Snap to It: Tips for Brands to Get Started on Snapchat Or at Least to Think About Now How to Use Old-School Journalism to Help Y
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites. -
Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ........................................................................................... -
DRC Diaspora Programme, DEMAC and GIZ, As Well As Consultations with Diaspora Communities in Europe for Possible Modalities of Diaspora Engagement
DRC DIASPORA PROGRAMME, DEMAC & GIZ’ Recommendations on behalf of diasporas to the Global Compact on Refugees’ Programme of Action Key considerations and recommendations to UNHCR and United Nations’ Member States 1 This paper sets forth joint recommendations of Danish Refugee Council Diaspora Programme, DEMAC (Diaspora Emergency Action and Coordination) and Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH (Sector Project Forced Displacement, on behalf of the German Federal Ministry for Economic Cooperation and Development, BMZ) for the Global Compact on Refugees’ Programme of Action, bringing together perspectives from a humanitarian and a development point of view. It is based on the experiences of DRC Diaspora Programme, DEMAC and GIZ, as well as consultations with diaspora communities in Europe for possible modalities of diaspora engagement. The objective of this paper is to ensure that the voices and perspectives of diaspora organisations will be reflected in the Global Compact on Refugee’s Programme of Action. Diasporas are dispersed collectives residing outside their country of origin who “maintain regular or occasional contacts with what they regard as their homeland and with individuals and groups of the same background residing in other host countries” (Sheffer: 2003, 9-10). Diasporas include first generation emigrants and their descendants, former refugees and asylum seekers. “Diaspora and refugee overlap significantly and are neither linear, nor static categories. The terms “refugee” and “diaspora” are situational identities that overlap and shift over time and depending on context. There is no bright line demarcation”. (Research paper No.278: 2016, UNHCR, 4) DRC, DEMAC and GIZ are focusing in this paper on diaspora organisations which are formally constituted entities comprising diaspora members that operate in their countries of settlement and countries of origin, and may also work in neighbouring (third) countries. -
Hard-Coded Censorship in Open Source Mastodon Clients — How Free Is Open Source?
Proceedings of the Conference on Technology Ethics 2020 - Tethics 2020 Hard-coded censorship in Open Source Mastodon clients — How Free is Open Source? Long paper Juhani Naskali 0000-0002-7559-2595 Information Systems Science, Turku School of Economics, University of Turku Turku, Finland juhani.naskali@utu.fi Abstract. This article analyses hard-coded domain blocking in open source soft- ware, using the GPL3-licensed Mastodon client Tusky as a case example. First, the question of whether such action is censorship is analysed. Second, the licensing compliance of such action is examined using the applicable open-source software and distribution licenses. Domain blocking is found to be censorship in the literal definition of the word, as well as possibly against some the used Google distribu- tion licenses — though some ambiguity remains, which calls for clarifications in the agreement terms. GPL allows for functionalities that limit the use of the software, as long as end-users are free to edit the source code and use a version of the appli- cation without such limitations. Such software is still open source, but no longer free (as in freedom). A multi-disciplinary ethical examination of domain blocking will be needed to ascertain whether such censorship is ethical, as all censorship is not necessarily wrong. Keywords: open source, FOSS, censorship, domain blocking, licensing terms 1 Introduction New technologies constantly create new challenges. Old laws and policies cannot al- ways predict future possibilities, and sometimes need to be re-examined. Open source software is a licensing method to freely distribute software code, but also an ideology of openness and inclusiveness, especially when it comes to FOSS (Free and Open-source software). -
The Many Shades of Anonymity: Characterizing Anonymous Social Media Content
Proceedings of the Ninth International AAAI Conference on Web and Social Media The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correay, Leandro Araújo Silvaz, Mainack Mondaly, Fabrício Benevenutoz, Krishna P. Gummadiy y Max Planck Institute for Software Systems (MPI-SWS), Germany z Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites. -
Compared to Facebook, Instagram Use Causes More Appearance Comparison and Lower Body Satisfaction in College Women
Body Image 34 (2020) 38–45 Contents lists available at ScienceDirect Body Image journa l homepage: www.elsevier.com/locate/bodyimage Compared to Facebook, Instagram use causes more appearance comparison and lower body satisfaction in college women a,∗ a b c Renee Engeln , Ryan Loach , Megan N. Imundo , Anne Zola a Department of Psychology, Northwestern University, United States b Department of Psychology, University of California, Los Angeles, United States c Oxford Internet Institute, University of Oxford, United Kingdom a r t i c l e i n f o a b s t r a c t Article history: The current experiment tested the effect of social media use on college women’s appearance compar- Received 3 September 2019 isons, mood, and body satisfaction. We randomly assigned 308 undergraduate women (aged 18–26) to Received in revised form 26 April 2020 use Facebook, use