TAGSPACE: Semantic Embeddings from Hashtags

Total Page:16

File Type:pdf, Size:1020Kb

TAGSPACE: Semantic Embeddings from Hashtags #TAGSPACE: Semantic Embeddings from Hashtags Jason Weston Sumit Chopra Keith Adams Facebook AI Research Facebook AI Research Facebook AI Research [email protected] [email protected] [email protected] n Abstract resented as a vector in R , where n is a hyper- parameter that controls capacity. The embeddings We describe a convolutional neural net- of words comprising a text are combined using a work that learns feature representations for model-dependent, possibly learned function, pro- short textual posts using hashtags as a su- ducing a point in the same embedding space. A pervised signal. The proposed approach is similarity measure (for example, inner product) trained on up to 5.5 billion words predict- gauges the pairwise relevance of points in the em- ing 100,000 possible hashtags. As well as bedding space. strong performance on the hashtag predic- Unsupervised word embedding methods train tion task itself, we show that its learned with a reconstruction objective in which the em- representation of text (ignoring the hash- beddings are used to predict the original text. For tag labels) is useful for other tasks as well. example, word2vec tries to predict all the words To that end, we present results on a docu- in the document, given the embeddings of sur- ment recommendation task, where it also rounding words. We argue that hashtag predic- outperforms a number of baselines. tion provides a more direct form of supervision: the tags are a labeling by the author of the salient 1 Introduction aspects of the text. Hence, predicting them may Hashtags (single tokens often composed of nat- provide stronger semantic guidance than unsuper- ural language n-grams or abbreviations, prefixed vised learning alone. The abundance of hashtags with the character ‘#’) are ubiquitous on social in real posts provides a huge labeled dataset for networking services, particularly in short textual learning potentially sophisticated models. documents (a.k.a. posts). Authors use hashtags to In this work we develop a convolutional net- diverse ends, many of which can be seen as labels work for large scale ranking tasks, and apply it for classical NLP tasks: disambiguation (chips to hashtag prediction. Our model represents both #futurism vs. chips #junkfood); identi- words and the entire textual post as embeddings as fication of named entities (#sf49ers); sentiment intermediate steps. We show that our method out- (#dislike); and topic annotation (#yoga). performs existing unsupervised (word2vec) and Hashtag prediction is the task of mapping text to supervised (WSABIE (Weston et al., 2011)) em- its accompanying hashtags. In this work we pro- bedding methods, and other baselines, at the hash- pose a novel model for hashtag prediction, and tag prediction task. show that this task is also a useful surrogate for We then probe our model’s generality, by trans- learning good representations of text. fering its learned representations to the task of per- Latent representations, or embeddings, are vec- sonalized document recommendation: for each of torial representations of words or documents, tra- M users, given N previous positive interactions ditionally learned in an unsupervised manner over with documents (likes, clicks, etc.), predict the large corpora. For example LSA (Deerwester et N + 1’th document the user will positively inter- al., 1990) and its variants, and more recent neural- act with. To perform well on this task, the rep- network inspired methods like those of Bengio et resentation should capture the user’s interest in al. (2006), Collobert et al. (2011) and word2vec textual content. We find representations trained (Mikolov et al., 2013) learn word embeddings. In on hashtag prediction outperform representations the word embedding paradigm, each word is rep- from unsupervised learning, and that our convolu- convolution tanh max tanh linear layer layer pooling layer layer w1 word hashtag w2 lookup lookup t table table (l + K 1) d l H l H H H d d − ⇥ ⇥ ⇥ wl N d ⇥ f(w, t) Figure 1: #TAGSPACE convolutional network f(w; t) for scoring a (document, hashtag) pair. tional architecture performs better than WSABIE 3 Convolutional Embedding Model trained on the same hashtag task. Our model #TAGSPACE (see Figure 1), like other 2 Prior Work word embedding models, starts by assigning a d- dimensional vector to each of the l words of an Some previous work (Davidov et al., 2010; Godin input document w1; : : : ; wl, resulting in a matrix et al., 2013; She and Chen, 2014) has addressed of size l d. This is achieved using a matrix of × hashtag prediction. Most such work applies to N d parameters, termed the lookup-table layer × much smaller