Twitter Topic Modeling by Tweet Aggregation

Total Page:16

File Type:pdf, Size:1020Kb

Twitter Topic Modeling by Tweet Aggregation Twitter Topic Modeling by Tweet Aggregation Asbjørn Ottesen Steinskog Jonas Foyn Therkelsen Björn Gambäck Department of Computer Science Norwegian University of Science and Technology NO–7491 Trondheim, Norway [email protected] [email protected] [email protected] Abstract yield interesting results about people’s inter- ests. One could for example compare the top- Conventional topic modeling ics different politicians tend to talk about to schemes, such as Latent Dirich- obtain a greater understanding of their simi- let Allocation, are known to perform larities and differences. Twitter has an abun- inadequately when applied to tweets, dance of messages, and the enormous amount due to the sparsity of short documents. of tweets posted every second makes Twitter To alleviate these disadvantages, we suitable for such tasks. However, detecting apply several pooling techniques, topics in tweets can be a challenging task due aggregating similar tweets into indi- to their informal type of language and since vidual documents, and specifically tweets usually are more incoherent than tra- study the aggregation of tweets shar- ditional documents. The community has also ing authors or hashtags. The results spawned user-generated metatags, like hash- show that aggregating similar tweets tags and mentions, that have analytical value into individual documents signifi- for opinion mining. cantly increases topic coherence. The paper describes a system aimed at dis- covering trending topics and events in a cor- 1 Introduction pus of tweets, as well as exploring the top- Due to the tremendous amount of data broad- ics of different Twitter users and how they casted on microblog sites like Twitter, extract- relate to each other. Utilizing Twitter meta- ing information from microblogs has turned data mitigates the disadvantages tweets typi- out to be useful for establishing the public cally have when using standard topic model- opinion on different issues. O’Connor et al. ing methods; user information as well as hash- (2010) found a correlation between word fre- tag co-occurrences can give a lot of insight quencies in Twitter and public opinion sur- into what topics are currently trending. veys in politics. Analyzing tweets (Twitter The rest of the text is outlined as follows: messages) over a timespan can give great in- Section 2 describes the topic modeling task sights into what happened during that time, and some previous work in the field, while as people tend to tweet about what concerns Section 3 outlines our topic modeling strate- them and their surroundings. Many influential gies, and Section 4 details a set of experi- people post messages on Twitter, and inves- ments using these. Section 5 then discusses tigating the relation between the underlying and sums up the results, before pointing to topics of different authors’ messages could some directions for future research. 77 Proceedings of the 21st Nordic Conference of Computational Linguistics, pages 77–86, Gothenburg, Sweden, 23-24 May 2017. c 2017 Linkoping¨ University Electronic Press 2 Topic modeling ics is first sampled from a Dirichlet distribu- tion, and a topic is chosen based on this distri- Topic models are statistical methods used to bution. Each document is modeled as a distri- represent latent topics in document collec- bution over topics, with topics represented as tions. These probabilistic models usually distributions over words (Blei, 2012). present topics as multinomial distributions over words, assuming that each document in Koltsova and Koltcov (2013) used LDA a collection can be described as a mixture of mainly on topics regarding Russian presiden- topics. The language used in tweets is of- tial elections, but also on recreational and ten informal, containing grammatically cre- other topics, with a dataset of all posts by ative text, slang, emoticons and abbreviations, 2,000 LiveJournal bloggers. Despite the broad making it more difficult to extract topics from categories, LDA showed its robustness by tweets than from more formal text. correctly identifying 30–40% of the topics. Sotiropoulos et al. (2014) obtained similar The 2015 International Workshop on Se- results on targeted sentiment towards topics mantic Evaluation (SemEval) presented a task related to two US telecommunication firms, on Topic-Based Message Polarity Classifica- while Waila et al. (2013) identified socio- tion, similar to the topic of this paper. The political events and entities during the Arab most successful systems used text preprocess- Spring, to find global sentiment towards these. ing and standard methods: Boag et al. (2015) took a supervised learning approach using lin- The Author-topic model (Rosen-Zvi et al., ear SVM (Support Vector Machines), heav- 2004) is an LDA extension taking information ily focused on feature engineering, to reach about an author into account: for each word the best performance