The Transcript of Episode 1 (Kevin Rose)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Theescapist 103.Pdf
originally a mass of badly dressed Call and its wide open world. Michael Escapist Forum: I very much respect characters became a group of Zenke speaks to a few radiomen at the the hard work Richard has done over the individuals, individuals selling stuff and forefront of the MMOG podcast movement. years, but I have a very hard time For me, it started way back in 1999. It talking about killing things bigger than And Dana Massey explains what Blizzard reconciling what he’s saying here with was February; I was 15. A friend of mine rats. A guy dressed like a wizard did right with World of Warcraft, but his new chosen medium. had me over to take a look at a new summoned a demon right next to me, worries none of the other players in the game he just got: Ultima Online. He then named it “a” and told it to follow field learned the correct lesson. MMOs are a poor vehicle for telling a showed me an ugly little isometric view him. Then a woman wearing nothing but story. While all MMOs HAVE a story, the of a town called Britain, though I a robe stole the sword I had in my Enjoy! players are usually so busy squabbling couldn’t figure out why - no fog or guys backpack. The whole place teemed with over mechanics or questing for loot that in furry hats. The area he referred to as possibility, and I was hooked. Yours, they couldn’t care less about WHY the bank was overrun with people, real they’re doing it. -
THE TRUTH CAN CATCH the LIE: the FLAWED UNDERSTANDING of ONLINE SPEECH in INRE Anonymous ONLINE SPEAKERS Musetta Durkeet
THE TRUTH CAN CATCH THE LIE: THE FLAWED UNDERSTANDING OF ONLINE SPEECH IN INRE ANoNYMous ONLINE SPEAKERS Musetta Durkeet In the early years of the Internet, many cases seeking disclosure of anonymous online speakers involved large companies seeking to unveil identities of anonymous posters criticizing the companies on online financial message boards.' In such situations, Internet service providers (ISPs)-or, less often, online service providers (OSPs)2-- disclosed individually- identifying information, often without providing defendants notice of this disclosure,' and judges showed hostility towards defendants' motions to quash.4 Often these subpoenas were issued by parties alleging various civil causes of action, including defamation and tortious interference with business contracts.s These cases occurred in a time when courts and the general public alike pictured the Internet as a wild west-like "frontier society,"' devoid of governing norms, where anonymous personalities ran C 2011 Musetta Durkee. t J.D. Candidate, 2012, University of California, Berkeley School of Law. 1. Lyrissa Barnett Lidsky, Anonymity in Cyberspace: What Can We LearnfromJohn Doe?, 50 B.C. L. REv. 1373, 1373-74 (2009). 2. As will be discussed below, there has been some conflation of two separate services that allow users to access the Internet, on the one hand, and engage in various activities, speech, and communication, on the other. Most basically, this Note distinguishes between Internet Service Providers (JSPs) and Online Service Providers (OSPs) in order to separate those services and companies involved with providing subscribers access to the infrastructure of the Internet (ISPs, and their subscribers) and those services and companies involved with providing users with online applications, services, platforms, and spaces on the Internet (OSPs and their users). -
Social Media Why You Should Care What Is Social Media? Social Network
Social Media Why You Should Care IST 331 - Olivier Georgeon, Frank Ritter 31 oct 15 • eMarketer (2007) estimated by 2011 one-half Examples of all Internet users will use social networking • Facebook regulary. • YouTube • By 2015, 75% use • Myspace • Twitter • Del.icio.us • Digg • Etc… 2 What is Social Media? Social Network • Social Network • Online communities of people who share • User Generated Content (UGC) interests and activities, • Social Bookmarking • … or who are interested in exploring the interests and activities of others. • Examples: Facebook, MySpace, LinkedIn, Orkut • Falls to analysis with tools in Ch. 9 3 4 User Generated Content (UGC) Social Bookmarking • A method for Internet users to store, organize, search, • or Consumer Generated Media (CGM) and manage bookmarks of web pages on the Internet with the help of