Christian Fuchs. "Class and Exploitation on the Internet. Theoretical Foundations and the Example of Social Networking Sites". Presentation at the Conference "The Internet as Playground and Factory", New York, New School, November 13, 2009.
IGNITION: How to Build a $1B Content Business in Three Years or Less by Linda...Babbel
This document provides an overview and summary of digital content history and the changing landscape. It discusses:
1) How digital content consumption has evolved from 2005 to focus more on social media, engagement and new forms of entertainment.
2) Common themes in large digital content deals from 2005-2010, including a focus on monetizing user generated content and experimentation with new models.
3) Key factors that have contributed to the rise of billion dollar digital content businesses like social engagement and business model innovation.
4) Emerging digital content models that integrate commerce, curation and community.
5) Advice for digital content sellers and traditional media buyers to focus on loyalty, engagement, distribution and innovation
Christian Fuchs: Introduction to Digital Labour StudiesChristian Fuchs
Introductory talk in the COST Action "Dynamics of Virutal Work"-Working Group (WG) 3: Innovation and the emergence of new forms of value creation and new economic activities.
TU Darmstadt, Technical University Darmstadt. April 8, 2013
This document discusses the potential for cooperative sharing economies and decentralized platforms on blockchain. It proposes "WeHome" as a cooperative home sharing platform built on blockchain that would eliminate commission fees for hosts and guests and be owned by the community through a decentralized autonomous organization (DAO). This could disrupt current home sharing platforms by bringing fairness and keeping value within the community rather than extracting it through monopolistic middlemen. The document outlines WeHome's vision, token model, and potential to achieve fast market penetration in Korea and beyond through a unique legal position and focus on quality.
VideoVortex: Critical Point of the Commons and Digital Prochronismzastava
The document discusses the critical point of the commons and the concept of "digital prochronism". It introduces Dominick Chen and their background working with Creative Commons Japan and researching how to extend notions of openness. Digital prochronism aims to design process-driven, time-based creative works that evolve through participation similarly to biological systems. TypeTrace is presented as a tool that embodies these ideas as a process-oriented word processor. The document argues for evaluating creative works based on their dynamic generation process rather than final products alone.
This document discusses the evolution of the internet and the role of blockchain and disruptive technologies in creating "Internet 2". It suggests that technologies like blockchain have the potential to decentralize the internet, empower individuals, and create a more trustworthy system by distributing ownership and control. The key points made are:
1) The internet has evolved from being primarily about information (Web 1.0) to enabling participation and sharing (Web 2.0), but is now dominated by a few large platforms.
2) Blockchain and other new technologies could fuel the next stage of the internet (Internet 2) by decentralizing control through mechanisms like decentralized autonomous organizations (DAOs).
3) This transition would make the internet
1. This document discusses the concepts of the networked citizen/consumer and how individuals are impacted by large networks through low predictability and resonance points.
2. A networked citizen is an active participant in social networks who can influence others, while low predictability refers to the unpredictable nature of information spread in networks.
3. Resonance points are moments when ideas or trends spread widely through a network and have a large impact, enabled by engaged networked citizens who help spread information to many others.
Question generation using Natural Language Processing by QuestGen.AIData Science Milan
Ramsri Goutham presented on generating multiple choice questions (MCQs) from text using natural language processing. He discussed using T5 transformers and sense2vec vectors to generate questions from news articles and generate wrong answer choices using WordNet and Sense2vec. Ramsri also shared an open source question generation library called Questgen and demonstrated generating MCQs from sample text about Elon Musk and cryptocurrencies in a Google Colab notebook.
IGNITION: How to Build a $1B Content Business in Three Years or Less by Linda...Babbel
This document provides an overview and summary of digital content history and the changing landscape. It discusses:
1) How digital content consumption has evolved from 2005 to focus more on social media, engagement and new forms of entertainment.
2) Common themes in large digital content deals from 2005-2010, including a focus on monetizing user generated content and experimentation with new models.
3) Key factors that have contributed to the rise of billion dollar digital content businesses like social engagement and business model innovation.
4) Emerging digital content models that integrate commerce, curation and community.
5) Advice for digital content sellers and traditional media buyers to focus on loyalty, engagement, distribution and innovation
Christian Fuchs: Introduction to Digital Labour StudiesChristian Fuchs
Introductory talk in the COST Action "Dynamics of Virutal Work"-Working Group (WG) 3: Innovation and the emergence of new forms of value creation and new economic activities.
