The document discusses research issues related to analyzing the blogosphere. It provides background on web 2.0, social networks, and defines blogs and the blogosphere. It then discusses key research issues such as understanding the structures and relationships within the blogosphere, modeling and clustering blogs, identifying influential blogs, issues of trust, extracting blog communities, and filtering spam blogs. Tools and APIs for collecting and analyzing blog data are also mentioned.
How Social Networking can Enable Mission Success: An overview for Project Man...Robert_
This document provides an overview of how social media and Web 2.0 tools can enable mission success for project managers. It defines common social media terms like blogs, wikis, tagging, and social networking. It explains how these tools can improve communication, collaboration, and knowledge sharing to address common causes of project failure like poor communication. The document recommends that project managers use internal collaboration tools like team blogs and wikis as well as social networking among team members. It also provides examples of NASA resources available for these purposes.
The document provides an overview of various social media services and platforms. It discusses blogging sites like Blogger and Wordpress, microblogging platforms like Twitter, social networking sites like Facebook and LinkedIn, media sharing sites like Flickr and YouTube, and other services like RSS feeds, wikis, forums, and location sharing. It also covers topics like content ownership, monitoring and aggregating sites, and measuring social media influence and reach over time.
Learning with facebook sandra perusch_slideshareSandra Sabitzer
This document discusses using Facebook in a university environment. It outlines how Facebook can be used to exchange information between teachers and students through groups, discussions, and sharing documents and videos. It also addresses privacy and security issues when sharing information on Facebook. Examples of using Facebook for discussions, video sharing, and creating groups are provided. Limitations of Facebook for educational use are noted, such as group size limits and privacy restrictions.
The document discusses the characteristics and technologies of Web 2.0, including social networking, tagging, commenting, blogging, social bookmarking, and how the web allows for collaboration, sharing, and user-generated content. Web 2.0 sites let users interact and communicate online through tools like social networking sites, wikis, blogs, and media sharing platforms. The presentation covers how libraries can adopt Web 2.0 technologies and principles to encourage participation and user engagement.
Isaac Sukin
About
Art
Blog
Websites
Writing
Home
ADUG slides
Filed Under: Atlanta, Drupal, Modules, Social NetworkingJul.14, 2010
Yesterday night I gave a presentation on Social Networking in Drupal at the Atlanta Drupal Users Group meetup. Grab the slides or watch the video!
The presentation was based on one I gave at DrupalCamp South Carolina/LinuxFest SouthEast.
Also check out the demo site! (Update: the demo site has been taken down.)
The document summarizes key topics discussed in a social media and online communities class. It begins by introducing different social media types like Twitter, Facebook, LinkedIn and blogs. It then discusses in more detail how these services work, like using hashtags on Twitter, personal profiles versus Facebook pages, and using blogs to drive traffic. The document also covers mobile sharing apps, analytics and other functions of social media before concluding with blogging best practices.
Social Media Summer Workshops. Workshop 2: Sharing and Managing Work Online. Jubilee Graduate Centre, University of Nottingham. 2 August 2012, 12.00-2.00pm.
How Social Networking can Enable Mission Success: An overview for Project Man...Robert_
This document provides an overview of how social media and Web 2.0 tools can enable mission success for project managers. It defines common social media terms like blogs, wikis, tagging, and social networking. It explains how these tools can improve communication, collaboration, and knowledge sharing to address common causes of project failure like poor communication. The document recommends that project managers use internal collaboration tools like team blogs and wikis as well as social networking among team members. It also provides examples of NASA resources available for these purposes.
The document provides an overview of various social media services and platforms. It discusses blogging sites like Blogger and Wordpress, microblogging platforms like Twitter, social networking sites like Facebook and LinkedIn, media sharing sites like Flickr and YouTube, and other services like RSS feeds, wikis, forums, and location sharing. It also covers topics like content ownership, monitoring and aggregating sites, and measuring social media influence and reach over time.
Learning with facebook sandra perusch_slideshareSandra Sabitzer
This document discusses using Facebook in a university environment. It outlines how Facebook can be used to exchange information between teachers and students through groups, discussions, and sharing documents and videos. It also addresses privacy and security issues when sharing information on Facebook. Examples of using Facebook for discussions, video sharing, and creating groups are provided. Limitations of Facebook for educational use are noted, such as group size limits and privacy restrictions.
The document discusses the characteristics and technologies of Web 2.0, including social networking, tagging, commenting, blogging, social bookmarking, and how the web allows for collaboration, sharing, and user-generated content. Web 2.0 sites let users interact and communicate online through tools like social networking sites, wikis, blogs, and media sharing platforms. The presentation covers how libraries can adopt Web 2.0 technologies and principles to encourage participation and user engagement.
Isaac Sukin
About
Art
Blog
Websites
Writing
Home
ADUG slides
Filed Under: Atlanta, Drupal, Modules, Social NetworkingJul.14, 2010
Yesterday night I gave a presentation on Social Networking in Drupal at the Atlanta Drupal Users Group meetup. Grab the slides or watch the video!
The presentation was based on one I gave at DrupalCamp South Carolina/LinuxFest SouthEast.
Also check out the demo site! (Update: the demo site has been taken down.)
The document summarizes key topics discussed in a social media and online communities class. It begins by introducing different social media types like Twitter, Facebook, LinkedIn and blogs. It then discusses in more detail how these services work, like using hashtags on Twitter, personal profiles versus Facebook pages, and using blogs to drive traffic. The document also covers mobile sharing apps, analytics and other functions of social media before concluding with blogging best practices.
Social Media Summer Workshops. Workshop 2: Sharing and Managing Work Online. Jubilee Graduate Centre, University of Nottingham. 2 August 2012, 12.00-2.00pm.
I was invited by Greg Valou (Communications, Metro Vancouver) to speak to their social media group about what elements should they consider when designing a social media strategy and why they should do it.
I particularly emphasized the following elements:
(a) Going multi-platform
(b) Choosing a particular pilot project and go with it
(c) Use it as a form of citizen engagement
(d) Make use of all the tools they have in-house.