metadata. • Based on communities; • Defined: Media content that is publicly – The more people who bookmark a piece of content, the more available and produced by end-users (user). value it is determined to have. • Examples: Digg, Del.icio.us, StumbleUpon, and reddit….and now combinations • Usually supported by a social network • Examples: Blogs, Micro-blogs, YouTube video, Flickr photos, Wiki content, Facebook wall posts, reddit, Second Life… 5 6 Social Media Principles Generate an activity stream • Automatic • Who you are – Google History, Google Analytics – Personalization • Blog • Who you know • Micro-blog – Browse network – Twitter, yammer, identi.ca • What you do • Mailing groups – Generate an activity stream -
The Joys of Ddos
The Joys of DDoS Barrett Lyon Prolexic Technologies Jay Adelson Digg Network Terrorist Motivations • Extortionists: Many Based in Asia / Eastern Europe _ Most common motivation for DDoS attacks; ransom sites for thousands, and sometimes hundreds of thousands, of dollars _ Once operator agrees to pays, the attacker simply redirects the DDoS at another site (usually in the same industry sector) • Competitive Sabotage _ Rival businesses employ attackers to eliminate competition _ Harm to brand • Hackers Pride _ To gain notoriety, often target high-profile sites _ Censorship • Network Warfare _ Recent attacks to the National Security Agency in the United States show that the Internet can be used to attack government interests. 2 © Prolexic Technologies, 2006 Recap: Extortion • Anonymous EMAIL systems • Rude, use poor English • Attempt to establish communication with president/principals of the Company 3 © Prolexic Technologies, 2006 Recap: Extortion 4 © Prolexic Technologies, 2006 Competitive Sabotage •DVD Sales during Christmas •Rx Sales due to Ad-Words competition •Shutting down payment processing: HYIP / Stormpay.com 5 © Prolexic Technologies, 2006 The attack: Mixed GET/SYN Flood to port 80 6 © Prolexic Technologies, 2006 The attack: PPS rates 7 © Prolexic Technologies, 2006 Hackers Pride •Digg.com: Bad guy (Fred Ghosn of Canada) vs. Kevin Rose 8 © Prolexic Technologies, 2006 Digg and IRC <A> digg.com / revision3.com. <A> tonight. <A> :<. <B> we wull see. <A> fucking kevin rose. <A> i miss. <A> my old bots. <A> from like. <A> 2 years. <A> i had. <A> 1.8 million. <A> :<. <A> my biggest. <A> channel. <A> was. <A> 980k. 9 © Prolexic Technologies, 2006 Digg and IRC Why isn't his attack succeeding? He claims: <A> now i got shit. -
Network Overlap and Content Sharing on Social Media Platforms
Network Overlap and Content Sharing on Social Media Platforms Jing Peng1, Ashish Agarwal2, Kartik Hosanagar3, Raghuram Iyengar3 1School of Business, University of Connecticut 2McCombs School of Business, University of Texas at Austin 3The Wharton School, University of Pennsylvania [email protected] [email protected] {kartikh, riyengar}@wharton.upenn.edu February 15, 2017 Acknowledgments. We benefited from feedback from session participants at 2013 Symposium on Statistical Challenges in eCommerce Research, 2014 International Conference on Information Systems, 2015 Workshop on Information in Networks, 2015 INFORMS Annual Meeting, and 2015 Workshop on Information Systems and Economics. The authors would like to thank Professors Christophe Van den Bulte, Paul Shaman, and Dylan Small for helpful discussions. This project was made possible by financial support extended to the first author through Mack Institute Research Fellowship, President Gutmann's Leadership Award, and Baker Retailing Center PhD Research Grant. 1 Network Overlap and Content Sharing on Social Media Platforms ABSTRACT We study the impact of network overlap – the overlap in network connections between two users – on content sharing in directed social media platforms. We propose a hazards model that flexibly captures the impact of three different measures of network overlap (i.e., common followees, common followers and common mutual followers) on content sharing. Our results indicate a receiver is more likely to share content from a sender with whom they share more common followees, common followers or common mutual followers after accounting for other measures. Additionally, the effect of common followers and common mutual followers is positive when the content is novel but decreases, and may even become negative, when many others in the network have already adopted it. -
Why No Wonder Woman?
