Dataset Viewer
text
stringlengths 135
2.96k
| source
stringlengths 38
44
|
---|---|
Launched in April 2006 as a statistical machine translation service, it used United Nations and European Parliament documents and transcripts to gather linguistic data. Rather than translating languages directly, it first translates text to English and then pivots to the target language in most of the language combinations it posits in its grid, with a few exceptions including Catalan-Spanish. During a translation, it looks for patterns in millions of documents to help decide which words to choose and how to arrange them in the target language. Its accuracy, which has been criticized on several occasions, has been measured to vary greatly across languages. In November 2016, Google announced that Google Translate would switch to a neural machine translation engine – Google Neural Machine Translation (GNMT) – which translates "whole sentences at a time, rather than just piece by piece. It uses this broader context to help it figure out the most relevant translation, which it then rearranges and adjusts to be more like a human speaking with proper grammar".
|
https://en.wikipedia.org/wiki?curid=3235536
|
Google Translate produces approximations across languages of multiple forms of text and media, including text, speech, websites, or text on display in still or live video images. For some languages, Google Translate can synthesize speech from text, and in certain pairs it is possible to highlight specific corresponding words and phrases between the source and target text. Results are sometimes shown with dictional information below the translation box, but it is not a dictionary and has been shown to invent translations in all languages for words it does not recognize. If "Detect language" is selected, text in an unknown language can be automatically identified. In the web interface, users can suggest alternate translations, such as for technical terms, or correct mistakes. These suggestions may be included in future updates to the translation process. If a user enters a URL in the source text, Google Translate will produce a hyperlink to a machine translation of the website. Users can save translation proposals in a "phrasebook" for later use, and a shareable URL is generated for each translation. For some languages, text can be entered via an on-screen keyboard, through handwriting recognition, or speech recognition. It is possible to enter searches in a source language that are first translated to a destination language allowing one to browse and interpret results from the selected destination language in the source language.
|
https://en.wikipedia.org/wiki?curid=3235536
|
Many of the more popular languages have a "text-to-speech" audio function that is able to read back a text in that language, up to a few dozen words or so. In the case of pluricentric languages, the accent depends on the region: for English, in the Americas, most of the Asia-Pacific and Western Asia, the audio uses a female General American accent, whereas in Europe, Hong Kong, Malaysia, Singapore, Guyana and all other parts of the world, a female British (Received Pronunciation) accent is used, except for a special General Australian accent used in Australia, New Zealand and Norfolk Island, and an Indian English accent used in India; for Spanish, in the Americas, a Latin American accent is used, while in the other parts of the world, a Castilian accent is used; for Portuguese, a São Paulo accent is used around the world, except in Portugal, where their native accent is used instead; for French, a Quebec accent is used in Canada, while in the other parts of the world, a standard European accent is used; for Bengali, a male Bangladeshi accent is used, except in India, where a special female Indian Bengali accent is used instead. Some less widely spoken languages use the open-source eSpeak synthesizer for their speech; producing a robotic, awkward voice that may be difficult to understand.
|
https://en.wikipedia.org/wiki?curid=3235536
|
In January 2015, the apps gained the ability to propose translations of physical signs in real time using the device's camera, as a result of Google's acquisition of the Word Lens app. The original January launch only supported seven languages, but a July update added support for 20 new languages, with the release of a new implementation that utilizes convolutional neural networks, and also enhanced the speed and quality of Conversation Mode translations (augmented reality). The feature was subsequently renamed Instant Camera. The technology underlying Instant Camera combines image processing and optical character recognition, then attempts to produce cross-language equivalents using standard Google Translate estimations for the text as it is perceived.
|
https://en.wikipedia.org/wiki?curid=3235536
|
Google Translate does not translate from one language to another (L1 → L2). Instead, it often translates first to English and then to the target language (L1 → EN → L2). However, because English, like all human languages, is ambiguous and depends on context, this can cause translation errors. For example, translating ' from French to Russian gives → you → OR . If Google were using an unambiguous, artificial language as the intermediary, it would be → you → OR → thou → ""'. Such a suffixing of words disambiguates their different meanings. Hence, publishing in English, using unambiguous words, providing context, using expressions such as "you all" may or may not make a better one-step translation depending on the target language.
|
https://en.wikipedia.org/wiki?curid=3235536
|
Google has crowdsourcing features for volunteers to be a part of its "Translate Community", intended to help improve Google Translate's accuracy. Volunteers can select up to five languages to help improve translation; users can verify translated phrases and translate phrases in their languages to and from English, helping to improve the accuracy of translating more rare and complex phrases. In August 2016, a Google Crowdsource app was released for Android users, in which translation tasks are offered. There are three ways to contribute. First, Google will show a phrase that one should type in the translated version. Second, Google will show a proposed translation for a user to agree, disagree, or skip. Third, users can suggest translations for phrases where they think they can improve on Google's results. Tests in 44 languages show that the "suggest an edit" feature led to an improvement in a maximum of 40% of cases over four years.