This social media guide provides information for participants in the Aalto Camp for Societal Innovation (ACSI) on using social media tools during the camp. It outlines the social media mission for ACSI2010 to share information openly and transparently. It describes the ACSI public communication site and intranet document bank. It provides instructions for participants to get started using social media tools like Massidea, Facebook, Twitter, SlideShare and others. It outlines responsibilities and best practices for using these tools at both the individual case group and case codifier level.
Blogs, Wikis and more: Web 2.0 demystified for information professionalsMarieke Guy
Marieke Guy from UKOLN will help you find out how Web 2.0 applications are being used in libraries and information centres, and what actually works. Blogs, wikis, RSS? Podcasts, Slideshare, Flickr and del.icio.us? Social Networking, Social Bookmarking and Video Sharing are the buzz words.
Traditionally, controlled vocabularies and professional indexers organized information in repositories. However, users now have more ability to organize information through social tagging, adding their own keywords and metadata. While social tagging allows users more control over organization, it also introduces inconsistencies compared to controlled vocabularies. An ideal system incorporates both controlled vocabularies and social tags to organize information. New forms of social tagging like hashtags on Twitter are also discussed, along with their benefits and limitations for organizing information.
Web 1.0 focused on commerce while Web 2.0 emphasizes user participation and contribution. The concept of Web 2.0 emerged from a 2004 brainstorming session between O'Reilly and MediaLive International. Key principles of Web 2.0 include customization for unique users, harnessing collective intelligence by allowing users to add value through tagging, reviewing, and editing, and treating software as a perpetual beta through constant updates. Web 2.0 applications are also accessible across multiple devices rather than single devices.
This document discusses personal learning networks (PLNs) and how to establish one. It defines a PLN as using web tools like blogs, wikis and social networks to expand learning, increase reflection, enable collaboration and make global connections. It emphasizes that PLNs leverage technology to connect information and people. The document provides tips for setting up a PLN, including choosing an RSS reader to aggregate relevant feeds and regularly scanning updates. It recommends starting with a small number of subscriptions and investing 10-15 minutes daily to maintain an effective PLN.
Author: Prof. Maged N. Kamel Boulos, MBBCh, MSc (Derm), MSc (Med Informatics), PhD, FHEA, SMIEEE
Associate Professor in Health Informatics
University of Plymouth, UK
---
Themes covered:
Networked Social Media in Learning and Teaching (contexts: higher education; medicine and healthcare, including patient education and clinicians’ collaboration and CPD—Continuing Professional Development).
Networked Social Media in Research (both as a primary focus for research and as tools/enablers in research).
The above two themes are interrelated and frequently overlap in research-led higher education institutions (research-informed teaching and practice).
Sharing on the internet - aka social networking in all of its myriad forms - is explored in this powerpoint presentation that was designed by Yesha Naik and Alexa Goldstein for Dr. Perry's Managing New Technologies class in fall of 2009.
This 6-page document on Social Networking Sites discusses various topics like : comparison of SNS, working of SNS, uses and disadvantages of social networking sites, etc.
This Microsoft word document is in IEEE 2013 standard format.
If you build it, will they come? Leveraging Social Media to Engage Students a...ccsrecruit
“If you build it they will come”. We all wish this were true with social media. You can have a Facebook, Twitter, and Blog, but if you do not use these tools deliberately and strategically to engage your audience, they won’t respond. This session presents a framework and tactics for using social media strategically to promote student and employer participation in on-campus recruiting. Also, learn how to assess your efforts and plan for the future.
This document discusses how libraries can use various Web 2.0 technologies like blogs, wikis, Flickr, RSS feeds, and instant messaging to better engage with users and provide services. It provides examples of how libraries are using these tools, best practices, and tips for implementation. The key benefits highlighted are improved communication, collaboration, and participation between the library and its users.
The document outlines the topics and agenda for the final class of a social media course, including the final project requirements, additional thoughts on video strategies, geolocation apps, QR codes, social media terms, organizations to engage with, personal branding, and a guest speaker. It provides details on video sharing platforms, live streaming options, and how to use geolocation to engage consumers. It also outlines key social media terms and commonly misused terms, and lists social media and technology conferences and groups to get involved with.
Social Media 101 for Jewish Communal ProfessionalsLisa Colton
The document provides an overview of social media and Web 2.0 technologies including blogs, social networking, wikis, Twitter and their implications. It discusses how these tools are participatory, open, conversational and help form online communities. Examples are given of how nonprofits can leverage these technologies for fundraising, outreach and engagement. Strategies are outlined for developing a social media presence including identifying audiences and objectives.
Gilbane 2011 - All the cool web kids are social, is your CMS ready to hang wi...Ian Truscott
Presentation from Gilbane Boston 2011 - discussing content management systems supporting a social media marketing strategy.
If you'd like a copy, let me know on twitter: @iantruscott
Capital University is launching a social media campaign to connect with accepted students and encourage enrollment. They will use Facebook to introduce admitted students to their admissions counselors, invite students to join a "College Choice Day" event, and drive traffic to a microsite promoting why students should commit to Capital. The strategy aims to expand Capital's audience and recruit 600 students through personalized outreach on social media.
This document discusses strategies for fast generation of snippets in web search results. It proposes a Compressed Token System (CTS) that represents documents as compressed integer sequences for faster querying. CTS indexes documents by replacing terms with integers, compressing, and storing in a single file with an offset map. It also explores caching documents in memory to avoid disk access during snippet generation. Simulation results show CTS reduces snippet generation time over the baseline and caching top documents for queries can further reduce disk access.
The history of blogging started with early digital communities like Usenet and BBS forums. The first blogs evolved from online diaries in the 1990s. Blogging rapidly grew in popularity after 1999 with the launch of Open Diary, Pitas.com, and Blogger.com. Today, popular blogging platforms include WordPress, Blogger, TypePad, Movable Type, and Drupal. Blogging allows people to freely express themselves and interact online through regularly updated content.