TU Darmstadt, Technical University Darmstadt. April 8, 2013
This document discusses the potential for cooperative sharing economies and decentralized platforms on blockchain. It proposes "WeHome" as a cooperative home sharing platform built on blockchain that would eliminate commission fees for hosts and guests and be owned by the community through a decentralized autonomous organization (DAO). This could disrupt current home sharing platforms by bringing fairness and keeping value within the community rather than extracting it through monopolistic middlemen. The document outlines WeHome's vision, token model, and potential to achieve fast market penetration in Korea and beyond through a unique legal position and focus on quality.
VideoVortex: Critical Point of the Commons and Digital Prochronismzastava
The document discusses the critical point of the commons and the concept of "digital prochronism". It introduces Dominick Chen and their background working with Creative Commons Japan and researching how to extend notions of openness. Digital prochronism aims to design process-driven, time-based creative works that evolve through participation similarly to biological systems. TypeTrace is presented as a tool that embodies these ideas as a process-oriented word processor. The document argues for evaluating creative works based on their dynamic generation process rather than final products alone.
This document discusses the evolution of the internet and the role of blockchain and disruptive technologies in creating "Internet 2". It suggests that technologies like blockchain have the potential to decentralize the internet, empower individuals, and create a more trustworthy system by distributing ownership and control. The key points made are:
1) The internet has evolved from being primarily about information (Web 1.0) to enabling participation and sharing (Web 2.0), but is now dominated by a few large platforms.
2) Blockchain and other new technologies could fuel the next stage of the internet (Internet 2) by decentralizing control through mechanisms like decentralized autonomous organizations (DAOs).
3) This transition would make the internet
1. This document discusses the concepts of the networked citizen/consumer and how individuals are impacted by large networks through low predictability and resonance points.
2. A networked citizen is an active participant in social networks who can influence others, while low predictability refers to the unpredictable nature of information spread in networks.
3. Resonance points are moments when ideas or trends spread widely through a network and have a large impact, enabled by engaged networked citizens who help spread information to many others.
Question generation using Natural Language Processing by QuestGen.AIData Science Milan
Ramsri Goutham presented on generating multiple choice questions (MCQs) from text using natural language processing. He discussed using T5 transformers and sense2vec vectors to generate questions from news articles and generate wrong answer choices using WordNet and Sense2vec. Ramsri also shared an open source question generation library called Questgen and demonstrated generating MCQs from sample text about Elon Musk and cryptocurrencies in a Google Colab notebook.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
Creative operations teams expect increased AI use in 2024. Currently, over half of tasks are not AI-enabled, but this is expected to decrease in the coming year. ChatGPT is the most popular AI tool currently. Business leaders are more actively exploring AI benefits than individual contributors. Most respondents do not believe AI will impact workforce size in 2024. However, some inhibitions still exist around AI accuracy and lack of understanding. Creatives primarily want to use AI to save time on mundane tasks and boost productivity.
Organizational culture includes values, norms, systems, symbols, language, assumptions, beliefs, and habits that influence employee behaviors and how people interpret those behaviors. It is important because culture can help or hinder a company's success. Some key aspects of Netflix's culture that help it achieve results include hiring smartly so every position has stars, focusing on attitude over just aptitude, and having a strict policy against peacocks, whiners, and jerks.
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
PepsiCo provided a safe harbor statement noting that any forward-looking statements are based on currently available information and are subject to risks and uncertainties. It also provided information on non-GAAP measures and directing readers to its website for disclosure and reconciliation. The document then discussed PepsiCo's business overview, including that it is a global beverage and convenient food company with iconic brands, $91 billion in net revenue in 2023, and nearly $14 billion in core operating profit. It operates through a divisional structure with a focus on local consumers.
Content Methodology: A Best Practices Report (Webinar)contently
This document provides an overview of content methodology best practices. It defines content methodology as establishing objectives, KPIs, and a culture of continuous learning and iteration. An effective methodology focuses on connecting with audiences, creating optimal content, and optimizing processes. It also discusses why a methodology is needed due to the competitive landscape, proliferation of channels, and opportunities for improvement. Components of an effective methodology include defining objectives and KPIs, audience analysis, identifying opportunities, and evaluating resources. The document concludes with recommendations around creating a content plan, testing and optimizing content over 90 days.
How to Prepare For a Successful Job Search for 2024Albert Qian
The document provides guidance on preparing a job search for 2024. It discusses the state of the job market, focusing on growth in AI and healthcare but also continued layoffs. It recommends figuring out what you want to do by researching interests and skills, then conducting informational interviews. The job search should involve building a personal brand on LinkedIn, actively applying to jobs, tailoring resumes and interviews, maintaining job hunting as a habit, and continuing self-improvement. Once hired, the document advises setting new goals and keeping skills and networking active in case of future opportunities.
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
The document provides career advice for getting into the tech field, including:
- Doing projects and internships in college to build a portfolio.
- Learning about different roles and technologies through industry research.