sets of hashtags than the 100,000 we (Collobert et al., 2011), where N is the vocabulary consider, with the notable exception of Ding et al. size. In this work N is 106, and each row of the (2012), which uses an unsupervised method. matrix represents one of the million most frequent As mentioned in Section 1, many approaches words in the training corpus. learn unsupervised word embeddings. In our A convolution layer is then applied to the l d experiments we use word2vec (Mikolov et al., input matrix, which considers all successive win-× 2013) as a representative scalable model for un- dows of text of size K, sliding over the docu- supervised embeddings. WSABIE (Weston et al., ment from position 1 to l. This requires a fur- 2011) is a supervised embedding approach that has ther Kd H weights and H biases to be learned. shown promise in NLP tasks (Weston et al., 2013; To account× for words at the two boundaries of the Hermann et al., 2014). WSABIE is shallow, linear, document we also apply a special padding vector and ignores word order information, and so may at both ends. In our experiments K was set to 5 have less modeling power than our approach. and H was set to 1000. After the convolutional Convolutional neural networks (CNNs), in step, a tanh nonlinearity followed by a max op- which shared weights are applied across the in- eration over the l H features extracts a fixed- × put, are popular in the vision domain and have re- size (H-dimensional) global feature vector, which cently been applied to semantic role labeling (Col- is independent of document size. Finally, another lobert et al., 2011) and parsing (Collobert, 2011). tanh non-linearity followed by a fully connected Neural networks in general have also been applied linear layer of size H d is applied to represent the to part-of-speech tagging, chunking, named en- entire document in the× original embedding space tity recognition (Collobert et al., 2011; Turian et of d-dimensions. al., 2010), and sentiment detection (Socher et al., Hashtags are also represented using d- 2013). All these tasks involve predicting a limited dimensional embeddings using a lookup-table. (2-30) number of labels. In this work, we make We represent the top 100,000 most frequent tags. use of CNNs, but apply them to the task of rank- For a given document w we then rank any given ing a very large set of tags. We thus propose a hashtag t using the scoring function: model and training scheme that can scale to this class of problem. f(w; t) = econv(w) elt(t) · where e (w) is the embedding of the document Posts Words conv Dataset (millions) (billions) Top 4 tags by the CNN just described and elt(t) is the em- bedding of a candidate tag t. We can thus rank all #fitness, Pages 35.3 1.6 #beauty, candidate hashtags via their scores f(w; t), largest #luxury, #cars first. To train the above scoring function, and hence #FacebookIs10, People 201 5.5 #love, #tbt, the parameters of the model we minimize a rank- #happy ing loss similar to the one used in WSABIE as a training objective: for each training example, Table 1: Datasets used in hashtag prediction. we sample a positive tag, compute f(w; t+), then sample random tags t¯ up to 1000 times until billion words. These posts’ authorial voice is a f(w; t¯) > m + f(w; t+), where m is the mar- public entity, such as a business, celebrity, brand, gin. A gradient step is then made to optimize the or product. The posts in the pages dataset are pre- pairwise hinge loss: sumably intended for a wider, more general audi- = max 0; m f(w; t+) + f(w; t¯) : ence than the posts in the people dataset. Both are L f − g summarized in Table 1. We use m = 0:1 in our experiments. This loss Both corpora comprise posts between February function is referred to as the WARP loss in (We- 1st and February 17th, 2014. Since we are not at- ston et al., 2011) and is used to approximately tempting a multi-language model, we use a simple optimizing the top of the ranked list, useful for trigram-based language prediction model to con- metrics like precision and recall@k. In particu- sider only posts whose most likely language is En- lar, the search for a negative candidate tag means glish. that more energy is spent on improving the rank- The two datasets use hashtags very differently. ing performance of positive labels already near the The pages dataset has a fatter head, with popular top of the ranked list, compared to only randomly tags covering more examples. The people dataset sampling of negatives, which would optimize the uses obscure tags more heavily. For example, the average rank instead. top 100 tags account for 33.9% of page tags, but Minimizing our loss is achieved with parallel only 13.1% of people tags. stochastic gradient descent using the hogwild al- gorithm (Niu et al., 2011).