of all. Plotnikova et al. in a document d, an author from the docu- (2015) came in second utilizing another super- ment’s set of authors is chosen at random. A vised method, Maximum Entropy, with lexi- topic t is then chosen from a distribution over con and emoticon scores and trigrams, while topics specific to the author, and the word is essentially ignoring topics, which is interest- generated from that topic. The model gives ing given the task. Zhang et al. (2015) differed information about the diversity of the topics from the other techniques by focusing on word covered by an author, and makes it possible to embedding features, as well as the traditional calculate the distance between the topics cov- textual features, but argued that to only extend ered by different authors, to see how similar the model with the word embeddings did not they are in their themes and topics. necessarily significantly improve results. Topic modeling algorithms have gained in- Although the informal language and sparse creased attention in modeling tweets. How- text make it difficult to retrieve the underly- ever, tweets pose some difficulties because ing topics in tweets, Weng et al. (2010) pre- of their sparseness, as the short documents viously found that Latent Dirichlet Alloca- might not contain sufficient data to establish tion (LDA) produced decent results on tweets. satisfactory term co-occurrences. Therefore, LDA (Blei et al., 2003) is an unsupervised pooling techniques (which involve aggregat- probabilistic model which generates mixtures ing related tweets into individual documents) of latent topics from a collection of docu- might improve the results produced by stan- ments, where each mixture of topics produces dard topic model methods. Pooling tech- words from the collection’s vocabulary with niques include, among others, aggregation of certain probabilities. A distribution over top- tweets that share hashtags and aggregation of 78 tweets that share author. Hong and Davison However, statistical methods cannot model (2010) compare the LDA topic model with a human’s perception of the coherence in a an Author-topic model for tweets, finding that topic model perfectly, so human judgement the topics learned from these methods differ is commonly used to evaluate topic models. from each other. By aggregating tweets writ- Chang et al. (2009) propose two tasks where ten by an author into one individual document, humans can evaluate topic models: Word in- they mitigate the disadvantages caused by the trusion lets humans measure the coherence of sparse nature of tweets. Moreover, Quan et the topics in a model by evaluating the la- al. (2015) present a solution for topic model- tent space in the topics. The human subject ing for sparse documents, finding that auto- is presented with six words, and the task is matic text aggregation during topic modeling to find the intruder, which is the one word is able to produce more interpretable topics that does not belong with the others. The idea from short texts than standard topic models. is that the subject should easily identify that word when the set of words minus the intruder 3 Extracting topic models makes sense together. In topic intrusion, sub- jects are shown a document’s title along with Topic models can be extracted in several the first few words of the document and four ways, in addition to the LDA-based meth- topics. Three of those are the highest proba- ods and SemEval methods outlined above. bility topics assigned to the document, while Specifically, here three sources of information the intruder topic is chosen randomly. are singled out for this purpose: topic model scores, topic clustering, and hashtags. In addition to these methods, we introduce a way to evaluate author-topic models, specif- 3.1 Topic model scoring ically with the Twitter domain in mind. A topic mixture for each author is obtained from The unsupervised nature of topic discovery the model. The human subjects should know makes the assessment of topic models chal- the authors in advance, and have a fair under- lenging. Quantitative metrics do not necessar- standing of which topics the authors are gen- ily provide accurate reflections of a human’s erally interested in. The subjects are then pre- perception of a topic model, and hence a vari- sented a list of authors, along with topic distri- ety of evaluation metrics have been proposed. butions for each author (represented by the 10 The UMass coherence metric (Mimno et most probable topics, with each topic given by al., 2011) measures topic coherence: C = M m 1 D(wm,wl )+1 its 10 most probable words). The task of the ∑ = ∑ − log with (w1,...,wM) m 2 l=1 D(wl ) subject is to deduce which topic distribution being the M most probable words in the topic, belongs to which author. The idea is that co- D(w) the number of documents that contain herent topics would make it easy to recognize word w, and D(w ,w ) the number of doc- m l authors from a topic mixture, as author inter- uments that contain both words w and w .