- Contributing to open source projects to build experience and network.
- Developing a personal brand through a website and social media presence.
- Networking through events, communities, and finding a mentor.
- Practicing interviews through mock interviews and whiteboarding coding questions.
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
1. Core updates from Google periodically change how its algorithms assess and rank websites and pages. This can impact rankings through shifts in user intent, site quality issues being caught up to, world events influencing queries, and overhauls to search like the E-A-T framework.
2. There are many possible user intents beyond just transactional, navigational and informational. Identifying intent shifts is important during core updates. Sites may need to optimize for new intents through different content types and sections.
3. Responding effectively to core updates requires analyzing "before and after" data to understand changes, identifying new intents or page types, and ensuring content matches appropriate intents across video, images, knowledge graphs and more.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Class and Exploitation on the Internet
1. Class and Exploitation on the Internet.
Christian Fuchs
Associate Professor
Unified Theory of Information Research Group
University of Salzburg
Sigmund Haffner Gasse 18
A-5020 Salzburg
Austria
christian.fuchs@sbg.ac.at
http://fuchs.uti.at
http://www.uti.at
2. Fuchs, Christian. 2008. Internet and Society: Social Theory
in the Information Age. New York: Routledge.
Fuchs, Christian (2010, Forthcoming) Foundations of Critical
Media And Information Studies. A Marxist Approach. New York:
Routledge.
4. 1. Introduction
Critical studies of the Internet:
Jodi Dean: “The more opinions or comments that are out there,
the less of an impact any one given one might make” (Dean 2005,
58).
“Communicative capitalism is rooted in communication
without communicability” (Dean 2005, 281).
Mark Andrejecvic speaks of “the interactive capability of new
media to exploit the work of being watched” (Andrejevic 2002:
239).
McKenzie Wark: “The producing classes – farmers, workers,
hackers – struggle against the expropriating classes – pastoralists,
capitalists, vectoralists – but these successive ruling classes
struggle also amongst themselves“ (Wark 2004: §31).
5. 1. Introduction
Trebor Scholz: “Like with any bubble, the suggestion of sudden
newness is aimed at potential investors. [...] The Web 2.0 hype
drew broad media attention and financial resources to businesses
that manage to profit from networked social production, amateur
participation online, fan cultures, social networking, podcasting,
and collective intelligence” (Scholz 2008).
Mark Andrejevic (2009): Critical Media Studies 2.0,
Exploitation 2.0.
“Related to the development of techniques for making sense out of
the glut is the need to develop an updated critique of
exploitation. The Marxist conception was useful and
productive in that it highlighted the logic of the unfree ‘free’
choice“ (Andrejevic 2009, 48f).
6. 1. Introduction
=double free labour, but also: class and surplus value in
Marxist theory!
My contribution to the critical study of the Internet is the
suggestion to explicitly reactualize and “reload” Marxian
theory.
The task is to create not just a critical theory of the Internet, but
a Marxist theory of the Internet.
The Marxian circuit of capital (Capital Vol. 1 & 2) that is also a
circuit of exploitation needs to be related to Internet produsage.
7. 2. The web and social theory
Information as threefold process of:
Cognition
For Emile Durkheim, a “social fact is every way of acting, fixed or not, capable of
exercising on the individual an external constraint” (Durkheim 1982, 59).
Communication
Max Weber had a different notion of sociality as social action: “Not every kind of
action, even of overt action, is ’social’ in the sense of the present discussion. Overt
action is not social if it is oriented solely to the behavior of inanimate objects”
(Weber 1968, 22).
Co-operation
For Ferdinand Tönnies, the most important form of sociality is the community,
which he understands as “consciousness of belonging together and the affirmation of
the condition of mutual dependence” (Tönnies 1988: 69).
For Karl Marx, co-operation is a fundamental mode of human social activity: “By
social we understand the co-operation of several individuals, no matter under
what conditions, in what manner and to what end” (Marx and Engels 1846/1970, 50).
8. 2. The web and social theory
* web 1.0 is a computer-based networked system of human
cognition,
* web 2.0 a computer-based networked system of human
communication,
* web 3.0 a computer-based networked system of human co-
operation
9. 2. The web and social theory
Figure 1: A model of social software and its three subtypes
10. 2. The web and social theory
1998 2008
Rank Website Unique
users in
1000s
Primary
functions
Rank Website Unique users
in 1000s
(February
Primary
Functions Sociality (1) - cogn:
1 Aol.com
(December
1-31, 1998)
28 255 cogn, 1 yahoo.com
2008)
125 000 cogn,
1998: 20
2 yahoo.com 26 843
comm
cogn, 2 google.com 123 000
comm.
cogn, 2008: 20
comm comm.