Recommended publications
  • How to Find the Best Hashtags for Your Business Hashtags Are a Simple Way to Boost Your Traffic and Target Specific Online Communities
    CHECKLIST How to find the best hashtags for your business Hashtags are a simple way to boost your traffic and target specific online communities. This checklist will show you everything you need to know— from the best research tools to tactics for each social media network. What is a hashtag? A hashtag is keyword or phrase (without spaces) that contains the # symbol. Marketers tend to use hashtags to either join a conversation around a particular topic (such as #veganhealthchat) or create a branded community (such as Herschel’s #WellTravelled). HOW TO FIND THE BEST HASHTAGS FOR YOUR BUSINESS 1 WAYS TO USE 3 HASHTAGS 1. Find a specific audience Need to reach lawyers interested in tech? Or music lovers chatting about their favorite stereo gear? Hashtags are a simple way to find and reach niche audiences. 2. Ride a trend From discovering soon-to-be viral videos to inspiring social movements, hashtags can quickly connect your brand to new customers. Use hashtags to discover trending cultural moments. 3. Track results It’s easy to monitor hashtags across multiple social channels. From live events to new brand campaigns, hashtags both boost engagement and simplify your reporting. HOW TO FIND THE BEST HASHTAGS FOR YOUR BUSINESS 2 HOW HASHTAGS WORK ON EACH SOCIAL NETWORK Twitter Hashtags are an essential way to categorize content on Twitter. Users will often follow and discover new brands via hashtags. Try to limit to two or three. Instagram Hashtags are used to build communities and help users find topics they care about. For example, the popular NYC designer Jessica Walsh hosts a weekly Q&A session tagged #jessicasamamondays.
    [Show full text]
  • Studying Social Tagging and Folksonomy: a Review and Framework
    Studying Social Tagging and Folksonomy: A Review and Framework Item Type Journal Article (On-line/Unpaginated) Authors Trant, Jennifer Citation Studying Social Tagging and Folksonomy: A Review and Framework 2009-01, 10(1) Journal of Digital Information Journal Journal of Digital Information Download date 02/10/2021 03:25:18 Link to Item http://hdl.handle.net/10150/105375 Trant, Jennifer (2009) Studying Social Tagging and Folksonomy: A Review and Framework. Journal of Digital Information 10(1). Studying Social Tagging and Folksonomy: A Review and Framework J. Trant, University of Toronto / Archives & Museum Informatics 158 Lee Ave, Toronto, ON Canada M4E 2P3 jtrant [at] archimuse.com Abstract This paper reviews research into social tagging and folksonomy (as reflected in about 180 sources published through December 2007). Methods of researching the contribution of social tagging and folksonomy are described, and outstanding research questions are presented. This is a new area of research, where theoretical perspectives and relevant research methods are only now being defined. This paper provides a framework for the study of folksonomy, tagging and social tagging systems. Three broad approaches are identified, focusing first, on the folksonomy itself (and the role of tags in indexing and retrieval); secondly, on tagging (and the behaviour of users); and thirdly, on the nature of social tagging systems (as socio-technical frameworks). Keywords: Social tagging, folksonomy, tagging, literature review, research review 1. Introduction User-generated keywords – tags – have been suggested as a lightweight way of enhancing descriptions of on-line information resources, and improving their access through broader indexing. “Social Tagging” refers to the practice of publicly labeling or categorizing resources in a shared, on-line environment.