A blog is a type of website where an individual maintains a regular diary of commentary, descriptions of events, or other content. Blog entries are usually displayed in reverse-chronological order and allow visitors to leave interactive comments. Common types of blogs include personal blogs, corporate/organizational blogs, and genre-focused blogs on topics like travel, fashion, or news. Real estate blogs help position agents as experts by providing commentary and information on local real estate trends.
We looked at the data. Here’s a breakdown of some key statistics about the nation’s incoming presidents’ addresses, how long they spoke, how well, and more.
This document discusses how emojis, emoticons, and text speak can be used to teach students. It provides background on the origins of emoticons in 1982 as ways to convey tone and feelings in text communications. It then suggests that with text speak and emojis, students can translate, decode, summarize, play with language, and add emotion to language. A number of websites and apps that can be used for emoji-related activities, lessons, and discussions are also listed.
I was invited by Greg Valou (Communications, Metro Vancouver) to speak to their social media group about what elements should they consider when designing a social media strategy and why they should do it.
I particularly emphasized the following elements:
(a) Going multi-platform
(b) Choosing a particular pilot project and go with it
(c) Use it as a form of citizen engagement
(d) Make use of all the tools they have in-house.
This social media guide provides information for participants in the Aalto Camp for Societal Innovation (ACSI) on using social media tools during the camp. It outlines the social media mission for ACSI2010 to share information openly and transparently. It describes the ACSI public communication site and intranet document bank. It provides instructions for participants to get started using social media tools like Massidea, Facebook, Twitter, SlideShare and others. It outlines responsibilities and best practices for using these tools at both the individual case group and case codifier level.
Blogs, Wikis and more: Web 2.0 demystified for information professionalsMarieke Guy
Marieke Guy from UKOLN will help you find out how Web 2.0 applications are being used in libraries and information centres, and what actually works. Blogs, wikis, RSS? Podcasts, Slideshare, Flickr and del.icio.us? Social Networking, Social Bookmarking and Video Sharing are the buzz words.
Traditionally, controlled vocabularies and professional indexers organized information in repositories. However, users now have more ability to organize information through social tagging, adding their own keywords and metadata. While social tagging allows users more control over organization, it also introduces inconsistencies compared to controlled vocabularies. An ideal system incorporates both controlled vocabularies and social tags to organize information. New forms of social tagging like hashtags on Twitter are also discussed, along with their benefits and limitations for organizing information.
Web 1.0 focused on commerce while Web 2.0 emphasizes user participation and contribution. The concept of Web 2.0 emerged from a 2004 brainstorming session between O'Reilly and MediaLive International. Key principles of Web 2.0 include customization for unique users, harnessing collective intelligence by allowing users to add value through tagging, reviewing, and editing, and treating software as a perpetual beta through constant updates. Web 2.0 applications are also accessible across multiple devices rather than single devices.
This document discusses personal learning networks (PLNs) and how to establish one. It defines a PLN as using web tools like blogs, wikis and social networks to expand learning, increase reflection, enable collaboration and make global connections. It emphasizes that PLNs leverage technology to connect information and people. The document provides tips for setting up a PLN, including choosing an RSS reader to aggregate relevant feeds and regularly scanning updates. It recommends starting with a small number of subscriptions and investing 10-15 minutes daily to maintain an effective PLN.
Author: Prof. Maged N. Kamel Boulos, MBBCh, MSc (Derm), MSc (Med Informatics), PhD, FHEA, SMIEEE
Associate Professor in Health Informatics
University of Plymouth, UK
---
Themes covered:
Networked Social Media in Learning and Teaching (contexts: higher education; medicine and healthcare, including patient education and clinicians’ collaboration and CPD—Continuing Professional Development).
Networked Social Media in Research (both as a primary focus for research and as tools/enablers in research).
The above two themes are interrelated and frequently overlap in research-led higher education institutions (research-informed teaching and practice).
Sharing on the internet - aka social networking in all of its myriad forms - is explored in this powerpoint presentation that was designed by Yesha Naik and Alexa Goldstein for Dr. Perry's Managing New Technologies class in fall of 2009.
This 6-page document on Social Networking Sites discusses various topics like : comparison of SNS, working of SNS, uses and disadvantages of social networking sites, etc.
This Microsoft word document is in IEEE 2013 standard format.
If you build it, will they come? Leveraging Social Media to Engage Students a...ccsrecruit
“If you build it they will come”. We all wish this were true with social media. You can have a Facebook, Twitter, and Blog, but if you do not use these tools deliberately and strategically to engage your audience, they won’t respond. This session presents a framework and tactics for using social media strategically to promote student and employer participation in on-campus recruiting. Also, learn how to assess your efforts and plan for the future.
This document discusses how libraries can use various Web 2.0 technologies like blogs, wikis, Flickr, RSS feeds, and instant messaging to better engage with users and provide services. It provides examples of how libraries are using these tools, best practices, and tips for implementation. The key benefits highlighted are improved communication, collaboration, and participation between the library and its users.
The document outlines the topics and agenda for the final class of a social media course, including the final project requirements, additional thoughts on video strategies, geolocation apps, QR codes, social media terms, organizations to engage with, personal branding, and a guest speaker. It provides details on video sharing platforms, live streaming options, and how to use geolocation to engage consumers. It also outlines key social media terms and commonly misused terms, and lists social media and technology conferences and groups to get involved with.
Social Media 101 for Jewish Communal ProfessionalsLisa Colton
The document provides an overview of social media and Web 2.0 technologies including blogs, social networking, wikis, Twitter and their implications. It discusses how these tools are participatory, open, conversational and help form online communities. Examples are given of how nonprofits can leverage these technologies for fundraising, outreach and engagement. Strategies are outlined for developing a social media presence including identifying audiences and objectives.
Gilbane 2011 - All the cool web kids are social, is your CMS ready to hang wi...Ian Truscott
Presentation from Gilbane Boston 2011 - discussing content management systems supporting a social media marketing strategy.