Instagram, or play a matching game (the control condition) on an iPad for seven min- Accepted 26 April 2020 utes. Compared to the Facebook condition, Instagram users retrospectively reported spending more time viewing images or videos containing people. Participants in both the Facebook and Instagram conditions Keywords: also retrospectively reported engaging in more appearance comparisons relative to those in the control Instagram condition, but Instagram users reported significantly more appearance comparisons than those in the Facebook Facebook condition. Those who used Instagram, but not Facebook, showed decreased body satisfaction, Social media decreased positive affect, and increased negative affect. Results are consistent with previous research Body satisfaction Social comparison suggesting social media use influences body satisfaction and social comparison, and that Instagram may be a particularly harmful platform when it comes to body image because of its focus on photos over text. -
Cachet: a Decentralized Architecture for Privacy Preserving Social Networking with Caching
Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh Sonia Jahid Prateek Mittal Indiana University University of Illinois at University of California, Bloomington Urbana-Champaign Berkeley [email protected] [email protected] [email protected] Nikita Borisov Apu Kapadia University of Illinois at Indiana University Urbana-Champaign Bloomington [email protected] [email protected] ABSTRACT and (b) use of social contacts for object caching results in Online social networks (OSNs) such as Facebook and significant performance improvements. Google+ have transformed the way our society communi- cates. However, this success has come at the cost of user Categories and Subject Descriptors privacy; in today's OSNs, users are not in control of their C.2.4 [Computer-Communication Networks]: Dis- own data, and depend on OSN operators to enforce access tributed Systems|Distributed Applications; K.6.m control policies. A multitude of privacy breaches has spurred [Management of Computing and Information research into privacy-preserving alternatives for social net- Systems]: Miscellaneous|Security working, exploring a number of techniques for storing, dis- seminating, and controlling access to data in a decentral- ized fashion. In this paper, we argue that a combination General Terms of techniques is necessary to efficiently support the complex Algorithms, Security functionality requirements of OSNs. We propose Cachet, an architecture that provides strong Keywords security and privacy guarantees while preserving the main functionality of online social networks. In particular, Cachet privacy, peer-to-peer systems, social networking, caching protects the confidentiality, integrity and availability of user content, as well as the privacy of user relationships. -
January 10, 2021 Baptism of the Lord Sunday Preparing for Worship If I Had to Guess, I Would Estimate That I Have Something of Me
January 10, 2021 Baptism of the Lord Sunday Preparing for worship If I had to guess, I would estimate that I have something of me. Each baptism required that I been baptized no less than 50 times in my life. get in the water. I had to remember to hold my Growing up as a pastor’s kid, playing baptism breath — that one was sometimes tricky. I had was one of the favorite pastimes in our house- to be ready for something, even if I wasn’t sure hold. My brother and I often baptized our what that something was. stuffed animals, or if they were very unlucky, Today, we recognize in worship the Baptism our live animals. Baby dolls and Barbies didn’t of the Lord Sunday. We recognize the step that escape my young baptismal zealotry. Most Jesus took to get into the water, to come nearer swimming pools flip-flopped between staging to us. Some of you might remember your own grounds for Marco Polo and baptism services of baptism. Some of you might be wondering what cousins and neighborhood kids. baptism might be like for you one day. Wherever Then, of course, there was the baptism where you are in your journey, baptism requires I stood in the baptistery of my beloved church getting into the water and being ready for as my father baptized me. There has been much something. Today, as you prepare for worship, light-hearted debate as to which one of these you might take a few deep cleansing breaths. baptisms “took,” which one really counted. -
The Messenger
Volume 88, Number 5 A Monthly Publication of Trinity Lutheran Church May 2019 The Messenger A New Earth Keeping Initiative to launch on Mother’s Day As we give thanks for the gift of family on As we seek to fulfill that calling we will be Mother’s Day, May 12, 2019, we will also be encouraged to love neighbor, care for offering a focus on our care for ‘Mother children and families, and protect God’s Earth’ as stewards of creation. Led by creation in ways that are intentional and members of Trinity’s Outreach Committee, focused on the future of our planet. We a new group in our life together at Trinity will will be asked to consider prayerfully what be formed this spring to encourage our we are passing on to our children and individual and shared care of the planet as grandchildren and how we can help shape children of God. a future of hope. Our faith tradition includes a call to the care Be with us in worship and consider this Consider prayerfully what we of creation in concert with our Creator God. new earth keeping initiative. There will be are passing on to our children Mother’s Day worship will include a Prayer an opportunity to sign up to join a new and grandchildren and of Confession, a Litany and a Statement of Earth Keeping group at Trinity following all how we can help shape a Assurance and Benediction that evoke the three worship services on Mother’s Day. future of hope. Biblical call to stewardship of all of creation. -
