B L O C K C H a I N

Total Page:16

File Type:pdf, Size:1020Kb

B L O C K C H a I N B L O C K C H A I N Cryptographic sorcery, entrepreneurial zeal, and utopian dreams have hen he moved off campus as a gripped a striking number cannily well-adapted to the challenge at junior, Dillon Chen W’18 faced a hand. And when they took a step back, situation that irks every city dwell- of Penn students and its potential seemed even more dramat- W er rankled by the price of residen- alumni this year. Why are ic. Rubin soon saw it as a way to revolu- tial internet access. His laptop registered people so excited? tionize financial transparency in the 15 wireless signals—representing more murky world of philanthropy. Haque bandwidth than he’d ever need—but every By Trey Popp envisioned taming the fraud-ridden one was locked. Wouldn’t it be great, he chaos of local educational credentialing thought, if there were a secure way to systems and merging them seamlessly incentivize people to share their signals with global labor markets, leveling a with strangers? Then he thought some citizens and refugees. Meanwhile, back playing field long tilted against develop- more, and landed on a new tool that on campus, a molecular biologist named ing-world strivers. Espinosa glimpsed a seemed purpose-made to pull off that trick. Harvey Rubin Gr’74 was wrestling with chance for exploited subjects of social Around the same time, Diego Espinosa a predicament of his own. He had piloted media empires to reclaim sovereignty WG’91, a longtime equities analyst and a program to supply remote areas of over their own data—without having to investor who has also taught finance at Zimbabwe with vaccines, which require wait for government intervention. the University of San Diego School of continuous cold storage, by using cell- Blockchains are a novel type of data- Business, had an epiphany about how to phone towers to power refrigerators. It base. They are most closely associated turn diabetes prevention into a business had helped inoculate 250,000 people. That with Bitcoin, whose unknown creator venture. Betting on the same technology had sparked interest in expanding to other invented the format as a foundation for that interested Dillon Chen, he hit the countries, but it remained very difficult to a virtual currency. Bitcoin’s tenfold price off-ramp from traditional capital markets guarantee the authenticity and storage appreciation in 2017—along with the and bee-lined toward a sector people conditions of the complex supply chain. downright stupefying gains of other vir- were beginning to call the Next Internet. Now Rubin had his own eureka moment: tual coins, like Ethereum, whose value Halfway around the world, Mir Haque This was a job for blockchain. multiplied by a factor of 70—made the WG’08 soon found himself pitching the Four very different problems, and four global cryptocurrency craze the story of same tech platform to government offi- people convinced that the same tool held the year. But that bubble may be the least cials in his native Bangladesh—as a way the solution. Not just a feasible solution, important—and least interesting—thing to extend financial services to unbanked either, but one that seemed almost un- about the technology underlying it. 34 THE PENNSYLVANIA GAZETTE Jul|Aug 2018 ILLUSTRATION BY CHRIS GASH Jul|Aug 2018 THE PENNSYLVANIA GAZETTE 35 Beneath a familiar surface, blockchain absurd ways to think about a glorified fever roiled Penn’s campus this year with ledger book? a mixture of entrepreneurial zeal, utopian In a search for answers—and a better fantasy, greed, confusion, naysaying, and sense of the right questions to ask—I intellectual electricity this reporter has audited a Wharton MBA class that fo- only witnessed once before: in the San cused partly on blockchain, taught this Francisco Bay Area during the original winter by visiting professor Shimon dot-com boom. Here was a group of stu- Kogan, who is based at Israel’s Interdis- dents trying to put insurance on a block- ciplinary Center Herzliya. I owe many chain. There was one developing a block- insights to him. It is early days for block- chain to enable gastroenterology prac- chain, and academic offerings are scarce. tices to document endoscopies. Joshua Tom Baker, the William Maul Measey Talbot WG’18 was working on a blockchain Some enthusiasts envision blockchain Professor of Law and Health Sciences, that home-healthcare agencies could use transforming capitalism itself. Others see has also addressed blockchain as part of to certify patient interactions for Medicare/ a scam of world-historical proportions. a broader seminar on tech-driven finan- Medicaid reimbursement. Xiao Ling “This is not just a bubble,” one prominent cial services, or FinTech. Next fall, Cros- EAS’11 GEng’17 was part of a team build- hedge fund advised clients in a January bie and Wharton associate professor ing a