If you'd like a copy, let me know on twitter: @iantruscott
Capital University is launching a social media campaign to connect with accepted students and encourage enrollment. They will use Facebook to introduce admitted students to their admissions counselors, invite students to join a "College Choice Day" event, and drive traffic to a microsite promoting why students should commit to Capital. The strategy aims to expand Capital's audience and recruit 600 students through personalized outreach on social media.
This document discusses strategies for fast generation of snippets in web search results. It proposes a Compressed Token System (CTS) that represents documents as compressed integer sequences for faster querying. CTS indexes documents by replacing terms with integers, compressing, and storing in a single file with an offset map. It also explores caching documents in memory to avoid disk access during snippet generation. Simulation results show CTS reduces snippet generation time over the baseline and caching top documents for queries can further reduce disk access.
The history of blogging started with early digital communities like Usenet and BBS forums. The first blogs evolved from online diaries in the 1990s. Blogging rapidly grew in popularity after 1999 with the launch of Open Diary, Pitas.com, and Blogger.com. Today, popular blogging platforms include WordPress, Blogger, TypePad, Movable Type, and Drupal. Blogging allows people to freely express themselves and interact online through regularly updated content.
A blog is a type of website where an individual maintains a regular diary of commentary, descriptions of events, or other content. Blog entries are usually displayed in reverse-chronological order and allow visitors to leave interactive comments. Common types of blogs include personal blogs, corporate/organizational blogs, and genre-focused blogs on topics like travel, fashion, or news. Real estate blogs help position agents as experts by providing commentary and information on local real estate trends.
We looked at the data. Here’s a breakdown of some key statistics about the nation’s incoming presidents’ addresses, how long they spoke, how well, and more.
This document discusses how emojis, emoticons, and text speak can be used to teach students. It provides background on the origins of emoticons in 1982 as ways to convey tone and feelings in text communications. It then suggests that with text speak and emojis, students can translate, decode, summarize, play with language, and add emotion to language. A number of websites and apps that can be used for emoji-related activities, lessons, and discussions are also listed.
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
This document provides an overview of how social media and Web 2.0 tools can enable mission success for project managers. It defines common social media terms like blogs, wikis, tagging, and social networking. It explains how these tools can improve communication, collaboration, and knowledge sharing to address common causes of project failure like poor communication. The document recommends that project managers use internal collaboration tools like team blogs and wikis as well as social networks to connect with colleagues.
Tracking Social Media Participation: New Approaches to Studying User-Genera...Axel Bruns
This document discusses new approaches for studying user-generated social media content at large scales. It outlines how social media research has traditionally used small-scale qualitative and quantitative methods. New opportunities exist to ask more sophisticated questions by mining massive amounts of publicly available social media data and metadata over time using network crawlers, scrapers, and analysis tools. Examples are provided of tracking hashtags and themes on Twitter, mapping the blogosphere, and comparing music listening on last.fm to sales charts. Interdisciplinary and critical approaches are needed that connect fields like cultural studies and computer science.
Tracking Social Media Participation: New Approaches to Studying User-Genera...Axel Bruns
This document discusses new approaches for studying user-generated social media content at scale. It outlines how large amounts of social media data and metadata are now freely available online and can be analyzed using network crawlers, scrapers, and text/network analysis tools. However, current research has limitations in distinguishing site genres, tracking participation dynamics over time, and accounting for the assumptions built into analysis software. The document advocates developing methods to identify and visualize changes in social media networks and topics over time to answer more sophisticated research questions. It provides examples of potential analyses of Twitter, blogs, music listening, and Wikipedia content and participation.
Flicc Institute for Library Technicians 2011 @ the Library of CongressAileen Marshall
This document discusses social media use in federal libraries. It begins with definitions of social media and describes common goals of using social media such as reaching new audiences and increasing awareness of library resources. It also covers federal policies and guidelines regarding social media use. The document then provides examples of different types of social media tools or platforms including social networks, microblogging, RSS feeds, social bookmarking, wikis, photo/video sharing, blogs, and more. For each it gives the definition and examples of federal libraries using that tool. The goal is to help libraries understand how to develop a social media strategy and presence.
The document discusses various tools that can be used for online collaboration in group projects. It describes blogs as online journals that allow multiple contributors and are good for chronicling progress. Wikis allow editing of shared pages and are useful for organizing complex projects. Google Docs enables real-time collaborative editing of documents. Social bookmarking, custom search engines, and large file sharing services can also aid collaboration by facilitating organization and sharing of resources. Effective collaboration requires coordination of tasks, roles, and logistics both online and in face-to-face meetings. Academic integrity and privacy settings still apply to group work conducted virtually.
New Perspectives on Social Media: Putting Our ‘Known Unknowns’ on the MapAxel Bruns
This document discusses new approaches to researching social media at scale using data mining and network analysis techniques. It notes that while traditional qualitative and small-scale quantitative research on social media provides insights, there is a need to study phenomena like communities and user behaviors over large populations and extended timeframes. The document outlines tools like crawlers, scrapers, and network/text analyzers that can access and analyze massive amounts of publicly available social media data. It provides examples of how such techniques could shed light on dynamics in domains like blogs, music listening, and Wikipedia editing. The document calls for more interdisciplinary work at the intersection of cultural studies, computer science, and research technologies to fully realize the potential of these new approaches.
The document discusses the changing role of librarians due to new information technologies. It lists some modern information sources like blogs, wikis, and social networking sites that librarians can now use. Librarians can take on roles like being a technology specialist, promoting information use, managing institutional repositories, and acting as a community manager by making profiles and groups on social networking sites. New technologies allow librarians to collaborate with users and peers in real time and spread ideas virally.
This document discusses how social media tools related to Web 2.0 can enhance library services. It defines Web 2.0 as enabling collaboration, participation, sharing and transparency among users. Social media tools like blogs, wikis, Twitter, Facebook, social bookmarking, QR codes and augmented reality apps allow users to interact and engage with the library in new ways. The document encourages libraries to explore these tools and take risks in opening their services to possibilities of Web 2.0.