    [Show full text]
  • Acceptable Use of Instant Messaging Issued by the CTO
    State of West Virginia Office of Technology Policy: Acceptable Use of Instant Messaging Issued by the CTO Policy No: WVOT-PO1010 Issued: 11/24/2009 Revised: 12/22/2020 Page 1 of 4 1.0 PURPOSE This policy details the use of State-approved instant messaging (IM) systems and is intended to: • Describe the limitations of the use of this technology; • Discuss protection of State information; • Describe privacy considerations when using the IM system; and • Outline the applicable rules applied when using the State-provided system. This document is not all-inclusive and the WVOT has the authority and discretion to appropriately address any unacceptable behavior and/or practice not specifically mentioned herein. 2.0 SCOPE This policy applies to all employees within the Executive Branch using the State-approved IM systems, unless classified as “exempt” in West Virginia Code Section 5A-6-8, “Exemptions.” The State’s users are expected to be familiar with and to comply with this policy, and are also required to use their common sense and exercise their good judgment while using Instant Messaging services. 3.0 POLICY 3.1 State-provided IM is appropriate for informal business use only. Examples of this include, but may not be limited to the following: 3.1.1 When “real time” questions, interactions, and clarification are needed; 3.1.2 For immediate response; 3.1.3 For brainstorming sessions among groups; 3.1.4 To reduce chances of misunderstanding; 3.1.5 To reduce the need for telephone and “email tag.” 3.2 Employees must only use State-approved instant messaging.
    [Show full text]
  • Geotagging Photos to Share Field Trips with the World During the Past Few
    Geotagging photos to share field trips with the world During the past few years, numerous new online tools for collaboration and community building have emerged, providing web-users with a tremendous capability to connect with and share a variety of resources. Coupled with this new technology is the ability to ‘geo-tag’ photos, i.e. give a digital photo a unique spatial location anywhere on the surface of the earth. More precisely geo-tagging is the process of adding geo-spatial identification or ‘metadata’ to various media such as websites, RSS feeds, or images. This data usually consists of latitude and longitude coordinates, though it can also include altitude and place names as well. Therefore adding geo-tags to photographs means adding details as to where as well as when they were taken. Geo-tagging didn’t really used to be an easy thing to do, but now even adding GPS data to Google Earth is fairly straightforward. The basics Creating geo-tagged images is quite straightforward and there are various types of software or websites that will help you ‘tag’ the photos (this is discussed later in the article). In essence, all you need to do is select a photo or group of photos, choose the "Place on map" command (or similar). Most programs will then prompt for an address or postcode. Alternatively a GPS device can be used to store ‘way points’ which represent coordinates of where images were taken. Some of the newest phones (Nokia N96 and i- Phone for instance) have automatic geo-tagging capabilities. These devices automatically add latitude and longitude metadata to the existing EXIF file which is already holds information about the picture such as camera, date, aperture settings etc.
    [Show full text]
  • Tag Recommendations in Social Bookmarking Systems
    1 Tag Recommendations in Social Bookmarking Systems Robert Jaschke¨ a,c Leandro Marinho b,d 1. Introduction Andreas Hotho a Lars Schmidt-Thieme b Gerd Stumme a,c Folksonomies are web-based systems that allow users to upload their resources, and to label them with a Knowledge & Data Engineering Group (KDE), arbitrary words, so-called tags. The systems can be dis- University of Kassel, tinguished according to what kind of resources are sup- 1 Wilhelmshoher¨ Allee 73, 34121 Kassel, Germany ported. Flickr , for instance, allows the sharing of pho- tos, del.icio.us2 the sharing of bookmarks, CiteULike3 http://www.kde.cs.uni-kassel.de 4 b and Connotea the sharing of bibliographic references, Information Systems and Machine Learning Lab and last.fm5 the sharing of music listening habits. Bib- (ISMLL), University of Hildesheim, 6 Sonomy allows to share bookmarks and BIBTEX based Samelsonplatz 1, 31141 Hildesheim, Germany publication entries simultaneously. http://www.ismll.uni-hildesheim.de In their core, these systems are all very similar. Once c Research Center L3S, a user is logged in, he can add a resource to the sys- Appelstr. 9a, 30167 Hannover, Germany tem, and assign arbitrary tags to it. The collection of all his assignments is his personomy, the collection of http://www.l3s.de folksonomy d all personomies constitutes the . The user Brazilian National Council Scientific and can explore his personomy, as well as the whole folk- Technological Research (CNPq) scholarship holder. sonomy, in all dimensions: for a given user one can see all resources he has uploaded, together with the tags he Abstract.