3 geocities.co 18 977 cogn 3 aol.com 56 000 cogn,
m comm.
4 msn.com 18 707 cogn, 4 youtube.com 54 000 cogn,
5 netscape.co 17 548
comm
cogn, 5 microsoft.com 51 000
comm.
Cogn
Sociality (2) - comm:
1998: 9
m comm
6 excite.com 14 386 cogn, 6 msn.com 48 000 cogn,
comm comm.
7
8
lycos.com
microsoft.co
13 152
13 010
cogn,
comm
cogn
7
8
eBay.com
myspace.com
48 000
46 000
Cogn
cogn,
2008: 10
m comm, co-
op
9 bluemountai 12 315 cogn, 9 wikipedia.org 44 000 cogn,
narts.com comm comm, co-
op Sociality (3)
10 infoseek.com 11 959 cogn, 10 mapquest.com 43 000 Cogn
11 altavista.com 11 217
comm
cogn 11 live.com 41 000 Cogn
- co-op: 1998: 0
2008: 4
12 tripod.com 10 924 cogn 12 amazon.com 41 000 Cogn
13 xoom.com 10 419 cogn 13 about.com 38 000 Cogn
14 angelfire.co 9 732 cogn 14 verizon.com 34 000 Cogn
m
15 hotmail.com 9 661 cogn, 15 adobe.com 30 000 Cogn
comm
16
17
Amazon.com
real.com
9 134
7 572
cogn
cogn
16
17
bizrate.com
facebook.com
29 000
28 000
Cogn
cogn,
comm,
There is at the same
18 zdnet.com 5 902 cogn 18 go.com 28 000
coop
Cogn time continuity and
19 hotbot.com 5 612 cogn 19 answers.com 27 000 cogn,
comm,
coop
discontinuity in the
development of the
20 infospace.co 5 566 cogn 20 wordpress.com 27 000 cogn,
m comm
260 891 961 000
Table 1: Information functions of the top 20 websites in the United States (sources: Comcast
Press Release January 20, 1999, Quantcast Web Usage Statistics March 16, 2008) world wide web.
11. 3. Participatory web as ideology
Henry Jenkins argues that increasingly “the Web has become a
site of consumer participation” (Jenkins 2008: 137) and sees
blogging as “potentially increasing cultural diversity and lowering
barriers in cultural participation”, “expanding the range of
perspectives”, as “grassroots intermediaries” that ensure “that
everyone has a chance to be heard” (Jenkins 2006: 180f).
Axel Bruns says that “open participation” (Bruns 2008: 24, 240)
is a key principle of produsage.
Clay Shirky (2008: 107) says that on web 2.0 there is a “linking
of symmetrical participation and amateur production”.
12. 3. Participatory web as ideology
Tapscott and Williams argue that “the new web” has resulted in
“a new economic democracy […] in which we all have a lead
role” (Tapscott and Williams 2007: 15).
Yochai Benkler (2006) says that due to the emergence of
commons-based peer production on the Internet, “we can say
that culture is becoming more democratic: self-reflective and
participatory“ (Benkler 2006: 15).
Is the web participatory?
Answering this question requires an understanding of the notion of
participation.
13. 3. Participatory web as ideology
Participatory democracy theory
A participatory economy requires a “change in the terms of
access to capital in the direction of more nearly equal access”
(Macpherson 1973: 71) and “a change to more nearly equal access
to the means of labour” (Macpherson 1973: 73).
“Genuine democracy, and genuine liberty, both require the
absence of extractive powers” (Macpherson 1973: 121).
A participatory economy furthermore involves “the democratising
of industrial authority structures” (Pateman 1970: 43).
14. 3. Participatory web as ideology
Rank Website Ownership Country Year of Domain Economic Unique Users
Creation Orientation per Month
4 Facebook Facebook Inc. USA 2004 Profit, 91 million
advertising
6 YouTube Google Inc. USA 2005 Profit, 72 million
advertising
8 Wikipedia Wikimedia USA 2001 Non-profit, 67 million
Foundation non-
advertising
9 MySpace MySpace Inc. USA 2003 Profit, 63 million
(News advertising
Corporation)
14 Blogspot Google Inc. USA 2000 Profit, 49 million
advertising
19 Answers Answers USA 1996 Profit, 39 million
Corporation advertising
22 Wordpress Automattic Inc. USA 2000 Profit, 28 million
advertising
23 Photobucket Photobucket.com USA 2003 Profit, 28 million
LLC advertising
26 Twitter Twitter Inc. USA 2006 Profit, no 27 million
advertising
31 Flickr Yahoo! Inc. USA 2003 Profit, 21 million
advertising
32 Blogger Google Inc. USA 1999 Profit, 20 million
advertising
44 eHow Demand Media USA 1998 Profit, 14 million
Inc. advertising
49 eZineArticles SparkNet USA 1999 Profit, 13 million
Corporation advertising
532 million
Table 2: Web 2.0/3.0 platforms that are among the top 50 websites in the USA (data source:
quantcast.com, US site ranking, August 13, 2009)
15. 3. Participatory web as ideology
13 of 50 websites can be classified as web 2.0/3.0 platforms
(=26.0%). These 13 platforms account for 532 million out of a total
of 1916 million monthly usages of the 50 top websites in the US
(=27.7%).