Recommended publications
  • COVID-19: How Hateful Extremists Are Exploiting the Pandemic
    COVID-19 How hateful extremists are exploiting the pandemic July 2020 Contents 3 Introduction 5 Summary 6 Findings and recommendations 7 Beliefs and attitudes 12 Behaviours and activities 14 Harms 16 Conclusion and recommendations Commission for Countering Extremism Introduction that COVID-19 is punishment on China for their treatment of Uighurs Muslims.3 Other conspiracy theories suggest the virus is part of a Jewish plot4 or that 5G is to blame.5 The latter has led to attacks on 5G masts and telecoms engineers.6 We are seeing many of these same narratives reoccur across a wide range of different ideologies. Fake news about minority communities has circulated on social media in an attempt to whip up hatred. These include false claims that mosques have remained open during 7 Since the outbreak of the coronavirus (COVID-19) lockdown. Evidence has also shown that pandemic, the Commission for Countering ‘Far Right politicians and news agencies [...] Extremism has heard increasing reports of capitalis[ed] on the virus to push forward their 8 extremists exploiting the crisis to sow division anti-immigrant and populist message’. Content and undermine the social fabric of our country. such as this normalises Far Right attitudes and helps to reinforce intolerant and hateful views We have heard reports of British Far Right towards ethnic, racial or religious communities. activists and Neo-Nazi groups promoting anti-minority narratives by encouraging users Practitioners have told us how some Islamist to deliberately infect groups, including Jewish activists may be exploiting legitimate concerns communities1 and of Islamists propagating regarding securitisation to deliberately drive a anti-democratic and anti-Western narratives, wedge between communities and the British 9 claiming that COVID-19 is divine punishment state.
    [Show full text]
  • Event Identification and Analysis on Twitter Qiming DIAO Singapore Management University, [email protected]
    Singapore Management University Institutional Knowledge at Singapore Management University Dissertations and Theses Collection (Open Access) Dissertations and Theses 8-2015 Event identification and analysis on Twitter Qiming DIAO Singapore Management University, [email protected] Follow this and additional works at: https://ink.library.smu.edu.sg/etd_coll Part of the Databases and Information Systems Commons, and the Social Media Commons Citation DIAO, Qiming. Event identification and analysis on Twitter. (2015). 1-90. Dissertations and Theses Collection (Open Access). Available at: https://ink.library.smu.edu.sg/etd_coll/126 This PhD Dissertation is brought to you for free and open access by the Dissertations and Theses at Institutional Knowledge at Singapore Management University. It has been accepted for inclusion in Dissertations and Theses Collection (Open Access) by an authorized administrator of Institutional Knowledge at Singapore Management University. For more information, please email [email protected]. Event Identification and Analysis on Twitter by Qiming DIAO Submitted to School of Information Systems in partial fulfillment of the requirements for the Degree of Doctor of Philosophy in Information Systems Dissertation Committee: Jing JIANG (Supervisor / Chair) Assistant Professor of Information Systems Singapore Management University Hady W. LAUW Assistant Professor of Information Systems Singapore Management University Ee-Peng LIM Professor of Information Systems Singapore Management University Wee Sun LEE Associate Professor of Computer Science National University of Singapore Singapore Management University 2015 Copyright (2015) Qiming DIAO Event Identification and Analysis on Twitter Qiming DIAO Abstract With the rapid growth of social media, Twitter has become one of the most widely adopted platforms for people to post short and instant messages.
    [Show full text]
  • Why Are Some Websites Researched More Than Others? a Review of Research Into the Global Top Twenty Mike Thelwall
    Why are some websites researched more than others? A review of research into the global top twenty Mike Thelwall How to cite this article: Thelwall, Mike (2020). “Why are some websites researched more than others? A review of research into the global top twenty”. El profesional de la información, v. 29, n. 1, e290101. https://doi.org/10.3145/epi.2020.ene.01 Manuscript received on 28th September 2019 Accepted on 15th October 2019 Mike Thelwall * https://orcid.org/0000-0001-6065-205X University of Wolverhampton, Statistical Cybermetrics Research Group Wulfruna Street Wolverhampton WV1 1LY, UK [email protected] Abstract The web is central to the work and social lives of a substantial fraction of the world’s population, but the role of popular websites may not always be subject to academic scrutiny. This is a concern if social scientists are unable to understand an aspect of users’ daily lives because one or more major websites have been ignored. To test whether popular websites may be ignored in academia, this article assesses the volume and citation impact of research mentioning any of twenty major websites. The results are consistent with the user geographic base affecting research interest and citation impact. In addition, site affordances that are useful for research also influence academic interest. Because of the latter factor, however, it is not possible to estimate the extent of academic knowledge about a site from the number of publications that mention it. Nevertheless, the virtual absence of international research about some globally important Chinese and Russian websites is a serious limitation for those seeking to understand reasons for their web success, the markets they serve or the users that spend time on them.
