’s google it … Lurking in OSNs: Principles, Models, and Methods Lurk(er): what meanings Lurking in OSNs: Principles, Models, and Methods Outline 1. Lurking in online communities 2. Modeling lurking behaviors Topology-driven lurking definition The issue of controversial definitions Lurking and online behavioral 3. Lurker ranking methods models 4. Experimental evaluation The opportunity of de-lurking Static scenarios Dynamic scenarios 5. Applications to other domains Vicariously learning Lurking in social trust contexts 6. Delurking via Targeted Influence Maximization The DEvOTION algorithm 7. Conclusion and future work Lurking in OSNs: Principles, Models, and Methods LURKING IN ONLINE COMMUNITIES Lurking in OSNs: Principles, Models, and Methods The 1:9:90 rule of participation inequality (1/3) Arthur, C. (2006). What is the 1% rule? In: The guardian. UK: Guardian News and Media. Lurking in OSNs: Principles, Models, and Methods The 1:9:90 rule of participation inequality (2/3) • [Nonnecke & Preece, 2000] Email-based discussion lists: • 77 online health support groups and 21 online technical support groups • 46% of the health support group members and 82% of the technical support group members are lurkers • [Swartz, 2006] On Wikipedia: over 50% of all the edits are done by only 0.7% of the users • [van Mierlo, 2014] On four DHSNs (AlcoholHelpCenter, DepressionCenter, PanicCenter, and StopSmokingCenter): • 63,990 users, 578,349 posts • Lurkers account for 1.3% (n=4668), Contributors for 24.0% (n=88,732), and Superusers for 74.7% (n=276,034) of content Nonnecke, B., Preece, J.
    [Show full text]
  • THE TRUTH CAN CATCH the LIE: the FLAWED UNDERSTANDING of ONLINE SPEECH in INRE Anonymous ONLINE SPEAKERS Musetta Durkeet
    THE TRUTH CAN CATCH THE LIE: THE FLAWED UNDERSTANDING OF ONLINE SPEECH IN INRE ANoNYMous ONLINE SPEAKERS Musetta Durkeet In the early years of the Internet, many cases seeking disclosure of anonymous online speakers involved large companies seeking to unveil identities of anonymous posters criticizing the companies on online financial message boards.' In such situations, Internet service providers (ISPs)-or, less often, online service providers (OSPs)2-- disclosed individually- identifying information, often without providing defendants notice of this disclosure,' and judges showed hostility towards defendants' motions to quash.4 Often these subpoenas were issued by parties alleging various civil causes of action, including defamation and tortious interference with business contracts.s These cases occurred in a time when courts and the general public alike pictured the Internet as a wild west-like "frontier society,"' devoid of governing norms, where anonymous personalities ran C 2011 Musetta Durkee. t J.D. Candidate, 2012, University of California, Berkeley School of Law. 1. Lyrissa Barnett Lidsky, Anonymity in Cyberspace: What Can We LearnfromJohn Doe?, 50 B.C. L. REv. 1373, 1373-74 (2009). 2. As will be discussed below, there has been some conflation of two separate services that allow users to access the Internet, on the one hand, and engage in various activities, speech, and communication, on the other. Most basically, this Note distinguishes between Internet Service Providers (JSPs) and Online Service Providers (OSPs) in order to separate those services and companies involved with providing subscribers access to the infrastructure of the Internet (ISPs, and their subscribers) and those services and companies involved with providing users with online applications, services, platforms, and spaces on the Internet (OSPs and their users).