In Search of Australian Blogs: Determining the Extent of the Contemporary Aus...Axel Bruns
The document discusses research into mapping the structure and key topics of the Australian blogosphere. It outlines a multi-stage approach to gather political blogs through RSS feeds, analyze blog content and links, and identify major themes, keywords, and clusters. Initial findings show top blogging themes include parenting, food, and expat communities. The research aims to map the long-term and event-driven structures of online public discussions in Australia and their connections to other social media.
User-generated metadata: Boon or bust for indexing and controlled vocabularies?Louise Spiteri
This document discusses user-generated metadata through social tagging and its impact on indexing and controlled vocabularies. It begins by describing traditional metadata created by authorities and how user tagging allows for customization. Social tagging sites like Delicious allow users to organize bookmarks with their own tags and see recommendations. Limitations of folksonomies include ambiguity and lack of standardization. However, social tagging lowers barriers to cooperation and reflects users' needs. The ideal is to combine controlled vocabularies with user tags to leverage both. New forms of tagging include hashtags and geotags. Overall, social tagging is here to stay so information professionals should embrace it and find ways to integrate it with traditional indexing.
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?Louise Spiteri
This document discusses user-generated metadata through social tagging and its impact on indexing and controlled vocabularies. It begins by describing traditional metadata created by authorities and how user tagging allows for personalized organization. Social tagging sites like Delicious allow users to collaboratively tag items and see recommended tags. Limitations of folksonomies include ambiguity and lack of standardization, but users accept this for increased cooperation. New forms of social tagging include hashtags and geotags. The ideal scenario combines controlled vocabularies with user tags to supplement formal subject headings. Indexers should embrace tagging and see how it impacts retrieval and vocabulary updates.
This document discusses tools for social media engagement and strategies for building staff capacity. It provides an overview of the social media ecosystem and popular platforms like blogs, wikis, YouTube and Twitter. It emphasizes the importance of understanding audience demographics and listening to what people say about an organization online. The document also describes the "23 Things" model for training staff on social media through bite-sized self-guided modules covering different tools and tasks. The goal is to help organizations effectively engage their audiences and build staff skills for using social media.
The webinar discussed social reading experiences of sharing bookmarks and annotations in e-books. It covered three main presentations:
1. Todd Carpenter discussed a NISO working group on digital annotation requirements like specifying how annotations are rendered and challenges with annotating text.
2. Rob Sanderson presented on the W3C Open Annotation model for annotating web resources in RDF. It defines a basic model of annotations as comments linked to targets.
3. Dan Whaley discussed building an annotation platform that supports peer review of annotations to build reputation and scale to large numbers of users and annotations.
The document outlines an agenda for a workshop on social media and social bookmarking to be held on June 29-30 and August 5, 2011. It will cover topics such as the evolution of online media and citizen journalism, social networking, social media like Facebook and Twitter, social bookmarking sites like Delicious, and creating accounts and practicing using these sites. There will also be discussions of writing for the web and sharing documents, photos and videos online. The workshop aims to provide an overview of new media trends and teach practical skills for participating in social media.
The document outlines an agenda for a workshop on social media and social bookmarking. The workshop will be facilitated by Shahjahan Siraj at the University of Liberal Arts Bangladesh on June 29-30 and August 5, 2011. It will cover topics such as new media trends, social networking, social media, social bookmarking, content production for the web, and practical sessions on creating accounts and using platforms like Facebook, Twitter and LinkedIn.
The document discusses designing an online collaborative workshop. It provides background on principles for successful online communities and collaborative tools. It analyzes various technology options before determining that a customized Ning platform best meets the client's needs of encouraging online sharing, feedback and scaling capabilities. Key features of the customized Ning prototype are described.
Training for people creating new online communities. It includes guiding principles for participation, planning and getting started, creating and maintaining a content roadmap, and online community management.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Choosing The Best AWS Service For Your Website + API.pptx
Blogosphere by FrancoSH
1. Blogosphere: Research Issues, Tools
xxxx
and Applications
Franco Sánchez Huertas
(UCSP)
EDA – June, 2010
21/06/2010 UCSP -FASH 1
2. Overview
• Background: Web 2.0 and Social Networks
• Blogosphere: Definition, Types, and Comparison
• Blogosphere Research Issues
• Tools and APIs
• Data Collection
• Searching the Influentials: The Top Bloggers
• Conclusions
21/06/2010 UCSP -FASH 2
3. Web 2.0 and Social Networks
21/06/2010 UCSP -FASH 3
4. Caracteristics of Web 2.0
• Rich Internet Applications
• User generated contents
• User enriched contents
• User developed widgets
• Collaborative environment: Participatory Web, Citizen
journalism
• Thus, it leverages the power of the Long Tail with user
generated data as the driving force
• More of a paradigm shift than a technology shift
21/06/2010 UCSP -FASH 4
5. Technology Overview of Web 2.0
• Cascading Style Sheets to aid in the separation of presentation and
content
• Folksonomies (collaborative tagging, social classification, social
indexing, and social tagging)
• REST and/or XML- and/or JSON-based APIs
• Rich Internet application techniques, often Ajax and/or Flex, Flash-
based
• Semantically valid XHTML and HTML markup
• Syndication, aggregation and notification of data in RSS or Atom
feeds
• mashups, merging content from different sources, client- and
server-side
• Weblog-publishing tools
• wiki or forum software to support user-generated content
21/06/2010 UCSP -FASH 5
6. Some Web 2.0 Services
• Blogs
– Blogspot
– Wordpress
– Lamula (Perú)
• Wikis
– Wikipedia
– Wikiversity
• Social Networking Sites
– Facebook
– Twitter
– MySpace
– Orkut
• Digital media sharing websites
– Youtube
– Flickr
– Vimeo
– Twitpic
• Social Tagging
– Del.icio.us
21/06/2010 UCSP -FASH 6
7. Social Networks
• A social structure made of nodes (individuals or
organizations) that are related to each other by various
interdependencies like friendship, kinship, like, ...
• Graphical representation
– Nodes = members
– Edges = relationships
21/06/2010 UCSP -FASH 7
9. Social Networks
• A social structure made of nodes (individuals or
organizations) that are related to each other by various
interdependencies like friendship, kinship, like, ...