    [Show full text]
  • Popsters Research 2020 English
    Global Report Social Media Users Activity The research of users activity for various types of content in Social Media for 2020 Relative Activity by Text Length in Posts 29-42 Relative Activity by Attachments in Posts 62-73 Methodology I 30 Methodology I 63 Methodology II 31 Methodology II 64 Methodology III 32 Methodology III 65 Facebook 33 Facebook 66 Instagram 34 Instagram 67 Twitter 35 Twitter 68 YouTube 36 Tumblr 69 Table of contents Tumblr 37 VK 70 VK 38 Ok 71 Ok 39 Telegram 72 Telegram 40 Average 73 Relative Activity by Days of Week 4-16 Coub 41 Average 42 Methodology I 5 Average Engagement Rate of Pages 74-84 Methodology II 6 by Count of Followers Facebook 7 Relative Activity by Text Length in Posts by Days of 43-52 Instagram 8 Week Methodology I 75 Twitter 9 Methodology II 76 YouTube 10 Facebook 44 Methodology III 77 Tumblr 11 Instagram 45 Facebook 78 TikTok 12 Twitter 46 Instagram 79 VK 13 YouTube 47 Twitter 80 Ok 14 Tumblr 48 YouTube 81 Telegram 15 VK 49 TikTok 82 Average 16 Ok 50 VK 83 Telegram 51 Ok 84 Average 52 Relative Activity by Hours of Day 17-28 Methodology I 18 Relative Activity by Text Length in Posts by Hours 53-61 Methodology II 19 of Day Facebook 20 Instagram 21 Facebook 54 Twitter 22 Instagram 55 YouTube 23 Twitter 56 TikTok 24 YouTube 57 VK 25 VK 58 Ok 26 Ok 59 Telegram 27 Telegram 60 Average 28 Average 61 Data source The research is based on 537 million social media posts by 1 106 thousands different pages were analyzed by Popsters users in 10 social networks for 2020: Instagram, Facebook, Ok, VK, Twitter, Telegram, Coub, Tumblr, YouTube and TikTok.
    [Show full text]
  • How Do Strong Social Ties Shape Youth Migration Trajectories (Using Data from the Russian On-Line Social Network
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Zamyatina, Nadezhda; Yashunsky, Alexey Conference Paper How do strong social ties shape youth migration trajectories (using data from the Russian on-line social network www.vk.com) 53rd Congress of the European Regional Science Association: "Regional Integration: Europe, the Mediterranean and the World Economy", 27-31 August 2013, Palermo, Italy Provided in Cooperation with: European Regional Science Association (ERSA) Suggested Citation: Zamyatina, Nadezhda; Yashunsky, Alexey (2013) : How do strong social ties shape youth migration trajectories (using data from the Russian on-line social network www.vk.com), 53rd Congress of the European Regional Science Association: "Regional Integration: Europe, the Mediterranean and the World Economy", 27-31 August 2013, Palermo, Italy, European Regional Science Association (ERSA), Louvain-la-Neuve This Version is available at: http://hdl.handle.net/10419/123906 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte.
    [Show full text]
  • Fedex Social Media Guidelines
    FedEx Social Media Guidelines These Guidelines provide employees with a summary of FedEx’s policies and guidance that apply to personal participation and comments on social media sites such as Facebook, Twitter, Instagram, LinkedIn, QZone, VK, YouTube, Reddit, Snapchat, Google+, Pinterest, Tumblr, blogs and wikis. The Guidelines apply to all external social media situations where you associate yourself with FedEx, interact with other FedEx employees, customers or vendors or comment on FedEx social media posts, products or services. The Guidelines are not intended to limit any employee rights, including privacy or the right to communicate about wages, hours or terms and conditions of employment. As is standard in all industries, FedEx monitors public social media mentions of FedEx for opportunities to engage with customers and employees. If you have any questions about FedEx policies or these Guidelines, ask your manager or your Human Resources department. Authorized FedEx social media accounts Only designated employees are authorized to establish social media profiles or accounts on behalf of FedEx, speak on behalf of FedEx on social media or use social media to conduct FedEx business. If you want to establish a social media presence on behalf of FedEx or a FedEx department, speak on behalf of FedEx in social media or use social media to conduct FedEx business, please contact the FedEx Global Social Media team by sending an email to [email protected]. Question: I want to use my social media account to communicate with FedEx customers in my territory. Do I need approval from FedEx? Answer: Yes. If you plan to use a social media account to conduct FedEx business contact [email protected] for information and approval.