Web 2.0/3.0 platforms have become more important, but they do
not dominate the web.
12 of 13 of the web 2.0/3.0 platforms that are among the top 50 US
websites are profit-oriented, 11 of them are advertising-based.
In my empirical sample, 92.3% of the most frequently used web
2.0/3.0 platforms in the US and 87.4% of monthly unique web
2.0/3.0 usages in the USA are corporate-based, which shows that
the vast majority of popular web 2.0/3.0 platforms are mainly
interested in generating monetary profits and that the corporate web
2.0/3.0 is much more popular than the non-corporate web 2.0/3.0.
16. 3. Participatory web as ideology
Google owns three of the 11 web platforms listed in table 2. 18
human and corporate legal persons own 98.8% of Google’s
common stock, Google’s 20 000 employees, the 520 million
global Google users, the 303 million users of YouTube, and the
142 million users of Blogspot/Blogger are non-owners of
Google (Google SEC Filing Proxy Statements 2008).
Rank Website Ownership of data Advertising
4 Facebook License to use uploaded content Targeted advertisements
6 YouTube License to use uploaded content Targeted advertisements
8 Wikipedia Creative commons No advertising
9 MySpace License to use uploaded content Targeted advertisements
14 Blogspot License to use uploaded content Targeted advertisements
19 Answers License to use uploaded content Targeted advertisements
22 Wordpress License to use uploaded content Targeted advertisements
23 Photobucket License to use uploaded content Targeted advertisements
26 Twitter No license to use uploaded content No advertising
31 Flickr License to use uploaded content Targeted advertisements
32 Blogger License to use uploaded content Targeted advertisements
44 eHow License to use uploaded content Targeted advertisements
49 eZineArticles No license to use uploaded content Targeted advertisements
Table 3: Ownership rights and advertising rights of the 13 most-used web 2.0/3.0 platforms in
the USA (data source: terms of use and privacy policies)
17. 3. Participatory web as ideology
10 of the 13 web 2.0/3.0 sites hold a de-facto ownership right of
user data. 11 of the 13 platforms have the right to store, analyze,
and sell the content and usage data to advertising clients that are
enabled to provide targeted, personalized advertisements.
Most web 2.0/3.0 companies own the data of the users, whereas
the users do not own a share of the corporations.
This is an asymmetric economic power relation.
18. 3. Participatory web as ideology
For Georg Lukács, ideology “by-passes the essence of the
evolution of society and fails to pinpoint it and express it
adequately” (Lukács 1971: 50).
Slavoj Žižek (1994: 305) argues that “’ideological’ is a social
reality whose very existence implies the non-knowledge of its
participants as to its essence“.
An ideology is a claim about a certain status of reality that does
not correspond to actual reality. It deceives human subjects in
order to forestall societal change. It is false consciousness (Lukács
1971, 83).
19. 3. Participatory web as ideology
Based on participatory democracy theory, we can argue that
scholars who argue that the contemporary web or the Internet is
participatory advance an ideology that celebrates capitalism
and does not see how capitalist interests predominantly shape the
Internet.
Given these empirical results, it seems feasible to theorize the
contemporary “web 2.0” not as a participatory system, but by
employing more negative, critical terms such as class,
exploitation, and surplus value.
20. 4. Class and the web
Marx’s analysis of capitalism: The expanded reproduction process
of capital, capital accumulation
22. 4. Class and the web
Karl Marx highlights exploitation as the fundamental aspect of class
by saying that “the driving motive and determining purpose of
capitalist production” is “the greatest possible exploitation of labour-
power by the capitalist” (Marx 1867: 449).
“The theory of surplus value is in consequence immediately the theory
of exploitation” (Negri 1991: 74)
Marx says that the proletariat is “a machine for the production of
surplus-value”, capitalists are “a machine for the transformation of this
surplus-value into surplus capital” (Marx 1867: 742).
Surplus value “is in substance the materialization of unpaid labour-
time. The secret of the self-valorization of capital resolves itself into the
fact that it has at its disposal a definite quantity of the unpaid labour of
other people” (Marx 1867: 672). Surplus value “costs the worker labour
but the capitalist nothing”, but “none the less becomes the legitimate
property of the capitalist” (Marx 1867: 672).