cryptocurrency they hoped would letter about cryptocurrencies. “It is not Kevin Werbach will teach Penn’s first full accomplish nothing short of incentivizing just a fraud. It is perhaps the outer limit, class on blockchain. “people to help each other more, and in the ultimate expression, of the ability of But in truth, University administrators the process communicate with each other humans to seize upon ether and hope to are playing catch-up with students. The in a more authentic manner.” ride it to the stars.” That’s a lot of scorn student-run Penn Blockchain Club, Rarely do gold rushes spark such run- to heap on one component of a tool that which has mushroomed to 400 members away idealism. “Blockchain as it helps has attracted some of the 500-pound in the space of two years, has effectively business—like, use this on our supply gorillas of global commerce: IBM, mounted a miniature shadow college to chain and it’ll make things more effi- Walmart, Maersk, Google, Goldman satisfy the hunger for insights and tech- cient, is definitely going to exist, and Sachs, and so on. Even as cryptocurrency nical know-how. Working with the probably soon, in real capacities,” I prices swooned in the first three months Wharton Advisory Board to secure class- heard from Nate Rush, a College junior of 2018, venture capitalists invested half room space, its leaders have organized held in awe among campus tech types a billion dollars in 75 blockchain projects, lectures by self-educated students—from for his coding chops. But what really according to the market-research com- code jockeys to cryptocurrency traders— drove him was a headier prospect: pany PitchBook. and brought in speakers from organiza- “blockchain as it replaces business.” David Crosbie is a lecturer in the School tions ranging from the Ethereum Foun- The Greeks had Plato’s Republic. Rev- of Engineering and Applied Science who dation to the World Bank. So students olutionary Germany begat Karl Marx. made his money creating companies that were another source of insights, along Industrial America gave rise to the Oneida “built plumbing inside the Internet.” He with a number of alumni who are devel- religious perfectionists, the Shakers, and detected a familiar pattern in the inflamed opers, investors, and aspiring thought- Robert Owen’s experimental socialist rhetoric surrounding blockchain. “First you leaders in the blockchain realm. cooperatives. Meanwhile, the great uto- dismiss it as unimportant,” he mused in It is a singularly strange place, where pian hope of our era lies in … cryptograph- February. “Then you embrace it. Then you greed and gullibility rub up against tech- ically based decentralized digital ledgers? try and kill it. And then you become it.” nical sorcery in the fervid atmosphere How has the emergence of blockchain What might become of blockchain? of a Pentecostal tent revival. Speculation ignited so many imaginations in so many Will it liberate the baby-picture-posting, naturally outruns concrete achievements different domains? Does it represent the Like-clicking, Waze-navigating masses on any new technological frontier. But final step in the digitalization of econom- from their data-snooping corporate blockchains and cryptocurrencies, per- ic life? Will it do for assets what the inter- overlords—or help 21st-century monop- haps because they take some concerted net did for information? Is it the death olists amass greater power still? Will it effort to understand, have a way of utter- knell for “lawyers, brokers, and bankers,” unleash the dormant market power of 2 ly consuming the brains of people among the other white-collar middlemen billion unbanked adults around the who’ve put in the work. “Welcome to the Harvard Business Review put on notice world—or turn the digital divide into an rabbit hole,” I heard again and again last year? apocalyptic abyss? Or are those patently from people who’d taken the plunge. 36 THE PENNSYLVANIA GAZETTE Jul|Aug 2018 And there’s no shortage of blue caterpil- tain is a ledger of hashes. If they know mandate a $20 minimum for credit card lars down there, smoking hookahs atop which hash algorithm was used, they swipes.) “What is needed,” Nakamoto mushroom caps. can apply it to guessed passwords in wrote, is a system “allowing any two will- But first there’s a hall of locked doors, hopes of finding matches; that’s why ing parties to transact directly with each and opening them requires an acquain- passwords like “12345” or “admin” or other without the need for a trusted tance with a basic but far-reaching con- “password”—all hugely popular and third party.” cept from cryptography. therefore commonly guessed—are a bad Nakamoto proposed a solution that idea.) Hashes are useful in indexing, would obviate the need for trust entirely, The Hash: The Swiss Army Knife since they turn giant data packets into by replacing it with cryptographic proof.