    [Show full text]
  • Social Media Why You Should Care What Is Social Media? Social Network
    Social Media Why You Should Care IST 331 - Olivier Georgeon, Frank Ritter 31 oct 15 • eMarketer (2007) estimated by 2011 one-half Examples of all Internet users will use social networking • Facebook regulary. • YouTube • By 2015, 75% use • Myspace • Twitter • Del.icio.us • Digg • Etc… 2 What is Social Media? Social Network • Social Network • Online communities of people who share • User Generated Content (UGC) interests and activities, • Social Bookmarking • … or who are interested in exploring the interests and activities of others. • Examples: Facebook, MySpace, LinkedIn, Orkut • Falls to analysis with tools in Ch. 9 3 4 User Generated Content (UGC) Social Bookmarking • A method for Internet users to store, organize, search, • or Consumer Generated Media (CGM) and manage bookmarks of web pages on the Internet with the help of metadata. • Based on communities; • Defined: Media content that is publicly – The more people who bookmark a piece of content, the more available and produced by end-users (user). value it is determined to have. • Examples: Digg, Del.icio.us, StumbleUpon, and reddit….and now combinations • Usually supported by a social network • Examples: Blogs, Micro-blogs, YouTube video, Flickr photos, Wiki content, Facebook wall posts, reddit, Second Life… 5 6 Social Media Principles Generate an activity stream • Automatic • Who you are – Google History, Google Analytics – Personalization • Blog • Who you know • Micro-blog – Browse network – Twitter, yammer, identi.ca • What you do • Mailing groups – Generate an activity stream
    [Show full text]
  • POPULAR SOCIAL MEDIA SITES Below Is a List of Some of the Most Commonly Used Youth and Teen Social Networking Sites and Tools
    POPULAR SOCIAL MEDIA SITES Below is a list of some of the most commonly used youth and teen social networking sites and tools. Ask.fm (http://ask.fm) Participants log on, post a question anonymously and anyone may answer anonymously. “Do you think I am fat?” or “Would you date me?” are examples of questions posted in the past. There have also been examples in which individuals were encouraged to kill themselves. The site has courted controversy by not having workable reporting, tracking or parental control processes, which have become the norm on other social media websites. Twitter (https://twitter.com) An online social networking and microblogging service that enables users to send and read "tweets", which are text messages limited to 140 characters. Instagram (http://instagram.com) A photo-sharing app for iPhone. Kik (http://kik.com) Kik is as an alternative to email or text messaging and its popularity has grown in the last two years. Kik is accessible on smartphones and supports over 4 million users, called “Kicksters.” Users are not restricted to sending text messages with Kik. Images, videos, sketches, emoticions and more may be sent. A user can block users on Kik from contacting them. Wanelo (http://wanelo.com) Wanelo (from Want, Need, Love) sells unique products online, all posted by users. Products posted for sale range from dishes, clothing, intimate wear and other potentially “R-Rated” products. Vine (https://vine.co) Vine is used to create and share free and instant six-second videos. Topic and content ranges. Snapchat (http://www.snapchat.com) A photo messaging application.
    [Show full text]
  • Security and Online Social Networks
    Security and Online Social Networks Javier Echaiz and Jorge Ardenghi Laboratorio de Investigaci´on de Sistemas Distribuidos (LISiDi), Departamento de Ciencias e Ingenier´ıa de la Computaci´on Tel´efono: +54 291 4595135, Fax: +54 291 4595136 Universidad Nacional del Sur, Bah´ıa Blanca (8000), Argentina {je,jra}@cs.uns.edu.ar, WWW home page: http://lisidi.cs.uns.edu.ar Abstract. In the last few years we have witnessed a sustained rise in the popularity of online Social Network Sites (SNSs) such as Twitter, Facebook, Myspace, Flickr, LinkedIn, FriendFeed, Google Friend Con- nect, Yahoo! Groups, etc., which are some of the most visited websites worldwide. However, since they are are easy to use and the users are often not aware of the nature of the access of their profiles, they often reveal information which should be kept away from the public eyes. As a result, these social sites may originate security related threats for their members. This paper highlights the benefits of safe use of SNSs and emphasizes the most important threats to members of SNSs. Moreover, we will show the main factors behind these threats. Finally we present policy and technical recommendations in order to improve security without compromising the benefits of information sharing through SNSs. Keywords: Online Social Network, Privacy, Profile squatting, Identity threat, Image Tagging and Cross-profiling. 1 Introduction The advent of the Internet has given rise to many forms of online sociality, from the old e-mail and Usenet services to the more recent instant messaging (IM), blogging, and online social services. Among these, the technological phenomenon that has acquired the greatest popularity in this 21st century is the latter, the Social Networking Sites (SNSs).
    [Show full text]
  • M&A @ Facebook: Strategy, Themes and Drivers
    A Work Project, presented as part of the requirements for the Award of a Master Degree in Finance from NOVA – School of Business and Economics M&A @ FACEBOOK: STRATEGY, THEMES AND DRIVERS TOMÁS BRANCO GONÇALVES STUDENT NUMBER 3200 A Project carried out on the Masters in Finance Program, under the supervision of: Professor Pedro Carvalho January 2018 Abstract Most deals are motivated by the recognition of a strategic threat or opportunity in the firm’s competitive arena. These deals seek to improve the firm’s competitive position or even obtain resources and new capabilities that are vital to future prosperity, and improve the firm’s agility. The purpose of this work project is to make an analysis on Facebook’s acquisitions’ strategy going through the key acquisitions in the company’s history. More than understanding the economics of its most relevant acquisitions, the main research is aimed at understanding the strategic view and key drivers behind them, and trying to set a pattern through hypotheses testing, always bearing in mind the following question: Why does Facebook acquire emerging companies instead of replicating their key success factors? Keywords Facebook; Acquisitions; Strategy; M&A Drivers “The biggest risk is not taking any risk... In a world that is changing really quickly, the only strategy that is guaranteed to fail is not taking risks.” Mark Zuckerberg, founder and CEO of Facebook 2 Literature Review M&A activity has had peaks throughout the course of history and different key industry-related drivers triggered that same activity (Sudarsanam, 2003). Historically, the appearance of the first mergers and acquisitions coincides with the existence of the first companies and, since then, in the US market, there have been five major waves of M&A activity (as summarized by T.J.A.