    [Show full text]
  • Trilateral Large-Scale OSN Account Linkability Study Alice Tweeter Bob Yelper Eve Flickerer
    1 Trilateral Large-Scale OSN Account Linkability Study Alice Tweeter Bob Yelper Eve Flickerer Abstract—In the last decade, Online Social Networks (OSNs) to be hybrid sites, that include some social networking have taken the world by storm. They range from superficial functionality, beyond user-provided reviews. Users are to professional, from focused to general-purpose, and, from evaluated by their reputations and there are typically no free-form to highly structured. Numerous people have multiple accounts within the same OSN and even more people have size restrictions on reviews. an account on more than one OSN. Since all OSNs involve Despite their indisputable popularity, OSNs prompt some some amount of user input, often in written form, it is natural privacy concerns.1 With growing revenue on targeted ads, to consider whether multiple incarnations of the same person many OSNs are motivated to increase and broaden user in various OSNs can be effectively correlated or linked. One profiling and, in the process, accumulate large amounts of intuitive means of linking accounts is by using stylometric analysis. Personally Identifiable Information (PII). Disclosure of this This paper reports on (what we believe to be) the first trilateral PII, whether accidental or intentional, can have unpleasant large-scale stylometric OSN linkability study. Its outcome has and even disastrous consequences for some OSN users. Many important implications for OSN privacy. The study is trilateral OSNs acknowledge this concern offering adjustable settings since it involves three OSNs with very different missions: (1) for desired privacy levels. Yelp, known primarily for its user-contributed reviews of various venues, e.g, dining and entertainment, (2) Twitter, popular for its pithy general-purpose micro-blogging style, and (3) Flickr, used A.
    [Show full text]
  • CHECKLIST How to Compare Social Software Platforms
    CHECKLIST How to Compare Social Software Platforms. Introduction Contents Solving social use cases today requires a variety of key capabilities. I. Content Planning & Publishing Amidst all the fancy pictures and hopeful promises, what technology capabilities do brands need to enable their success? II. Moderation Whether brands focus today in one key area (such as publishing across multiple channels), or more complex (such as integrating owned and III. Audiences & Onsite earned) this checklist covers the breadth of social needs. It is organized Engagement into sections to identify with your critical goals. But, each section’s capabilities should actually be inter-connected in the platform–built from one code base–to have all of social in one place. IV. Paid Advertising No matter what requirements are burning today, they will only continue to grow. Social use cases are becoming more advanced V. Listening & Visualization and spreading throughout the organization. When you invest in a social platform, it should easily scale as your needs and social maturity advance. VI. Reporting & Analytics VII. Additional a. Security & Governance b. Mobile c. Global scale & Internationalization d. Social Channels e. Integrations 1 I. Content Planning & Publishing Organize and distribute relevant content for the most impactful audience, time, and channel. Publishing τ Research and track current trends, events, weather, sports events, and more from a single view to Instantly draft, schedule, and publish content to τ inspire real-time content over 20 social
    [Show full text]
  • Top Social Media
    TOP SOCIAL MEDIA 2017 Edition SOCIAL MEDIA NETWORKS Social Media networks you can utilize for your business marketing. FACEBOOK TWITTER INSTAGRAM YOUTUBE Pricing: $0, Pricing: $0, Pricing: $0, Pricing: $0 Pricing varies on advertising Pricing varies on advertising Pricing varies on advertising Major Features(s): Major Features(s): Major Features(s): · A very user friendly interface Major Features(s): · Seamlessly combine. · Photo albums & older posts · Easy to make new contacts to help manage Facebook, Twitter, Instagram and remain on your wall. & extend your social circle Twitter, Linkedin and Google+ Facebook · Can post multiple photos. beyond your friends. · Smartbox inbox to view all · Visually appealing · Can be as wordy ·Posts, or “tweets,” enjoyed the messages your various · Photo filters and easy to use as you wish. by your followers are often social media channels · The ability to market to the · Businesses are even using rebroadcast as re-tweets. Major Drawback(s): younger demographic their Facebook Page as their Major Drawback(s): · YouTube has a vast amount of · Can post multiple photos blogging platform. · Tweets are a moment in rules that need to be adhered so · Utilize Instagram stories time, then lost in a user’s that your partnership can maintain Major Drawback(s): · Can post engaging video Twitter feed a good standing , The amount of · Setup of a Facebook Page is · Limited to 140 Major Drawback(s): rules restricts some aspects of what labor intensive, especially if characters for a tweet · Only available for you can do
    [Show full text]
  • Arxiv:1911.06861V1 [Cs.SI] 15 Nov 2019 Complimentary Features and User Bases
    Large-Scale Parallel Matching of Social Network Profiles Alexander Panchenko1, Dmitry Babaev2, and Sergei Obiedkov3 1 TU Darmstadt, FG Language Technology, Darmstadt, Germany [email protected] 2 Tinkoff Credit Systems Inc., Moscow, Russia [email protected]. 3 National Research University Higher School of Economics, Moscow, Russia [email protected] Abstract. A profile matching algorithm takes as input a user profile of one social network and returns, if existing, the profile of the same person in another social network. Such methods have immediate applications in Internet marketing, search, security, and a number of other domains, which is why this topic saw a recent surge in popularity. In this paper, we present a user identity resolution approach that uses minimal supervision and achieves a precision of 0.98 at a recall of 0.54. Furthermore, the method is computationally efficient and easily paral- lelizable. We show that the method can be used to match Facebook, the most popular social network globally, with VKontakte, the most popular social network among Russian-speaking users. Keywords: User identify resolution, entity resolution, profile matching, record linkage, social networks, social network analysis, Facebook, Vkontakte. 1 Introduction Online social networks enjoy a tremendous success with general public. They have even become a synonym of the Internet for some users. While there are clear global leaders in terms of the number of users, such as Facebook4, Twitter5 and LinkedIn6, these big platforms are constantly challenged by a plethora of niche and/or local social services trying to find their place on the market. For instance, VKontakte7 is an online social network, similar to Facebook in many respects, that enjoys a huge popularity among Russian-speaking users.