Decentralized Social Networking Platforms: Current Status and Trends Protocols Used by Existing DOSN Platforms Taxonomy by Proto
Decentralized Social Networking Platforms: Current Status and Trends Andres Ledesma, George Pallis and Marios Dikaiakos Laboratory for Internet Computing (LInC), Department of computer Science, University of Cyprus. {aledesma, gpallis, mdd}@cs.ucy.ac.cy Protocols Used by Existing DOSN Platforms DOSN Platforms Trendy … Trendiest! Open Graph Activity Protocol XOXO + 400 k Stream users *Document Representation Collaboration Tent *Partial Connection to other OSN XRI OExchange *Desktop (e.g. Facebook) Content PubSubHubbub Peer-to-Peer *Project Fork pump.io Identification Exchange LAMP node.js (e.g. identi.ca) OEmbed Salmon RSS / Atom Taxonomy by Protocols and Release Stage Content protocols identify, represent and exchange social content (e.g. posts, likes The three circles represent the release stage of the platform (i.e. the maturity and comments) in DOSNs. of the platform). Libertree Thimbl PGP Protocols used: newebe Cunity Duuit! XMPP pump.io XMPP + Others buddycloud Security and DSNP OpenSSL OpenPGP All Lipsync.it Friendica Tent encryption XMPP + Ostatus Retroshare OpenLink Data Spaces Ostatus + Others Kune Diaspora* DOSN rely on protocols to make the communication as private and secure as possible. Partial Ostatus + Others Ostatus Jappix Lorea StatusNet Others stable WebID Authentication OpenID beta Salut à Toi alpha User Layered Overview OAuth Identification WebFinger Activity Streams hCard Social Content RSS/Atom User Protocols deal with authentication and identification. User authentication across PuHubSubbub Salmon services is an essential part of DOSNs. User identification provides limited and OStatus Comet XMPP Mr. Privacy Psyc controlled user data to service and application without giving up privacy. HTTP SMTP, IMAP P2P TCP/IP Social FOAF XFN Representation Food for thought… Social representation refers to protocols that express the social graph. -
Mar 07, 2021 Issue 2
CampusMONDAY, MARCH 8, 2021 / VOLUME 148, ISSUE 2 Times SERVING THE UNIVERSITY OF ROCHESTER COMMUNITY SINCE 1873 / campustimes.org URAC Holds Protest During Mangelsdorf Event, Demands Action By Henry Litzky and Haven Worley PHOTO EDITOR and NEWS EDITOR On Thursday, the UR Abolition Coalition (URAC) staged a protest at the in-person Casual Conversa- tions with President Mangelsdorf event. During the event, students repeated their de- mands for changes to the Department of Public Safety (DPS) to Mangelsdorf directly. This move follows last semester’s overnight occu- pation of the DPS parking lot where URAC protes- tors voiced their demands to University President Sarah Manglesdorf and DPS chief Mark Fischer, who promised further discussion. “[President Manglesdorf] had promised us that night [...] that she would be starting to actually have progress with this mental health task force to institute Daniel’s [Law] on campus, and ensure that cops [...] and campus police do not respond to mental health calls on this campus,” URAC orga- nizer and senior Antoinette Nguyen said. “Howev- er, there’s been no update regarding that.” The protest began at the steps of Rush Rhees Li- brary, where many of their actions have started in the past. At around 4:30 p.m., organizers went over the plans to the group of roughly 30 people around the steps. HENRY LITSKY / PHOTO EDITOR They departed the steps at 4:36 p.m. and walked son Commons and then Rush Rhees, armed with cially for admin,” URAC member and junior Katie down Eastman Quad chanting, “What do we want? hundreds of paper flyers that listed The Students’ Hardin said. -
The Travels of Marco Polo
This is a reproduction of a library book that was digitized by Google as part of an ongoing effort to preserve the information in books and make it universally accessible. http://books.google.com TheTravelsofMarcoPolo MarcoPolo,HughMurray HARVARD COLLEGE LIBRARY FROM THE BEQUEST OF GEORGE FRANCIS PARKMAN (Class of 1844) OF BOSTON " - TRAVELS MAECO POLO. OLIVER & BOYD, EDINBURGH. TDE TRAVELS MARCO POLO, GREATLY AMENDED AND ENLARGED FROM VALUABLE EARLY MANUSCRIPTS RECENTLY PUBLISHED BY THE FRENCH SOCIETY OP GEOGRAPHY AND IN ITALY BY COUNT BALDELLI BONI. WITH COPIOUS NOTES, ILLUSTRATING THE ROUTES AND OBSERVATIONS OF THE AUTHOR, AND COMPARING THEM WITH THOSE OF MORS RECENT TRAVELLERS. BY HUGH MURRAY, F.R.S.E. TWO MAPS AND A VIGNETTE. THIRD EDITION. EDINBURGH: OLIVER & BOYD, TWEEDDALE COURT; AND SIMPKIN, MARSHALL, & CO., LONDON. MDOCCXLV. A EKTERIR IN STATIONERS' BALL. Printed by Oliver & Boyd, / ^ Twseddale Court, High Street, Edinburgh. p PREFACE. Marco Polo has been long regarded as at once the earliest and most distinguished of European travellers. He sur passed every other in the extent of the unknown regions which he visited, as well as in the amount of new and important information collected ; having traversed Asia from one extremity to the other, including the elevated central regions, and those interior provinces of China from which foreigners have since been rigidly excluded. " He has," says Bitter, " been frequently called the Herodotus of the Middle Ages, and he has a just claim to that title. If the name of a discoverer of Asia were to be assigned to any person, nobody would better deserve it." The description of the Chinese court and empire, and of the adjacent countries, under the most powerful of the Asiatic dynasties, forms a grand historical picture not exhibited in any other record.