    [Show full text]
  • Personalization in Folksonomies Based on Tag Clustering Jonathan Gemmell, Andriy Shepitsen, Bamshad Mobasher, Robin Burke
    Personalization in Folksonomies Based on Tag Clustering Jonathan Gemmell, Andriy Shepitsen, Bamshad Mobasher, Robin Burke Center for Web Intelligence School of Computing, DePaul University Chicago, Illinois, USA {jgemmell,ashepits,mobasher,rburke}@cti.depaul.edu Abstract through the folksonomy without being tied to a pre-defined navigational or conceptual hierarchy. The freedom to ex- Collaborative tagging systems, sometimes referred to as plore this large information space of resources, tags, or even “folksonomies,” enable Internet users to annotate or search for resources using custom labels instead of being restricted other users is central to the utility and popularity of collab- by pre-defined navigational or conceptual hierarchies. How- orative tagging. Tags make it easy and intuitive to retrieve ever, the flexibility of tagging brings with it certain costs. Be- previously viewed resources (Hammond et al. 2005). Fur- cause users are free to apply any tag to any resource, tag- ther, tagging allows users to categorized resources by sev- ging systems contain large numbers of redundant, ambigu- eral terms, rather than one directory or a single branch of ous, and idiosyncratic tags which can render resource discov- an ontology (Millen, Feinberg, and Kerr 2006). Collabora- ery difficult. Data mining techniques such as clustering can tive tagging systems have a low entry cost when compared be used to ameliorate this problem by reducing noise in the to systems that require users to conform to a rigid hierarchy. data and identifying trends. In particular, discovered patterns Furthermore, users may enjoy the social aspects of collab- can be used to tailor the system’s output to a user based on the orative tagging (Choy and Lui 2006).
    [Show full text]
  • The Advantages and Disadvantages of Social Tagging: Evaluation of Delicious Website1
    The Advantages and Disadvantages of Social Tagging: Evaluation of Delicious Website1 Ruslan Lecturer of Library Science Department Faculty of Letter and Humanism Ar-Raniry State Islamic University Banda Aceh - Indonesia E-mail: [email protected] Introduction The internet is the fastest growing and largest tool for mass communication and information distribution in the world. It can be used to distribute large amounts of information anywhere in the world at a minimal cost. This progress also can be seen from the emergence of Web 2.02, a form of social computing which engages consumers at the grassroots level in systems that necessitate creative, collaborative or information sharing tasks. Web 2.0 encompasses social bookmarking, blogging, wikis and online social networking among others. One of the ways users can do this is through tagging. Tagging is referred to with several names: collaborative tagging, social classification, social indexing, folksonomy, etc. The basic principle is that end users do subject indexing instead of experts only, and the assigned tags are being shown immediately on the Web (Voss, 2007). Nowadays, social bookmarking systems have been successful in attracting and retaining users. This success initially originated from members’ ability to centrally store bookmarks on the web. 1 This is assignment paper of author when studying in School of Information Science, McGill University, Montreal-Canada, 2009. 2 Web 2.0 is a set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet—a more mature, distinctive medium characterized by user participation, openness, and network effects.