Recommended publications
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • 2013 State of Media
    UNDERSTANDING GROWTH TARGETING THE NEW MOBILE AUDIOAND FRAGMENTATION 26 CONSUMER82 STATE OF MEDIA 2013 ANALYTICS DEATH OF BIG DATA, RISE OF SMART DATA 68 ESPN: End of an Empire? 34 02 VIDEO EVERYWHERE FACT, FICTION & FUTURE Letter from the President For me, working in the discussions that will continue this industry has to drive growth and progress. always been an exciting adventure. Offline and online are cohabitating It still is to this now more than ever to earn day. Nevertheless, viewers’ time, so let’s examine the continuous shakeup of content and provider advancements models. Today technologies like in the media Dish Network’s Hopper and landscape Aereo (page 6) are stirring the can make pot, but tomorrow, who knows? our jobs and the task of tracking I also happen to be a tablet addict, trends a challenging endeavor. so it’s been enjoyable to see my These rapid changes are what favorite magazines adapting to the encouraged us to write our very ever-increasing push for crossover first STATE OF MEDIA (SOM) content (page 22). This process has four years ago, and I am proud to already made for some truly creative say our mission to keep business uses of the medium and I can’t wait partners, clients, new friends and to see what’s next. Again, it all ourselves informed has successfully reminds me that we should dispel continued to this day. Now, just the premonitions and instead look like the industry in which we work, at the opportunities a more unified KSM is evolving our publication media ecosystem will produce.
    [Show full text]
  • Before the Web There Was Gopher
    Before the Web There Was Gopher Philip L. Frana Charles Babbage Institute The World Wide Web, universally well known today, was preceded by an efficient software tool that was fondly named Gopher. The Internet Gopher, much like the Web, enabled users to obtain information quickly and easily. Why, then, did it disappear but the Web did not? Gopher faded into obscurity for two main reasons: hypertext and commerce. Before the Web there was Gopher, a nearly anymore, despite the efforts of a handful of defunct Internet application protocol and asso- individuals to revitalize the protocol. Why did ciated client and server software.1 In the early Gopher fail? Many Gopher aficionados have a 1990s, Gopher burrowed a crucial path ready answer: pretty pictures. For them, the through a perceived bottleneck on the Web won and Gopher lost because the Web Information Superhighway. Internet Gopher could display vibrant images of, for example, passed away as a technological and social phe- hand-woven Turkish rugs, animated glyphs of nomenon quickly: Its inventors released mice stuffing email into virtual mailboxes, and Gopher in 1991. Within three years, the World blinking advertising banners. Clearly, the Wide Web had bypassed it. Most people who “Gopher faithful”—as they are often called— surf the Web today have no idea what Gopher are right about the importance of pictures. is, but in the 1990s it helped usher in a new age People get serious when money is at stake, and of user-friendly access to a rapidly growing uni- in the early 1990s lots of people came to accept verse of online information.
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]
  • Principles of Segmentation Culture Segments: the Quest for the Holy Grail 10 Top Tips for Successful Segmentation
    > Segmentation ISSUE 37 | JANUARY 2010 Principles of segmentation Culture segments: the quest for the holy grail 10 top tips for successful segmentation > So I think I’ve got > Segmentation in a segmentation practice: getting > Friends, fans … but how do I started and followers colour it in? Contents JAM is published by JAM is sponsored by > Regulars Spotlight ................................................................. 3 Research round-up ............................................ 4 www.a-m-a.co.uk Just a minute ...................................................... 11 © sugarfree/istock AMA museums and galleries marketing day ................................................... 12 Resources ........................................................... 23 > Segmentation ( Principles of segmentation .............................6 0 Case study: Segmentation in practice: 6 getting started .....................................................9 Culture segments: the quest A rough guide to the Principles of Just a minute for the holy grail ............................................... 14 segmentation toolkit segmentation Case study: segment evolution at the Southbank Centre .............................................17 Case study: Friends, fans and followers .............................................................. 18 Case study: So I think I’ve got a segmentation .... but how do I colour it in? 20 10 top tips for successful segmentation ....................................................22 AMA museums and Culture segments: the
    [Show full text]
  • Transforming the Customer Experience Through New Technologies ⁎ Wayne D