    [Show full text]
  • Studying Social Tagging and Folksonomy: a Review and Framework
    Studying Social Tagging and Folksonomy: A Review and Framework Item Type Journal Article (On-line/Unpaginated) Authors Trant, Jennifer Citation Studying Social Tagging and Folksonomy: A Review and Framework 2009-01, 10(1) Journal of Digital Information Journal Journal of Digital Information Download date 02/10/2021 03:25:18 Link to Item http://hdl.handle.net/10150/105375 Trant, Jennifer (2009) Studying Social Tagging and Folksonomy: A Review and Framework. Journal of Digital Information 10(1). Studying Social Tagging and Folksonomy: A Review and Framework J. Trant, University of Toronto / Archives & Museum Informatics 158 Lee Ave, Toronto, ON Canada M4E 2P3 jtrant [at] archimuse.com Abstract This paper reviews research into social tagging and folksonomy (as reflected in about 180 sources published through December 2007). Methods of researching the contribution of social tagging and folksonomy are described, and outstanding research questions are presented. This is a new area of research, where theoretical perspectives and relevant research methods are only now being defined. This paper provides a framework for the study of folksonomy, tagging and social tagging systems. Three broad approaches are identified, focusing first, on the folksonomy itself (and the role of tags in indexing and retrieval); secondly, on tagging (and the behaviour of users); and thirdly, on the nature of social tagging systems (as socio-technical frameworks). Keywords: Social tagging, folksonomy, tagging, literature review, research review 1. Introduction User-generated keywords – tags – have been suggested as a lightweight way of enhancing descriptions of on-line information resources, and improving their access through broader indexing. “Social Tagging” refers to the practice of publicly labeling or categorizing resources in a shared, on-line environment.
    [Show full text]
  • Network Overlap and Content Sharing on Social Media Platforms
    Network Overlap and Content Sharing on Social Media Platforms Jing Peng1, Ashish Agarwal2, Kartik Hosanagar3, Raghuram Iyengar3 1School of Business, University of Connecticut 2McCombs School of Business, University of Texas at Austin 3The Wharton School, University of Pennsylvania [email protected] [email protected] {kartikh, riyengar}@wharton.upenn.edu February 15, 2017 Acknowledgments. We benefited from feedback from session participants at 2013 Symposium on Statistical Challenges in eCommerce Research, 2014 International Conference on Information Systems, 2015 Workshop on Information in Networks, 2015 INFORMS Annual Meeting, and 2015 Workshop on Information Systems and Economics. The authors would like to thank Professors Christophe Van den Bulte, Paul Shaman, and Dylan Small for helpful discussions. This project was made possible by financial support extended to the first author through Mack Institute Research Fellowship, President Gutmann's Leadership Award, and Baker Retailing Center PhD Research Grant. 1 Network Overlap and Content Sharing on Social Media Platforms ABSTRACT We study the impact of network overlap – the overlap in network connections between two users – on content sharing in directed social media platforms. We propose a hazards model that flexibly captures the impact of three different measures of network overlap (i.e., common followees, common followers and common mutual followers) on content sharing. Our results indicate a receiver is more likely to share content from a sender with whom they share more common followees, common followers or common mutual followers after accounting for other measures. Additionally, the effect of common followers and common mutual followers is positive when the content is novel but decreases, and may even become negative, when many others in the network have already adopted it.
    [Show full text]
  • Introduction to Web 2.0 Technologies
    Introduction to Web 2.0 Joshua Stern, Ph.D. Introduction to Web 2.0 Technologies What is Web 2.0? Æ A simple explanation of Web 2.0 (3 minute video): http://www.youtube.com/watch?v=0LzQIUANnHc&feature=related Æ A complex explanation of Web 2.0 (5 minute video): http://www.youtube.com/watch?v=nsa5ZTRJQ5w&feature=related Æ An interesting, fast-paced video about Web.2.0 (4:30 minute video): http://www.youtube.com/watch?v=NLlGopyXT_g Web 2.0 is a term that describes the changing trends in the use of World Wide Web technology and Web design that aim to enhance creativity, secure information sharing, increase collaboration, and improve the functionality of the Web as we know it (Web 1.0). These have led to the development and evolution of Web-based communities and hosted services, such as social-networking sites (i.e. Facebook, MySpace), video sharing sites (i.e. YouTube), wikis, blogs, etc. Although the term suggests a new version of the World Wide Web, it does not refer to any actual change in technical specifications, but rather to changes in the ways software developers and end- users utilize the Web. Web 2.0 is a catch-all term used to describe a variety of developments on the Web and a perceived shift in the way it is used. This shift can be characterized as the evolution of Web use from passive consumption of content to more active participation, creation and sharing. Web 2.0 Websites allow users to do more than just retrieve information.