    [Show full text]
  • Working with Feeds, RSS, and Atom
    CHAPTER 4 Working with Feeds, RSS, and Atom A fundamental enabling technology for mashups is syndication feeds, especially those packaged in XML. Feeds are documents used to transfer frequently updated digital content to users. This chapter introduces feeds, focusing on the specific examples of RSS and Atom. RSS and Atom are arguably the most widely used XML formats in the world. Indeed, there’s a good chance that any given web site provides some RSS or Atom feed—even if there is no XML-based API for the web site. Although RSS and Atom are the dominant feed format, other formats are also used to create feeds: JSON, PHP serialization, and CSV. I will also cover those formats in this chapter. So, why do feeds matter? Feeds give you structured information from applications that is easy to parse and reuse. Not only are feeds readily available, but there are many applications that use those feeds—all requiring no or very little programming effort from you. Indeed, there is an entire ecology of web feeds (the data formats, applications, producers, and consumers) that provides great potential for the remix and mashup of information—some of which is starting to be realized today. This chapter covers the following: * What feeds are and how they are used * The semantics and syntax of feeds, with a focus on RSS 2.0, RSS 1.0, and Atom 1.0 * The extension mechanism of RSS 2.0 and Atom 1.0 * How to get feeds from Flickr and other feed-producing applications and web sites * Feed formats other than RSS and Atom in the context of Flickr feeds * How feed autodiscovery can be used to find feeds * News aggregators for reading feeds and tools for validating and scraping feeds * How to remix and mashup feeds with Feedburner and Yahoo! Pipes Note In this chapter, I assume you have an understanding of the basics of XML, including XML namespaces and XML schemas.
    [Show full text]
  • Aggravated with Aggregators: Can International Copyright Law Help Save the News Room?
    Emory International Law Review Volume 26 Issue 2 2012 Aggravated with Aggregators: Can International Copyright Law Help Save the News Room? Alexander Weaver Follow this and additional works at: https://scholarlycommons.law.emory.edu/eilr Recommended Citation Alexander Weaver, Aggravated with Aggregators: Can International Copyright Law Help Save the News Room?, 26 Emory Int'l L. Rev. 1161 (2012). Available at: https://scholarlycommons.law.emory.edu/eilr/vol26/iss2/19 This Comment is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory International Law Review by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. WEAVER GALLEYSPROOFS1 5/2/2013 9:30 AM AGGRAVATED WITH AGGREGATORS: CAN INTERNATIONAL COPYRIGHT LAW HELP SAVE THE NEWSROOM? INTRODUCTION The creation of the World Wide Web was based on a concept of universality that would allow a link to connect to anywhere on the Internet.1 Although the Internet has transformed from a technical luxury into an indispensable tool in today’s society, this concept of universality remains. Internet users constantly click from link to link as they explore the rich tapestry of the World Wide Web to view current events, research, media, and more. Yet, few Internet users pause their daily online activity to think of the legal consequences of these actions.2 Recent Internet censorship measures intended to prevent illegal downloading, such as the proposed Stop Online Piracy Act (“SOPA”), have been at the forefront of the public’s attention due to fears of legislative limits on online free speech and innovation.3 However, the more common activity of Internet linking also creates the potential for legal liability 1 See Tim Berners-Lee, Realising the Full Potential of the Web, 46 TECHNICAL COMM.