    Available online at www.sciencedirect.com ScienceDirect Journal of Interactive Marketing 51 (2020) 57–71 www.elsevier.com/locate/intmar Transforming the Customer Experience Through New Technologies ⁎ Wayne D. Hoyer a, & Mirja Kroschkeb& Bernd Schmitt c& Karsten Kraume d& Venkatesh Shankar e a McCombs School of Business, University of Texas at Austin, Austin, TX, United States of America b Marketing Center Muenster, University of Muenster, Münster, Germany c Columbia Business School, Columbia University, New York City, NY, United States of America d European Research Center for Information Systems, University of Münster, Münster, Germany e Center for Retailing Studies, Mays Business School, Texas A&M University, College Station, TX, United States of America Available online 19 May 2020 Abstract New technologies such as Internet of Things (IoT), Augmented Reality (AR), Virtual Reality (VR), Mixed Reality (MR), virtual assistants, chatbots, and robots, which are typically powered by Artificial Intelligence (AI), are dramatically transforming the customer experience. In this paper, we offer a fresh typology of new technologies powered by AI and propose a new framework for understanding the role of new technologies on the customer/shopper journey. Specifically, we discuss the impact and implications of these technologies on each broad stage of the shopping journey (pre-transaction, transaction, and post-transaction) and advance a new conceptualization for managing these new AI technologies along customer experience dimensions to create experiential
    [Show full text]
  • For All to Play Launches Kickstarter for Grail to the Thief, a Blind Accessible Audio Game
    For All To Play Launches Kickstarter for Grail to the Thief, a Blind Accessible Audio Game Slay a foul beast, save a child in danger, rescue a princess, and steal the Holy Grail! (Worcester, MA) April 7, 2014 - For All To Play is excited to announce the launch of their Kickstarter campaign for Grail to the Thief, an interactive audio adventure for Windows, Mac OS X, and Linux that can be played using only sound, without the need for visuals. The game has been designed with the needs of the blind and visually impaired in mind but can be enjoyed by everyone. The game will deliver an exciting, immersive experience in which the player will always be fully aware of what is happening through the use of voice-overs, sound effects, ambient sound and music. In Grail to the Thief, players make their choices through a conversation tree, eliminating the confusion and frustration that comes with traditional text adventure games, which require players to type in commands to progress. The game is a nostalgic throwback to childhood favorites such as Zork, The Hitchhiker’s Guide to the Galaxy, Day of the Tentacle, and Grim Fandango, and draws inspiration from old BBC radio dramas and the movie Time Bandits. The game stars Hank Krang, a thief from the future, and his self-aware time machine, TEDI, as they go throughout time stealing priceless artifacts. In Grail to the Thief, Hank and TEDI travel to Arthurian times in search of the Holy Grail. For All To Play has developed a browser based prototype of Grail to the Thief.
    [Show full text]
  • Freshman Survey
    Academic Violations Yes, a couple of incidents. My freshman year I took Latin with a wonderful teacher. She also taught greek (which I wasn't in) and had about 3 boys who she suspected of cheating the entire semester. She finally caught them cheating on their final but unfortunately, at the time my school did not have an academic honesty code so they were not punished. Partially because of this incident my school implemented an academic honesty code so in my junior year when someone attempted to plagiarize their summer AP History paper they received a 0 for a grade. In 11th grade, we had to write a paper on two books that we had read for English and roughly 30-40 kids plagiarized by taking information off of spark notes. The punishment included a 0 on the paper as well as an in- school-suspension (ISS) in the extreme cases. Yes, my junior year in Computer Science AB. Students got into the habit of copying other peoples labs (including simple copy-and-past of Java files) and turning them in. My teacher, Mr. Wittry, ran JPlag on all the labs, and a lot of people got caught cheating. Yes, four students at my old school repeatedly snuck into the school after school hours and stole test answers from the testing center. As their punishment, they were suspended for different amounts of time (depending on the degree of their involvement) and indefinitely suspended from athletic teams and other extracurricular activities. Also, they were given failing grades for the classes they cheated in.
    [Show full text]
  • AGS Annual Report 1996
    1/23/98 11:36 AM Annual Technical Summary Application Gateway System NSF Grant Number: NCR-9302522 January 96 to December 96 Corporation for National Research Inititives 1895 Preston White Drive, Suite 100 Reston, VA 20191 1/23/98 11:36 AM Introduction This report describes progress on the Application Gateway System (AGS) during the period beginning January 1, 1996 and ending December 31, 1996. The Application Gateway System is a collection of software components which provides a robust substrate that operates a collection of servers using distributed load-balancing techniques and secure remote management. The AGS is composed of routers, an AGS Management System and a collection of computers that host the application servers. Each host is called an Application Gateway (AG). An AGS may be comprised of a collection heterogeneous computers (AGs) and operating systems of varying capabilities. Several applications and core technologies for the AGS system were developed and demonstrated during this reporting period: 1. Two implementations of the rate.d system were developed to provide load-balanced high availability access to a single service. The first demonstration used a simple "delay service" to simulate client requests of variable resource demands, while the second simulated multiple service vending by the AGS. 2. A set of GUI tools to monitor and control a rate.d balanced AGS through the use of the ILU distributed object system. The rate.d system and monitor tools were demonstrated to D. Lindberg (NLM), B. Leiner and R. Larsen (DARPA), and M. Nelson (OSTP) 3. MEDLINE data was integrated into the Handle System.