    [Show full text]
  • Tag Cloud Reorganization: Finding Groups of Related Tags on Delicious
    Tag Cloud Reorganization: Finding Groups of Related Tags on Delicious ABSTRACT Tag clouds have become an appealing way of navigating through web pages on social tagging systems. Recent research has focused on finding relations among tags to improve visualization and access to web documents from tag clouds. Reorganizing tag clouds according to tag relatedness has been suggested as an effective solution to ease navigation. Most of the approaches either rely on co-occurrences or rely on textual content to represent tags. In this chapter we will explore tag cloud reorganization based on both of them. We compare these clouds from a qualitative point of view, analyzing pros and cons of each approach. We show encouraging results suggesting that co-occurrences produce more compelling reorganization of tag clouds than textual content, being computationally less expensive. INTRODUCTION Social bookmarking sites allow to collaboratively annotate web pages, relying on the social tagging philosophy. Social tagging is a Web 2.0 application based phenomenon where users can describe web contents by adding tags or keywords as metadata in an open, collaborative and non-hierarchical way (Smith, 2008). Social bookmarking is a popular way to store, organize, comment on and search links to any web page, and it has emerged as one of the most important web applications that eases information sharing. Popular collaborative tagging sites have aggregated a vast amount of user-created metadata in the form of tags, providing valuable information about the interests and expertise of the users. Because of this, it becomes a fertile area to scientific research on social media (Gupta et al., 2010).
    [Show full text]
  • Facebook Timeline
    Facebook Timeline 2003 October • Mark Zuckerberg releases Facemash, the predecessor to Facebook. It was described as a Harvard University version of Hot or Not. 2004 January • Zuckerberg begins writing Facebook. • Zuckerberg registers thefacebook.com domain. February • Zuckerberg launches Facebook on February 4. 650 Harvard students joined thefacebook.com in the first week of launch. March • Facebook expands to MIT, Boston University, Boston College, Northeastern University, Stanford University, Dartmouth College, Columbia University, and Yale University. April • Zuckerberg, Dustin Moskovitz, and Eduardo Saverin form Thefacebook.com LLC, a partnership. June • Facebook receives its first investment from PayPal co-founder Peter Thiel for US$500,000. • Facebook incorporates into a new company, and Napster co-founder Sean Parker becomes its president. • Facebook moves its base of operations to Palo Alto, California. N. Lee, Facebook Nation, DOI: 10.1007/978-1-4614-5308-6, 211 Ó Springer Science+Business Media New York 2013 212 Facebook Timeline August • To compete with growing campus-only service i2hub, Zuckerberg launches Wirehog. It is a precursor to Facebook Platform applications. September • ConnectU files a lawsuit against Zuckerberg and other Facebook founders, resulting in a $65 million settlement. October • Maurice Werdegar of WTI Partner provides Facebook a $300,000 three-year credit line. December • Facebook achieves its one millionth registered user. 2005 February • Maurice Werdegar of WTI Partner provides Facebook a second $300,000 credit line and a $25,000 equity investment. April • Venture capital firm Accel Partners invests $12.7 million into Facebook. Accel’s partner and President Jim Breyer also puts up $1 million of his own money.
    [Show full text]
  • Turbo-Charge Your Business with Social Media Marketing
    Turbo-Charge Your Business with Social Media Marketing Countless Google searches are taking place every day. However, if people haven’t heard of your brand, they’ll never discover the value of your product or service. Enter social media marketing, a form of internet marketing that implements various social media networks in order to achieve marketing communication and branding goals. Social Media Marketing (SMM) covers activities like social sharing of content, videos, images, A total 74% of and paid social media advertising. SMM develops and sustains customer engagement, which has been found to influence buying behavior. Getting started without any insight or any consumers rely on social previous experience can be tricky. Here’s how you can use social media marketing to grow your media to influence their busines: purchasing decisions, 1. Carefully develop a plan aligned with your goals. To develop your plan, do a thorough analysis of existing social followers across your networks, analyze your competition, and according to CeBIT. identify areas for improvement. When allocating budget and resources to SMM, take into account whether your campaign requires any paid social efforts or if you plan to rely on organic tactics and owned media. Once you have decided on an appropriate budget and sketched your social media campaign, create your dream team and assign clear-cut roles to them. The final steps of your social media campaign strategy should be to identify the metrics you will use to measure the ROI of your campaign. In order to achieve this, you’ll need to outline and define your campaign’s goals, which are the next component of a great campaign.
    [Show full text]