• Graphical representation
– Nodes = members
– Edges = relationships
• Various realizations
– Social bookmarking (Del.icio.us)
– Friendship networks (facebook, myspace)
– Blogosphere
– Media Sharing (Flickr, Youtube)
– Folksonomies
21/06/2010 UCSP -FASH 9
10. BLOGOSPHERE
Definitions, Types, and Comparison
21/06/2010 UCSP -FASH 10
11. Blogging Phenomenon
• It’s growing fast as a new means for online
communications and interactions
• A blogger could gain instant fame via his blogs
• A blogger may make a good living with her
blogs
• Abundant, lucrative business opportunities
• A new political arena
21/06/2010 UCSP -FASH 11
15. Types of Blogs
• Individual vs. community
– Single authored (Individual blog sites)
– Multi authored (Community blog sites)
Individual Blog Sites Community Blog Sites
Owned and maintained by a group of like-minded
Owned and maintained by individual users.
users.
More like discussion forums and discussion
More like personal accounts, journals or diaries.
boards.
High degree of group discussion and
No or almost negligible group interaction.
collaboration.
Enormous collective wisdom and open source
No or almost negligible collective wisdom.
intelligence.
• Regulated vs. anonymous
21/06/2010 UCSP -FASH 15
16. Blogosphere
• Complex Social Networks
• Vertices (Nodes): Bloggers/
Blog posts/Blog sites
• Edges: Relationships/Links
• In-Degree: Number of
inlinks
• Out-Degree: Number of
outlinks
21/06/2010 UCSP -FASH 16
17. Friendship Networks vs. Blogosphere
Friendship Networks Blogosphere
Explicit Links/Edges Implicit Links/Edges
Undirected Graph Directed Graph
Network Centrality Measures Blog Statistics
Quantifying Spread of Influence Quantifying Influential Members
Nodes are members/actors Nodes can be bloggers/blogs or blog sites
Strictly defined graph structure Loosely defined graph structure
“Being in touch” or “Making Friends” Sharing ideas and opinions
Person-to-person Person-to-group
Friendship Oriented Community Oriented
Member’s Reputation/Trust based on network Member’s Reputation/Trust based on the response
connections and/or location in the network to other member’s knowledge solicitations
21/06/2010 UCSP -FASH 17
18. Friendship Networks vs. Blogosphere
Social Networks
Orkut, Facebook, LinkedIn,
Classmates.com, etc.
Social LiveJournal, MySpace, etc.
Friendship Blogosphere
Networks TUAW, Blogger, Windows Live
Spaces, etc.
21/06/2010 UCSP -FASH 18
20. Understanding Blogosphere
• Blogosphere • Everyone can publish, but
• Blog sites few are heard
• Bloggers • Many interesting questions
• Blog posts to address
• Reverse chronologically – How to build traffic
ordered entries – How to find niche
• Blogroll online
• Permalinks – How to increase
influence
– How to …
• Fertile research domain
21/06/2010 UCSP -FASH 20
21. Understanding Blogosphere
• Understand structures and properties of Blogosphere
• Gain insights into the relationships between
bloggers, readers, blog posts, comments, different
blog sites in Blogosphere
• Models help generate artificial data, tune the
parameters to simulate special scenarios, and
compare various studies and different algorithms
• Study peculiarities in Blogosphere and infer latent
patterns and structures that could explain certain
phenomena like influence, diffusion, splogs,
community discovery.
21/06/2010 UCSP -FASH 21
22. Modeling Web and Blogosphere
• Some key differences between Web and Blogosphere
– Models developed for Web assume dense graph structure due to a large
number of interconnecting hyperlinks within webpages. This assumption does
not hold true. Blogosphere is shown to have a very sparse hyperlink structure
[Kritikopoulos et al. 2006].
– The level of interaction in terms of comments and replies to blog posts makes
Blogosphere different from Web
– The highly dynamic and “short-lived” nature of the blog posts could not be
simulated by the web models. Web models do not consider dynamicity in the
web pages
– Web models assume webpages accumulate links over time. However, this is
not true with Blogosphere
– “Categories” and “tags” gives blogs flexibility that conventional websites
typically don’t have
– Descriptive filenames used in permalinks of blogs as compared to webpage
filenames
21/06/2010 UCSP -FASH 22
23. Modeling Blogosphere
• Preferential attachment
– Probability of a new edge to a node to be added depends on its degree
– “The rich get richer” P(e : vi v j ) deg( vi )
– Power law distribution or scale free distribution
21/06/2010 UCSP -FASH 23
24. Modeling Blogosphere
• Preferential attachment
– Probability of a new edge to a node to be added depends on its degree
– “The rich get richer” P(e : vi v j ) deg( vi )
– Power law distribution or scale free distribution
21/06/2010 UCSP -FASH 24
25. Modeling Blogosphere
• Preferential attachment P(e : vi v j ) deg( vi ) / V
– Probability of a new edge to a node to be added depends on its degree
– “The rich get richer”
– Power law distribution or scale free distribution
• Hybrid model P(e : vi v j ) deg( vi ) / V (1 )
– Mixture of both preferential attachment model and random model
– Give a lucky poor guy some chance to get rich
– To solve irreducibility (strong connectedness with few isolated subgraphs) random walk
on a graph model proposes a random jump with a fixed probability
• Leskovec et al. 2007 studied temporal patterns
– How often people create blog posts
– Busrtiness and popularity
– How these posts are linked and what is the link density
– Developed a SIS based model
• Kumar et al. 2003 use blogrolls on the blog posts to construct a network of blog
posts assuming that blogrolls contain similar blog posts
21/06/2010 UCSP -FASH 25
27. Blog Clustering
• Dynamic and automatic organization of the content
• Convenient accessibility
• Optimizing search engines by reducing search space
– Search only the relevant cluster
• Focused crawling
• Summarization
• Topic identification
• Reduce information overload
– 175,000 blog posts per day, i.e., 2 blog posts per second – Dec
2006
• Extraction and analysis of the trends
21/06/2010 UCSP -FASH 27
28. tfidf i , j tf i , j idf i
Blog Clustering
ni , j
tf i , j
• Brooks and Montanez 2006, used tf-idf and k
nk , j