|
https://en.wikipedia.org/wiki?curid=3235536
|
Google Translate's neural machine translation system uses a large end-to-end artificial neural network that attempts to perform deep learning, in particular, long short-term memory networks. GNMT improves the quality of translation over SMT in some instances because it uses an example-based machine translation (EBMT) method in which the system "learns from millions of examples." According to Google researchers, it translates "whole sentences at a time, rather than just piece by piece. It uses this broader context to help it figure out the most relevant translation, which it then rearranges and adjusts to be more like a human speaking with proper grammar". GNMT's "proposed architecture" of "system learning" has been implemented on over a hundred languages supported by Google Translate. With the end-to-end framework, Google states but does not demonstrate for most languages that "the system learns over time to create better, more natural translations." The GNMT network attempts interlingual machine translation, which encodes the "semantics of the sentence rather than simply memorizing phrase-to-phrase translations", and the system did not invent its own universal language, but uses "the commonality found in between many languages". GNMT was first enabled for eight languages: to and from English and Chinese, French, German, Japanese, Korean, Portuguese, Spanish and Turkish. In March 2017, it was enabled for Hindi, Russian and Vietnamese, followed by Bengali, Gujarati, Indonesian, Kannada, Malayalam, Marathi, Punjabi, Tamil and Telugu in April.
|
https://en.wikipedia.org/wiki?curid=3235536
|
Google Translate is not as reliable as human translation. When text is well-structured, written using formal language, with simple sentences, relating to formal topics for which training data is ample, it often produces conversions similar to human translations between English and a number of high-resource languages. Accuracy decreases for those languages when fewer of those conditions apply, for example when sentence length increases or the text uses familiar or literary language. For many other languages vis-à-vis English, it can produce the gist of text in those formal circumstances. Human evaluation from English to all 102 languages shows that the main idea of a text is conveyed more than 50% of the time for 35 languages. For 67 languages, a minimally comprehensible result is not achieved 50% of the time or greater. A few studies have evaluated Chinese, French, German, and Spanish to English, but no systematic human evaluation has been conducted from most Google Translate languages to English. Speculative language-to-language scores extrapolated from English-to-other measurements indicate that Google Translate will produce translation results that convey the gist of a text from one language to another more than half the time in about 1% of language pairs, where neither language is English. Research conducted in 2011 showed that Google Translate got a slightly higher score than the UCLA minimum score for the English Proficiency Exam. Due to its identical choice of words without considering the flexibility of choosing alternative words or expressions, it produces a relatively similar translation to human translation from the perspective of formality, referential cohesion, and conceptual cohesion. Moreover, a number of languages are translated into a sentence structure and sentence length similar to a human translation. Furthermore, Google carried out a test that required native speakers of each language to rate the translation on a scale between 0 and 6, and Google Translate scored 5.43 on average.
|
https://en.wikipedia.org/wiki?curid=3235536
|
When used as a dictionary to translate single words, Google Translate is highly inaccurate because it must guess between polysemic words. Among the top 100 words in the English language, which make up more than 50% of all written English, the average word has more than 15 senses, which makes the odds against a correct translation about 15 to 1 if each sense maps to a different word in the target language. Most common English words have at least two senses, which produces 50/50 odds in the likely case that the target language uses different words for those different senses. The odds are similar from other languages to English. Google Translate makes statistical guesses that raise the likelihood of producing the most frequent sense of a word, with the consequence that an accurate translation will be unobtainable in cases that do not match the majority or plurality corpus occurrence. The accuracy of single-word predictions has not been measured for any language. Because almost all non-English language pairs pivot through English, the odds against obtaining accurate single-word translations from one non-English language to another can be estimated by multiplying the number of senses in the source language with the number of senses each of those terms have in English. When Google Translate does not have a word in its vocabulary, it makes up a result as part of its algorithm.
|
https://en.wikipedia.org/wiki?curid=3235536
|
Google Translate, like other automatic translation tools, has its limitations. The service limits the number of paragraphs and the range of technical terms that can be translated, and while it can help the reader understand the general content of a foreign language text, it does not always deliver accurate translations, and most times it tends to repeat verbatim the same word it is expected to translate. Grammatically, for example, Google Translate struggles to differentiate between "imperfect" and "perfect" aspects in Romance languages so habitual and continuous acts in the past often become single "historical" events. Although seemingly pedantic, this can often lead to incorrect results (to a native speaker of for example French and Spanish) which would have been avoided by a human translator. Knowledge of the "subjunctive mood" is virtually non-existent. Moreover, the formal second person () is often chosen, whatever the context or accepted usage. Since its English reference material contains only "you" forms, it has difficulty translating a language with "you all" or formal "you" variations.