    [Show full text]
  • Russian Social Network VK Launches Photo Sharing App 20 July 2015
    Russian social network VK launches photo sharing app 20 July 2015 enthusiasts to turn to Instagram. "This is VK's first service for mobile phones that functions independently from the social network, while being closely integrated to it," VK operations director Andrei Rogozov said in a statement on Monday. "We are creating a new global project that is not limited to the site's users." The launch comes just over a year after Durov's departure from the VK group. The enigmatic founder resigned last year after an enduring conflict with Kremlin-linked shareholders. Following Durov's departure, VK came under the control of Russian Internet group Mail.ru. Russian opposition leader Alexei Navalny takes a selfie photograph with the media during a hearing at Moscow's Lyublinsky district court on May 13, 2015 © 2015 AFP Russia's most popular social network VK has launched a photo-sharing mobile application to rival Facebook's popular Instagram service. Snapster, available on Apple and Android phones since the weekend, allows users to share pictures modified with digital filters. The service also allows users to send pictures that automatically delete themselves after a certain time limit and to embed photos and comments on their VK accounts. VK, sometimes referred to as the "Russian Facebook," was created in 2006 as Vkontakte ("in touch") by young Internet entrepreneur Pavel Durov. The social media network is far more popular than Facebook in former Soviet republics, where it has more than 100 million users. Unlike its US rival Facebook, VK did not have a picture sharing service, leading Russia's selfie 1 / 2 APA citation: Russian social network VK launches photo sharing app (2015, July 20) retrieved 25 September 2021 from https://phys.org/news/2015-07-russian-social-network-vk-photo.html This document is subject to copyright.
    [Show full text]
  • Reinventing Storage for Social Networks with Intel® Technology
    CASE STUDY Cloud Service Providers Data Center Reinventing Storage for Social Networks with Intel® Technology Social network VK engineered a strong storage solution to deliver great performance for its 97 million users and optimize total cost of ownership. Social networking is hugely data intensive. No wonder, then, that data storage consumes a significant part of the budget of VK, Russia’s largest social network. VK modernized its tiered storage using Intel® Optane™ persistent memory, Intel® Optane™ SSDs, Intel® SSDs with non-volatile memory express (NVMe), and Intel® FPGA Programmable Acceleration Cards (PACs). As a result, VK expects to make significant financial savings while improving performance. Challenge • Lower the cost of data storage, growing at a rate of hundreds of petabytes per year.1 • Support data tiering, with data migrating to lower cost storage as it is less frequently accessed. Spotlight on VK • Eliminate the need to store multiple formats of the same image to serve to different end-user devices. VK is the largest social network in Russia and the Commonwealth Solution of Independent States (CIS) • VK re-engineered its storage architecture to lower the cost of storage while with 97 million monthly meeting its demanding performance requirements. active users. Its mission is to • VK upgraded the storage for frequently accessed data in its content delivery connect people, services and network (CDN) to Intel® SSDs with 3D NAND technology, and moved the most companies by creating simple frequently used data to Intel® Optane™ SSDs. and convenient communication tools. Headquartered in St • VK introduced Intel Optane persistent memory for the rating counter servers Petersburg, VK also has bases in that support the newsfeed, migrating data away from more expensive DRAM.
    [Show full text]