picked top 3 keywords for blog posts log
D
d : ti d j
idf
– Clustered blogs based on these keywords
i
j
– Reported improved clustering as compared to that using tags
• Li et al. 2007 assigned different weights to title, body,
and comments of blog posts
– Need to address high dimensionality and sparsity due to their
keyword-based approach
• Agarwal et al. 2008 proposed a collective-wisdom
based approach
– Generate a category relation graph based on user assignments
– Compute similarity matrix from this graph
21/06/2010 UCSP -FASH 28
29. Blog Mining
• Interactions between producers and consumers improved with blogs
• Consumers not only speak their mind but also broadcast their opinions
• Blogs are invaluable information sources
– consumers’ beliefs and opinions,
– initial reaction to a launch,
– understand consumer language,
– track trends and buzzwords, and
– fine-tune information needs
• Blog conversations leave behind the trails of links, useful for
understanding how information flows and how opinions are shaped
and influenced
• Tracking blogs also help in gaining deeper insights
21/06/2010 UCSP -FASH 29
30. Blog Influence
• Two types of influence
– Influential blog sites and site networks [Gill 2004, Gruhl et al 2004, Java et al
2006]
– Influential bloggers in a community [Agarwal et al. 2008]
• Blogosphere vs. Friendship Networks
– Implicit vs. Explicit links
– Blog statistics vs. Centrality measures
– “influencing” vs. “could influence”
– Loosely vs. Strictly defined graph structures
• Blog vs. Webpage Ranking
– Blog sites too sparse for webpage ranking algorithms to work [Kritikopoulos et
al 2006]
– Webpage acquires authority over time, blog posts’ influence diminishes
– Greedy approach works better than PageRank, HITS to maximize influence
flow [Kempe et al 2003, Richardson & Domingos 2002]
21/06/2010 UCSP -FASH 30
31. Issue of Trust
• Open standards and low barriers to publishing have created
overwhelming amount of collective wisdom
• Yet more difficult for readers to discern whom to trust in
some cases
• Similar to WWW
– Authoritative webpages e.g., HITS [Kleinberg et al. 1998], PageRank
[Page et al. 1999]
• Blogosphere allow mass to create and edit content
compromising the sanctity of the original content
• Some work exists for social friendship network domain, not
many researchers have explored Blogosphere
• Huge potential for trust study in Blogosphere domain
21/06/2010 UCSP -FASH 31
32. Trust
• Kale et al. 2007 transformed the problem of trust in
blogosphere to the one in social friendship networks
– Studied propagation of trust among different blog sites
– Mined sentiments from a window of words around hyperlinks
– Identified positive, negative, or neutral sentiments towards the linked
blog site
– Constructed a network of blog sites using hyperlinks
– Used Gruhl et al. 2004 trust propagation algorithm
– Some concerns
• These blog sites have to be linked for trust propagation
• Trust is computed between blog sites based on how much one blog
agrees or disagrees with the other
Mi+1 = Mi * Ci – Perform till convergence
M = Belief Matrix; Ci = Atomic Propagation
Ci = M + MT*M + MT + M*MT
21/06/2010 UCSP -FASH 32
33. Community Extraction
• Blogosphere doesn’t have an explicit notion of communities
• Different from blog clustering
• Researchers identify communities based on
– Links: network of hyperlinks allows identification of virtual communities
• Several studies on finding community of webpages like Kleinberg 1998
and Kumar et al. 1999
• While Kleinberg used authority and hubs idea to explore communities of
webpages, Kumar et al. extended the idea of hubs and authorities and
included co-citations as a way to extract all communities on the web and
used graph theoretic algorithms to identify all instances of graph
structures that reflect community characteristics.
– Content: blogs with similar content or inspired by the same event form a
virtual community
• Kumar et al. 2003, Efimova and Hendrick 2005, Blanchard 2004
21/06/2010 UCSP -FASH 33
34. Community Extraction
• Chin and Chignell 2006 proposed a model for finding
communities taking the blogging behavior of bloggers into
account
– They aligned behavioral approaches through blog reader survey
in studying blog community.
• Blanchard and Marcus 2004 studied a multiple sport
newsgroup “Virtual Settlement” and analyzed the possibility
of emerging virtual communities
– Newsgroups and discussion forums are similar in terms of
interaction patterns to Blogosphere
– More person-to-group interaction rather than person-to-person
interaction
21/06/2010 UCSP -FASH 34
35. Spam blog (Splogs) Filtering
• One of the major rising concerns on Blogosphere
• Spammers make most of their money by getting viewers to click on ads that
run adjacent to their nonsensical text
• Open standards and low barriers to publishing escalates the problem and
challenges while solving
• Besides degrading search quality, affects the network resources
21/06/2010 UCSP -FASH 35
36. Spam blog (Splogs) Filtering
• One of the major rising concerns on Blogosphere
• Open standards and low barriers to publishing escalates the problem and
challenges while solving
• Besides degrading search quality, affects the network resources
• Initial researches applied web spam link detection approaches
– Ntoulas et al. 2006, distinguish between normal web pages and spam
webpages based on the statistical properties like
• number of words, average length of words, anchor text, title keyword frequency,
tokenized URL
– Gyongyi et al. 2004, Gyongyi et al. 2006 use PageRank to compute the spam
score of a webpage
• Kolari et al. 2006, consider each blog post as a static webpage and use
both content and hyperlinks to classify a blog post as spam using a SVM
based classifier
21/06/2010 UCSP -FASH 36
37. Tools and API’s
Working in the Blogosphere…
21/06/2010 UCSP -FASH 37
38. Analysis and Visualization Tools
• Tools
– Data Analysis & Visualization tools
– Statistics like centrality measures
• NetLogo (http://ccl.northwestern.edu/netlogo/)
– Multi-agent programming language and modeling environment
designed in Logo
– Modelers can give instructions to hundreds or thousands of
concurrently operating autonomous agents.