23. 4. Class and the web
Erik Olin Wright (1997):
Exploitation of labour
Exploitation based on skills
Exploitation based on authority
Bourdieu (1986):
economic capital
cultural capital
Political capital
24. 4. Class and the web
Rosa Luxemburg (1913: 363) argued that capital accumulation
feeds on the exploitation of milieus that are drawn into the
capitalist system.
This idea was used for explaining the existence of colonies of
imperialism by Luxemburg and was applied by Marxist
Feminism in order to argue that unpaid reproductive labour can
be considered as an inner colony and milieu of primitive
accumulation of capitalism. (Bennholdt-Thomsen, Mies &
Werlhof 1992, Mies 1996, Werlhof 1991).
Antonio Negri uses the term “social worker” for arguing that
there is a broadening of the proletariat that is “now extended
throughout the entire span of production and reproduction”
(Negri 1982: 209).
25. 4. Class and the web
The multitude or proletariat is formed by “all those who labour
and produce under the rule of capital” (Hardt & Negri 2004:
106), “all those whose labour is directly or indirectly exploited
by and subjected to capitalist norms of production and
reproduction” (Hardt & Negri 2000: 52).
The proletariat is objectively united by the fact that it consists of
all those individuals and groups that are exploited capital, live and
produce directly and indirectly for capital that expropriates and
appropriates resources (commodities, labour power, the
commons, knowledge, nature, public infrastructures and services)
that are produced and reproduced by the proletariat in
common.
26. 4. Class and the web
Over-exploitation means that goods are produced in a way that
the “individual value of these articles is now below their social
value” (Marx 1867: 434).
27. 4. Class and the web
Knowledge is “universal labour” that is “brought about partly by
the cooperation of men now living, but partly also by building on
earlier work” (Marx 1894: 199).
“Communal labour, however, simply involves the direct
cooperation of individuals” (Marx 1894: 199).
profit rate p = s / (c + v) = surplus value / (constant capital +
variable capital)
Exploitation of labour by Internet firms:
p = s / (c + v1 + v2),
s … surplus value, c … constant capital, v1 … wages paid to
fixed employees, v2 … wages paid to users
v2 => 0, v1 => v2 (v2 substitutes v1) outsourcing of labour
28. 4. Class and the web
Produsage in a capitalist society can be interpreted as the
outsourcing of productive labour from wage labour to users who
work completely for free and help maximizing the rate of
exploitation (e = s / v, = surplus value / variable capital) so that
profits can be raised and new media capital can be accumulated.
e = s /v: v=>0 => exploitation=>infinity
Dallas Smythe (1981/2006) suggests that in the case of media
advertisement models, the audience is sold as a commodity to
advertisers (audience commodity):
“Because audience power is produced, sold, purchased and
consumed, it commands a price and is a commodity. (….) You
audience members contribute your unpaid work time and in exchange
you receive the program material and the explicit advertisements”
(Smythe 1981/2006: 233, 238).
29. 4. Class and the web
The Internet users who google data, upload or watch videos on
YouTube, upload or browse personal images on Flickr, or
accumulate friends with whom they exchange content or
communicate online via social networking platforms like MySpace
or Facebook, constitute an audience commodity that is sold to
advertisers.
The difference between the audience commodity on traditional mass
media and on the Internet is that in the latter case the users are also
content producers; there is user-generated content, the users engage
in permanent creative activity, communication, community
building, and content-production.
Internet produser/produsage commodity: Due to the permanent
activity of the recipients and their status as produsers, we can say that
in the case of the Internet the audience commodity is a produser
commodity.
30. 4. Class and the web
The category of the produser commodity does not signify a
democratization of the media towards a participatory or
democratic system, but the total commodification of human
creativity.
31. 4. Class and the web
Advertisements on the Internet are frequently personalized;
this is made possible by surveilling, storing, and assessing user
activities with the help of computers and databases. This is
another difference from TV and radio, which provide less
individualized content and advertisements due to their more
centralized structure.
In 2008, Internet advertising was the third-largest advertising
market in the USA and the UK.
32. 4. Class and the web
Figure: The growth of Internet advertising profits in the USA (source: IAB Internet
Advertising Revenue Report 2008)
Figure: The growth of Internet advertising profits in the UK (source: Ofcom
Communications Market Report 2009)
33. 5. Conclusion
The dialectic of technology and society
The contemporary Internet and the contemporary world wide web
are predominantly corporate spaces of capital accumulation
through exploitation.
“Critical theory argues that technology is not a thing in the
ordinary sense of the term, but an ‘ambivalent’ process of
development suspended between different possibilities”
(Feenberg 2002: 15).