Why No Wonder Woman? A REPORT ON THE HISTORY OF WONDER WOMAN AND A CALL TO ACTION!! Created for Wonder Woman Fans Everywhere Introduction by Jacki Zehner with Report Written by Laura Moore April 15th, 2013 Wonder Woman - p. 2 April 15th, 2013 AN INTRODUCTION AND FRAMING “The destiny of the world is determined less by battles that are lost and won than by the stories it loves and believes in” – Harold Goddard. I believe in the story of Wonder Woman. I always have. Not the literal baby being made from clay story, but the metaphorical one. I believe in a story where a woman is the hero and not the victim. I believe in a story where a woman is strong and not weak. Where a woman can fall in love with a man, but she doesnʼt need a man. Where a woman can stand on her own two feet. And above all else, I believe in a story where a woman has superpowers that she uses to help others, and yes, I believe that a woman can help save the world. “Wonder Woman was created as a distinctly feminist role model whose mission was to bring the Amazon ideals of love, peace, and sexual equality to ʻa world torn by the hatred of men.ʼ”1 While the story of Wonder Woman began back in 1941, I did not discover her until much later, and my introduction didnʼt come at the hands of comic books. Instead, when I was a little girl I used to watch the television show starring Lynda Carter, and the animated television series, Super Friends. -
Facebook Timeline
Facebook Timeline 2003 October • Mark Zuckerberg releases Facemash, the predecessor to Facebook. It was described as a Harvard University version of Hot or Not. 2004 January • Zuckerberg begins writing Facebook. • Zuckerberg registers thefacebook.com domain. February • Zuckerberg launches Facebook on February 4. 650 Harvard students joined thefacebook.com in the first week of launch. March • Facebook expands to MIT, Boston University, Boston College, Northeastern University, Stanford University, Dartmouth College, Columbia University, and Yale University. April • Zuckerberg, Dustin Moskovitz, and Eduardo Saverin form Thefacebook.com LLC, a partnership. June • Facebook receives its first investment from PayPal co-founder Peter Thiel for US$500,000. • Facebook incorporates into a new company, and Napster co-founder Sean Parker becomes its president. • Facebook moves its base of operations to Palo Alto, California. N. Lee, Facebook Nation, DOI: 10.1007/978-1-4614-5308-6, 211 Ó Springer Science+Business Media New York 2013 212 Facebook Timeline August • To compete with growing campus-only service i2hub, Zuckerberg launches Wirehog. It is a precursor to Facebook Platform applications. September • ConnectU files a lawsuit against Zuckerberg and other Facebook founders, resulting in a $65 million settlement. October • Maurice Werdegar of WTI Partner provides Facebook a $300,000 three-year credit line. December • Facebook achieves its one millionth registered user. 2005 February • Maurice Werdegar of WTI Partner provides Facebook a second $300,000 credit line and a $25,000 equity investment. April • Venture capital firm Accel Partners invests $12.7 million into Facebook. Accel’s partner and President Jim Breyer also puts up $1 million of his own money. -
The Complete Guide to Social Media from the Social Media Guys
The Complete Guide to Social Media From The Social Media Guys PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Mon, 08 Nov 2010 19:01:07 UTC Contents Articles Social media 1 Social web 6 Social media measurement 8 Social media marketing 9 Social media optimization 11 Social network service 12 Digg 24 Facebook 33 LinkedIn 48 MySpace 52 Newsvine 70 Reddit 74 StumbleUpon 80 Twitter 84 YouTube 98 XING 112 References Article Sources and Contributors 115 Image Sources, Licenses and Contributors 123 Article Licenses License 125 Social media 1 Social media Social media are media for social interaction, using highly accessible and scalable publishing techniques. Social media uses web-based technologies to turn communication into interactive dialogues. Andreas Kaplan and Michael Haenlein define social media as "a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, which allows the creation and exchange of user-generated content."[1] Businesses also refer to social media as consumer-generated media (CGM). Social media utilization is believed to be a driving force in defining the current time period as the Attention Age. A common thread running through all definitions of social media is a blending of technology and social interaction for the co-creation of value. Distinction from industrial media People gain information, education, news, etc., by electronic media and print media. Social media are distinct from industrial or traditional media, such as newspapers, television, and film. They are relatively inexpensive and accessible to enable anyone (even private individuals) to publish or access information, compared to industrial media, which generally require significant resources to publish information. -
2004 February
February 2004 Games and Entertainment Megan Morrone Today you can use the same machine to organize your finances, create a presentation for your boss, and defend the Earth from flesh-eating aliens. But let’s be honest: Even with the crazy advances in software, organizing your finances and creating a presentation for your boss are still not half as much fun as defending the Earth from flesh-eating aliens.That’s why we’ve devoted the entire month of February to the noble pursuit of games and entertainment for PCs, Macs, game consoles, and PDAs. I know what you’re thinking.You’re thinking that you can skip right over this chapter because you’re not a gamer. Gamers are all sweaty, pimpled, 16-year-old boys who lock themselves in their basements sustained only by complex carbohydrates and Mountain Dew for days on end, right? Wrong.Video games aren’t just for young boys anymore. Saying you don’t like video games is like saying you don’t like ice cream or cheese or television or fun.Are you trying to tell me that you don’t like fun? If you watch The Screen Savers,you know that each member of our little TV family has a uniquely different interest in games. Morgan loves a good frag fest, whereas Martin’s tastes tend toward the bizarre (think frogs in blenders or cow tossing.) Kevin knows how to throw a cutting-edge LAN party,while Joshua and Roger like to kick back with old-school retro game emulators. I like to download free and simple low-res games that you can play on even the dinkiest PC, whereas Patrick prefers to build and rebuild the perfect system for the ultimate gaming experience (see February 13).And leave it to Leo to discover the most unique new gaming experience for the consummate early adopter (see February 1). -