    [Show full text]
  • Kenneth Arnes Ryan Paul Jaca Network Software Applications History
    Kenneth Arnes Ryan Paul Jaca Network Software Applications Networks consist of hardware, such as servers, Ethernet cables and wireless routers, and networking software. Networking software differs from software applications in that the software does not perform tasks that end-users can see in the way word processors and spreadsheets do. Instead, networking software operates invisibly in the background, allowing the user to access network resources without the user even knowing the software is operating. History o Computer networks, and the networking software that enabled them, began to appear as early as the 1970s. Early networks consisted of computers connected to each other through telephone modems. As personal computers became more pervasive in homes and in the workplace in the late 1980s and early 1990s, networks to connect them became equally pervasive. Microsoft enabled usable and stable peer-to-peer networking with built-in networking software as early as 1995 in the Windows 95 operating system. Types y Different types of networks require different types of software. Peer-to-peer networks, where computers connect to each other directly, use networking software whose basic function is to enable file sharing and printer sharing. Client-server networks, where multiple end-user computers, the clients, connect to each other indirectly through a central computer, the server, require networking software solutions that have two parts. The server software part, running on the server computer, stores information in a central location that client computers can access and passes information to client software running on the individual computers. Application-server software work much as client-server software does, but allows the end-user client computers to access not just data but also software applications running on the central server.
    [Show full text]
  • Improving SSL Warnings
    Improving SSL warnings Adrienne Porter Felt Chrome security team [email protected] THE HOLY GRAIL 1. Warn only when under attack THE HOLY GRAIL 2. Users understand warnings THE HOLY GRAIL 3. Users follow warning advice How can browsers stop crying wolf? Photo credit: https://www.flickr.com/photos/tambako Real attacks HOW I IMAGINE D Webmaster ERRORS mistakes DEVELOPER MEASURED ERRORS, SSL SSL 10% 20% 0% WWW SUBDOMAIN ERRORS OVERRIDABLE SSL % SUBDOMAIN SUBDOMAIN REV OUTSIDE WILDCARD UNKNOWN TLD MULTI-TENANT LOCALHOST PRIVATE URL a248.e.akamai.net Certificate mis- issuance Client missing Anti-virus software root certificate REALATTACK FALSE POSITIVE FALSE Captive School or employer Malware portal Gov’t content filter State attacks Expired certificate ISP adding advertisements Client clock wrong Blame the clock Wrong clocks cause 20% of HSTS errors Captive portals 4.5% of all errors caused by redirects Wonky trust stores Expired and missing certificates Traffic shaping Throttle or block expensive streaming Schools & employers Network admins want to filter content Traffic is $$$$$ Monetizing traffic with ads, search, etc. Clear-cut attack More common than we think? define, identify, fix How do we explain this to users? Photo credit: https://www.flickr.com/photos/sandras_weeds WHAT WE WANT TO CONVEY Threat source: the attacker is on the network, not a malicious website WHAT WE WANT TO CONVEY Data risk: the data on foo.com is at risk (and no other data) WHAT WE WANT TO CONVEY False positives: be more concerned about errors on well-regarded sites
    [Show full text]
  • Crowdsourcing Event Detection in Youtube Videos
    Crowdsourcing Event Detection in YouTube Videos Thomas Steiner1, Ruben Verborgh2, Rik Van de Walle2, Michael Hausenblas3, and Joaquim Gabarró Vallés1 1 Universitat Politécnica de Catalunya – Department LSI 08034 Barcelona, Spain {tsteiner,gabarro}@lsi.upc.edu 2 Ghent University – IBBT, ELIS – Multimedia Lab Gaston Crommenlaan 8 bus 201, B-9050 Ledeberg-Ghent, Belgium {ruben.verborgh,rik.vandewalle}@ugent.be 3 DERI, NUI Galway IDA Business Park, Lower Dangan Galway, Ireland [email protected] Abstract. Considerable efforts have been put into making video content on the Web more accessible, searchable, and navigable by research on both textual and visual analysis of the actual video content and the accompanying metadata. Nev- ertheless, most of the time, videos are opaque objects in websites. With Web browsers gaining more support for the HTML5 <video> element, videos are becoming first class citizens on the Web. In this paper we show how events can be detected on-the-fly through crowdsourcing (i) textual, (ii) visual, and (iii) be- havioral analysis in YouTube videos, at scale. The main contribution of this paper is a generic crowdsourcing framework for automatic and scalable semantic anno- tations of HTML5 videos. Eventually, we discuss our preliminary results using traditional server-based approaches to video event detection as a baseline. 1 Introduction Official statistics [26] from YouTube—owned by Google and one of the biggest online video platforms—state that more than 13 million hours of video were uploaded dur- ing 2010, and that 48 hours of video are uploaded every single minute. Given this huge and ever increasing amount of video content, it becomes evident that advanced search techniques are necessary in order to retrieve the few needles from the giant haystack.
    [Show full text]