Critical studies as alternative to technological/media
determinism
34. 5. Conclusion
Technological/Media determinism:
Cause Effect
+ = Techno-optimism
MEDIA / TECHNOLOGY SOCIETY
-- = Techno-pessimism
Dialectic of technology/media:
Cause Effect
MEDIA / TECHNOLOGY ... SOCIETY
Effect Cause
MEDIA / TECHNOLOGY ... SOCIETY
35. 5. Conclusion
The Internet is a dialectical space that contains both positive and
negative potentials, potentials for dominative competition and for
co-operation that contradict each other (for a detailed discussion of
this hypothesis see Fuchs 2008).
The Internet acts as critical medium that enables information, co-
ordination, communication, and co-operation of protest
movements (Fuchs 2008), it has a potential to act as a critical
alternative medium for progressive social movements, as
examples such as Indymedia show (Fuchs 2010, Sandoval and
Fuchs 2009).
The Internet is both a social medium and a space of accumulation.
36. 5. Conclusion
But the dialectic of the Internet is an asymmetric dialectic.
Visibility is a central resource on the Internet.
Dominant actors such as corporations, political parties, or
governments control a vast amount of resources (money,
influence, reputation, power, etc) which allows them to gain and
accumulate visibility on the Internet.
Although everyone can produce and diffuse information in
principle easily with the help of the Internet because it is a global
decentralized many-to-many and one-to-many communication
system, not all information is visible to the same degree.
37. 5. Conclusion
Rank Video Number of hits Originator Corporation,
1 Evolution of Dance 128 350 731 Judson Laipply
owner
Private, non- 11 of the 15 most
2 Avril Lavigne - Girlfriend 127 518 607 RCA Records
corporate
Sony Music viewed YouTube
Entertainment
3 Charlie bit my finger – 127 370 584 Harry and Charlie Private, non- videos of all time are
again! corporate
4 Miley Cirus – 7 Things 102 979 855 Hollywood Walt Disney provided by large
Records Company
5 Rihanna – Don’t Stop the 101 501 290 Universal Music Vivendi media corporations
Music Group
6 Chris Brown – With You 99 195 687 Jive Records Sony Music
Entertainment
such as Sony Music
7 Pands - Disculpa los
Malos Pensamientos
98 309 779 Movic Records Movic Records Entertainment,
8
(Evangelion)
Lo qué tú Quieras Oír 98 204 841 Guilermo Zapata Non-corporate,
Vivendi, Walt
creative
commons Disney Company,
9 Jeff Dunham – Achmed
the Dead Terrorist
97 015 666 Comedy Central Viacom
ITV plc, Movic
10 Hahaha 93 906 757 Spacelord72 Private, non-
corporate Records.
11 Leona Lewis – Bleeding 91 243 811 Syco Music Sony Music
Love Entertainment
12 Lady Gaga – Just Dance 80 633 974 Interscope- Vivendi
Geffen-A&M The “Internet
13 Britney Spears - 78 448 761 Jive Sony Music
14
Womanizer
Timbaland – Apologize 78 400 330 Interscope-
Entertainment
Vivendi
attention economy“
15 Susan Boyle – Singer – 77 121 404
Geffen-A&M
ITV ITV plc
is dominated by
Britains Got Talent 2009
Table: Most viewed videos on YouTube of all time, October 17th, 2009, 21:00 CET
large corporations.
38. 5. Conclusion
Rank Blog Operator Character Alexa Traffic Rank (3
month average of visits
by global Internet users)
1 Huffington Huffington Post Inc. Corporate #274 0.3192%
Post
2 Gizmodo Gawker Media Corporate #760 0.1434%
3 TechCrunch TechCrunch Corporate #495 0.2117%
4 Engadget AOL Time Warner Corporate #562 0.1829%
5 Boing Boing Happy Mutants LLC Corporate #2301 0.058%
6 Mashable! Mashable Corporate #517 0.2142%
7 Think Center for American Non-corporate, #9259 0.0166%
Progress Progress Action politcal think tank
Fund
8 The Daily RTST Inc. Corporate #4390 0.0277%
Beast
8 The Corner on National Review, Corporate #5740 0.0211%
National Inc.
Review
10 Hot Air Hot Air LLC Corporate #5039
0.0217%
Table: Blogs with the largest attention and influence, data source: Technorati Authority,
October 17, 2009
39. 5. Conclusion
The blogosphere is dominated by start-up companies that aim at
capital accumulation.
9 of the top 10 blogs are corporate blogs.
The only non-corporate top 10 blog is a political think tank
funded by individuals who are politically close to the Democrats.
The blogosphere is dominated by a power elite, capital and
political actors.