    [Show full text]
  • Priority Objective 3 Data Tagging Functional Requirements Document, Is Called for by the 2014 Strategic Implementation Plan (SIP) for the NSISS
    PRIORITY OBJECTIVE 3 DATA TAGGING FUNCTIONAL REQUIREMENTS VERSION 1.0 DECEMBER 2014 UNCLASSIFIED i UNCLASSIFIED PRIORITY OBJECTIVE 3 DATA TAGGING FUNCTIONAL REQUIREMENTS UNCLASSIFIED ii UNCLASSIFIED PRIORITY OBJECTIVE 3 DATA TAGGING FUNCTIONAL REQUIREMENTS A joint initiative conducted by the Office of the Program Manager, Information Sharing Environment (PM-ISE) and the Department of Homeland Security Report Produced by the Information Sharing and Access (ISA) Interagency Policy Committee (IPC) Information Integration Subcommittee (IISC) for the Information Sharing Environment (ISE) UNCLASSIFIED i i i UNCLASSIFIED PRIORITY OBJECTIVE 3 DATA TAGGING FUNCTIONAL REQUIREMENTS CONTENTS LIST OF FIGURES ........................................................................................................................................................... V LIST OF TABLES ............................................................................................................................................................. V 1 INTRODUCTION .......................................................................................................................................................1 1.1 References and Authorities ................................................................................................................... 2 1.2 Relation to Other Documents ............................................................................................................... 2 1.2.1 Relation to the NSISS and SIP ........................................................................................................
    [Show full text]
  • 7 Things You Should Know About Social Bookmarking
    7 things you should know about... Social Bookmarking Scenario What is it? Professor Smith does much of his work on the Web Social bookmarking is the practice of saving bookmarks to a these days. When he is not teaching or doing primary public Web site and “tagging” them with keywords. Bookmark- research, he spends time on the Web looking for in- ing, on the other hand, is the practice of saving the address of formation related to his area of expertise. Dr. Smith a Web site you wish to visit in the future on your computer. To gets his information from many sources: he receives create a collection of social bookmarks, you register with a social e-mail newsletters from professional organizations bookmarking site, which lets you store bookmarks, add tags of and colleagues, he subscribes to several dozen RSS your choice, and designate individual bookmarks as public or newsfeeds, and he uses search engines to help un- private. Some sites periodically verify that bookmarks still work, cover resources that may be of value in his teaching notifying users when a URL no longer functions. Visitors to social and research. 1bookmarking sites can search for resources by keyword, person, or popularity and see the public bookmarks, tags, and classifica- He uses folders in his Web browser to organize book- tion schemes that registered users have created and saved. marks of online resources, but this practice has be- come inefficient. If a resource is relevant to several topic areas, he has to save that bookmark in multiple folders. At times he will discover that his essential Who is doing it? Social bookmarking dates back just a couple of years, when sites bookmarks are on his home machine while he is at like Furl, Simpy, and del.icio.us began operating.
    [Show full text]
  • Free Podcasting with Archive.Org/Wordpress If Any of This Doesn’T Work for Some Reason, Feel Free to Contact Me Via the Contact Page of My Website
    Free Podcasting with Archive.org/Wordpress If any of this doesn’t work for some reason, feel free to contact me via the contact page of my website. PART A: Uploading audio to Archive.org 1. Make an archive.org account. 2. Upload the audio for one episode with whatever title/description/tag you want. 3. Once the audio is uploaded, edit the metadata and include a custom field entitled "enclosure" that you then put the link to the MP3 of the audio in that enclosure field, which you can find on the audio's page on Archive.org. (View of the audio page on Archive.org) (View of the enclosure tag in the editing metadata section) PART B: Creating RSS feed with Wordpress 1. Make a Wordpress account and a new free Wordpress site (www.yoursitename.wordpress.com). 2. Go to www.yoursitename.wordpress.com/wp-admin. On the sidebar, go to Posts > Categories and make a new category new called "Podcast". 3. On the sidebar again, go to Settings > Media and there will be a section called "Podcasting". Fill this out with the information about your podcast, including title, thumbnail, etc. This is the podcast XML data that iTunes, etc. need to show your podcast on their site. Make sure you select "Podcast" as the "Category to set as feed." This is how Wordpress knows to make an RSS feed out of your podcast posts only. Now your XML and RSS feed is set up and you just need to populate it with posts (aka episodes). 4. On the sidebar, go to Posts > Add New.
    [Show full text]