– Exploring the connection between the individuals (micro-level) and
the patterns that emerge from the interaction of many individuals
(macro-level).
21/06/2010 UCSP -FASH 38
39. Analysis and Visualization Tools
• UCINet (http://www.analytictech.com/)
– Package for the analysis of social network data including centrality
measures, subgroup identification, role analysis, elementary graph
theory, and permutation-based statistical analysis
– Has strong matrix analysis routines, such as matrix algebra and
multivariate statistics
• Pajek (http://vlado.fmf.uni-lj.si/pub/networks/pajek/)
– Slovenian for spider
– Analyzing and visualizing large networks like social networks
• Network package in R (http://cran.r-project.org/src/contrib/Descriptions/network.htm)
– The network class can represent a range of relational data types, and
support arbitrary vertex/edge/graph attributes
– This is used to create and/or modify the network objects and is used
for social network analysis (SNA)
21/06/2010 UCSP -FASH 39
40. Analysis and Visualization Tools
• InFlow (http://www.orgnet.com/inflow3.html)
– Integrated product for network analysis and visualization
– Used in the SNA domain
• NetMiner (http://www.netminer.com/)
– Tool for exploratory network data analysis and visualization
– NetMiner allows to explore network data visually and
interactively, and helps in detecting underlying patterns
and structures of the network
21/06/2010 UCSP -FASH 40
44. del.icio.us API
https://api.del.icio.us/v1/tags/get
Returns a list of tags and number of times used
Sample response
<tags>
<tag count="1" tag="activedesktop" />
<tag count="1" tag="business" />
<tag count="3" tag="radio" />
<tag count="5" tag="xml" />
<tag count="1" tag="xp" />
<tag count="1" tag="xpi" />
</tags>
21/06/2010 UCSP -FASH 44
45. Data Collection
Using the Blogosphere…
21/06/2010 UCSP -FASH 45
46. Available Datasets
• TREC (http://ir.dcs.gla.ac.uk/test_collections/blog06info.html)
– A crawl of Feeds, and associated Permalink and homepage
documents (from late 2005 and early 2006)
– 100,649 feeds were polled once a week for 11 weeks
– Total Number of Feeds collected:753,681
– Average feeds collected every day:10,615
– Uncompressed Size:38.6GB Compressed Size:8.0GB
– Reasonably sized spam component for added realism
– Fee: £400 ~ $794.36
21/06/2010 UCSP -FASH 46
47. Available Datasets
• Mobile Network (http://kdl.cs.umass.edu/data/msn/msn-info.html)
– 27 objects
– over 180,000 links
– 1 object attribute
– 2 link attributes
• Other ways
– Crawl blogs
– Blogcatalog
– Statistics available from technorati API
– Tagging available from del.icio.us API
21/06/2010 UCSP -FASH 47
48. Data Crawler
• BlogTrackers
– User interface to crawl blog sites
• Scratch crawling (from blog archives)
• Incremental crawling (from RSS feeds)
– Stores the blog posts in Microsoft SQL server
– Collects
Blog post title Blog post tags
Blog post content Blog post permalink
Outlinks Blogger name
Inlinks Blog post date and time
– Track blog posts like generate tag clouds for user specified time
window
21/06/2010 UCSP -FASH 48
49. Collectable Statistics from Blogs
• Inbound links
– Blogs, blog post, webpage
• Outbound links
– Blogs, blog post, webpage
• Comments
• Blog server logs
• Subscribers
• Time to read/length
• Links to post and incoming traffic from them
• Links from post and outgoing traffic to them
• Topic frequency score
• Blogroll links
• Tagged urls (del.icio.us, furl)
21/06/2010 UCSP -FASH 49
50. Searching The Influentials : The Top Bloggers
• Active bloggers
– Easy to define
– Often listed at a blog site
– Are they necessarily influential
• How to define an influential blogger?
– Influential bloggers have influential posts
– Subjective
– Collectable statistics
– How to use these statistics
21/06/2010 UCSP -FASH 50
51. Intuitive Properties
• Social Gestures (statistics)
– Recognition: Citations (incoming links)
– An influential blog post is recognized by many. The more influential the
referring posts are, the more influential the referred post becomes.
– Activity Generation: Volume of discussion (comments)
– Amount of discussion initiated by a blog post can be measured by the
comments it receives. Large number of comments indicates that the blog
post affects many such that they care to write comments, hence
influential.
– Novelty: Referring to (outgoing links)
– Novel ideas exert more influence. Large number of outlinks suggests that
the blog post refers to several other blog posts, hence less novel.
– Eloquence: “goodness” of a blog post (length)
– An influential is often eloquent. Given the informal nature of
Blogosphere, there is no incentive for a blogger to write a lengthy piece
that bores the readers. Hence, a long post often suggests some necessity
of doing so.
• Influence Score = f(Social Gestures)
21/06/2010 UCSP -FASH 51
52. Understanding the Influentials
• Are influential bloggers simply active bloggers?
• If not, in what ways are they different?
– Can the model differentiate them?
• Are there different types of influential bloggers?
• What other parameters can we include to evolve
the model?
• Are there temporal patterns of the influential
bloggers?
21/06/2010 UCSP -FASH 52
53. Active & Influential Bloggers
• Active and Influential Bloggers
• Inactive but Influential Bloggers
• Active but Non-influential Bloggers
• They don’t consider “Inactive and Non-influential Bloggers”, because they
seldom submit blog posts. Moreover, they do not influence others.
21/06/2010 UCSP -FASH 53
54. Conclusions…
Blogosphere is one of the fastest growing, social networking
media. The virtual communities in the blogosphere are not
constrained by physical proximity and allow anytime, anywhere,
and instant communications.
In this paper the autors discuss current research issues in
Blogosphere including modeling, blog clustering, blog mining,
community discovery and factorization, influence and
propagation, trust and reputation, and filtering spam blogs.
21/06/2010 UCSP -FASH 54