None of these blogs reaches as much attention on the Internet as
the large information platforms operated by large corporations:
Yahoo: 25.699%, MSN: 11.768%, AOL: 2.253%, BBC: 1.594%,
CNN: 1.404% (alexa.com, percentage of global Internet users who
visit web platforms, 3 month average).
40. 5. Conclusion
Indymedia is only ranked number 4147 in the list of the most
accessed websites, whereas BBC Online is ranked number 44,
CNN Online number 52, the New York Times Online number
115, Spiegel Online number 152, Bildzeitung Online number 246,
and Fox News Online number 250 (data source: alexa.com, top 1
000 000 000 sites, August 2, 2009).
= stratified capitalist online attention economy
Internet-supported protest is possible and necessary, but today
remains rather marginalized.
The question if resistance to online surveillance is possible,
depends on how conscious users are about potential threats.
Survey: N=674 students who use social networking sites
41. 5. Conclusion
Figure: Major perceived opportunities of social networking sites
1: Maintaining existing contacts, friendships, family relations, e t c
2: Establishing new contacts with unknown people or with people whom one hardly knows and can
easier contact o n l i n e
3: Finding and renewing old contacts
4: Communication in interest groups and hobby groups
5: Communication and contacts in general (no further specification)
6: International and global character of communication and contacts
7: Sharing and accessing photos, music, v i d e o s
8: Entertainment, fun, spare time, amusem e n t
9: Source of information and new s
10: Browsing other profiles, "spying" on others
11: Free communication that saves money
12: Reminder of birthdays
13: Business communication, finding jobs, self-presentation for potential employers
14: Being hip and trendy
15: Mobility, access from anyw h e r e
16: Self-presentation to others (for non-business reasons )
17: Flirting, sex, love
42. 5. Conclusion
Figure: Major perceived risks of social networking sites
1: Data abuse or data forwarding or lack of data protection that lead to surveillance by state, companies, or
individuals
2: Private affairs become public and result in a lack of privacy and privacy control
3: Personal profile data (images, etc) are accessed by employer or potential employers and result in job-related
disadvantages (such as losing a job or not getting h i r e d )
4: Receiving advertising or spam
5: Lack or loss of personal contacts, superficial communication and contacts, impoverishment of social relat i o n s
6: Stalking, harassment, becoming a crime victi m
7: Commercial selling of personal data
8: Data and identity theft
9: I see no disadvanta g e s
10: It is a waste of time
11: Virus, hacking and defacing of profiles, data integri t y
12: Internet addiction, increase of stress and health damages
13: Unrealistic, exaggerated self-presentation, competition for best self-presentati o n
14: Disadvantages at university because professors can access profile s
15: Costs for usage can be introduced (or exist in the case of some platforms)
16: Friends can get a negative impression of m e
43. 5. Conclusion
Antangonism between surveillance and communication on
SNS:
55.7% of the respondents say that political, economic, or personal
surveillance is a main threat of social networking sites. 59.1%
consider maintaining existing contacts as the main advantage.
As our study has shown, many young people seem to be aware
of the surveillance risks of web 2.0.
They possess a critical potential that could be transformed into
protest and social movement action if it is adequately triggered and
organized.
44. 5. Conclusion
Kojin Karatani
Internet produsage: reflects “the transcritical moment where
workers and consumers intersect” (Karatani 2005: 21).
For political strategies this brings up the actuality of an
associationist movement that is “a transnational association of
consumers/workers” (Karatani 2005: 295) that engages in “the
class struggle against capitalism” of “workers qua consumers or
consumers qua workers” (Karatani 2005: 294).
45. The Hegelian Dialectical Triad of Multitude,
Capital, and Communism commonwealth =
communism
Marx:
produces surplus knowledge = part of
value, the commons = “AUFHEBUNG“ (SUBLATION)
“a world of common wealth, focusing on and
commons “universal labour”
expanding our capacities for collective
(knowledge, language, that is “brought about
production and self-government“ (Hardt and
affects, communication, partly by the Negri 2009, Commonwealth: xiii), comunism
education, care, technology, cooperation of men “centralized state control“, “proper meaning“ of
digital knowledge, user- now living, but partly communism=“what the private is to capitalism,
generated Internet content, also by building on what the public is to [state] socialism, the
Internet-mediated earlier work” (Marx common is to communism“ (Hardt and Negri
communication, etc)
1894: 199). 2009: 273) =>
FOR A COMMUNIST INTERNET IN A
POLITICAL ORGANIZATION COMMUNIST SOCIETY
capital exploits surplus value and the commons
V = c + v + s the multitude resists against capitalM-C..P..C‘-M‘
= actuality: necessary for capitalism
MULTITUDE = potentiality CAPITAL, “EMPIRE“