A Case Study of the Reddit Community
An Exploration of Discussion Threads in Social News Sites: A Case Study of the Reddit Community Tim Weninger Xihao Avi Zhu Jiawei Han Department of Computer Science University of Illinois Urbana-Champaign Urbana, Illinois 61801 Email: fweninge1, zhu40, [email protected] Abstract—Social news and content aggregation Web sites have submission. These comment threads provide a user-generated become massive repositories of valuable knowledge on a diverse and user-curated commentary on the topic at hand. Unlike range of topics. Millions of Web-users are able to leverage these message board or Facebook-style comments that list comments platforms to submit, view and discuss nearly anything. The users in a flat, chronological order, or Twitter discussions that are themselves exclusively curate the content with an intricate system person-to-person and oftentimes difficult to discern, comment of submissions, voting and discussion. Furthermore, the data on threads in the social news paradigm are permanent (although social news Web sites is extremely well organized by its user-base, which opens the door for opportunities to leverage this data for editable), well-formed and hierarchical. The hierarchical nature other purposes just like Wikipedia data has been used for many of comment threads, where the discussion structure resembles other purposes. In this paper we study a popular social news a tree, is especially important because this allows divergent Web site called Reddit. Our investigation looks at the dynamics sub-topics resulting in a more robust overall discussion. of its discussion threads, and asks two main questions: (1) to In this paper we explore the social news site Reddit in order what extent do discussion threads resemble a topical hierarchy? and (2) Can discussion threads be used to enhance Web search? to gain a deeper understanding on the social, temporal, and We show interesting results for these questions on a very large topical methods that allow these types of user-powered Web snapshot several sub-communities of the Reddit Web site. -
Zach Christopherson PHIL 308 Term Paper March 22, 2009
Zach Christopherson PHIL 308 Term Paper March 22, 2009 Online Communities and the Ethics of Revolt With the creation and widespread use of the Internet in the 1980s came Internet communities. They were originally started in newsgroups, message boards, and Internet forums. A regular group of members would consistently post and exchange ideas and information with one another. Relationships were formed and these communities became permanent entities, usually remaining on the sites where they were created. From time to time a community’s home becomes threatened. This can occur when a site is taken down by the owners, the site becomes obsolete and is replaced by a competitor, or the community migrates to a new home for reasons like censorship or discrimination. Some of the largest online communities exist on message board sites such as GenMay.com (General Mayhem), LiveJournal.com, and 4chan.org. These members share common likes and dislikes which bring them together for general socialization. Over the span of a community’s life differences can arise between the site administrators and the site community that can cause a revolt by the community against the website on which it was created. One of the most popular social news websites on the Internet is Digg.com, which was launched on December 4, 2004 and has housed a strong Internet community since then. The purpose of Digg is to compile many user-submitted news stories and have the community either rate them up (Digg them) or rate them down (Bury them). These ratings are stored on the site and a running counter is shown to the left of the news article title. -
PANAHI-.Pdf (1.237Mb)
© Copyright by Hesam Panahi, 2010 USER-GENERATED CONTENT AND REVOLUTIONS: TOWARDS A THEORIZATION OF WEB 2.0 A Dissertation Presented to The Faculty of the C.T. Bauer College of Business University of Houston In Partial Fulfillment Of the Requirements for the Degree Doctor of Philosophy By Hesam Panahi December, 2010 Introduction ............................................................................................................ 1 Dissertationʼs Research Objective ..................................................................... 2 Dissertationʼs Research Methodology ................................................................ 3 References ......................................................................................................... 5 Paper One: A Critical Study of Social Computing and Web 2.0: The Case of Digg ............................................................................................................................... 6 Introduction ........................................................................................................ 7 Theoretical Background ..................................................................................... 9 Critical Studies of IS ....................................................................................... 9 A Critical Framework for Studying Social Computing ................................... 10 Research Methods ........................................................................................... 15 Why an Interpretive Approach .....................................................................