|
https://en.wikipedia.org/wiki?curid=3235536
|
Due to differences between languages in investment, research, and the extent of digital resources, the accuracy of Google Translate varies greatly among languages. Some languages produce better results than others. Most languages from Africa, Asia, and the Pacific, tend to score poorly in relation to the scores of many well-financed European languages, Afrikaans and Chinese being the high-scoring exceptions from their continents. No languages indigenous to Australia are included within Google Translate. Higher scores for European can be partially attributed to the Europarl Corpus, a trove of documents from the European Parliament that have been professionally translated by the mandate of the European Union into as many as 21 languages. A 2010 analysis indicated that French to English translation is relatively accurate, and 2011 and 2012 analyses showed that Italian to English translation is relatively accurate as well. However, if the source text is shorter, rule-based machine translations often perform better; this effect is particularly evident in Chinese to English translations. While edits of translations may be submitted, in Chinese specifically one cannot edit sentences as a whole. Instead, one must edit sometimes arbitrary sets of characters, leading to incorrect edits. A good example is Russian-to-English. Formerly one would use Google Translate to make a draft and then use a dictionary and common sense to correct the numerous mistakes. As of early 2018 Translate is sufficiently accurate to make the Russian Wikipedia accessible to those who can read English. The quality of Translate can be checked by adding it as an extension to Chrome or Firefox and applying it to the left language links of any Wikipedia article. It can be used as a dictionary by typing in words. One can translate from a book by using a scanner and an OCR like Google Drive, but this takes about five minutes per page.
|
https://en.wikipedia.org/wiki?curid=3235536
|
The origins of the Internet date back to the development of packet switching and research commissioned by the United States Department of Defense in the 1960s to enable time-sharing of computers. The primary precursor network, the ARPANET, initially served as a backbone for interconnection of regional academic and military networks in the 1970s to enable resource sharing. The funding of the National Science Foundation Network as a new backbone in the 1980s, as well as private funding for other commercial extensions, led to worldwide participation in the development of new networking technologies, and the merger of many networks. The linking of commercial networks and enterprises by the early 1990s marked the beginning of the transition to the modern Internet, and generated a sustained exponential growth as generations of institutional, personal, and mobile computers were connected to the network. Although the Internet was widely used by academia in the 1980s, commercialization incorporated its services and technologies into virtually every aspect of modern life.
|
https://en.wikipedia.org/wiki?curid=14539
|
Most traditional communication media, including telephone, radio, television, paper mail and newspapers are reshaped, redefined, or even bypassed by the Internet, giving birth to new services such as email, Internet telephone, Internet television, online music, digital newspapers, and video streaming websites. Newspaper, book, and other print publishing are adapting to website technology, or are reshaped into blogging, web feeds and online news aggregators. The Internet has enabled and accelerated new forms of personal interactions through instant messaging, Internet forums, and social networking services. Online shopping has grown exponentially for major retailers, small businesses, and entrepreneurs, as it enables firms to extend their "brick and mortar" presence to serve a larger market or even sell goods and services entirely online. Business-to-business and financial services on the Internet affect supply chains across entire industries.
|
https://en.wikipedia.org/wiki?curid=14539
|
The Internet has no single centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own policies. The overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address (IP address) space and the Domain Name System (DNS), are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise. In November 2006, the Internet was included on "USA Today"s list of New Seven Wonders.
|
https://en.wikipedia.org/wiki?curid=14539
|
ARPANET development began with two network nodes which were interconnected between the Network Measurement Center at the University of California, Los Angeles (UCLA) Henry Samueli School of Engineering and Applied Science directed by Leonard Kleinrock, and the NLS system at SRI International (SRI) by Douglas Engelbart in Menlo Park, California, on 29 October 1969. The third site was the Culler-Fried Interactive Mathematics Center at the University of California, Santa Barbara, followed by the University of Utah Graphics Department. In a sign of future growth, 15 sites were connected to the young ARPANET by the end of 1971. These early years were documented in the 1972 film "". In the 1970s, ARPANET initially connected only a few sites in several metropolitan areas of Los Angeles, San Francisco and Boston. Then ARPANET gradually developed into a highly decentralized communications network, connecting remote centers and military bases in the United States.
|
https://en.wikipedia.org/wiki?curid=14539
|
Early international collaborations for the ARPANET were rare. Connections were made in 1973 to the Norwegian Seismic Array (NORSAR) via a satellite station in Tanum, Sweden, and to Peter Kirstein's research group at University College London which provided a gateway to British academic networks, forming the first international resource sharing network. ARPA projects, international working groups and commercial initiatives led to the development of various protocols and standards by which multiple separate networks could become a single network or "a network of networks". In 1974, Vint Cerf and Bob Kahn used the term "internet" as a shorthand for "internetwork" in "", and later RFCs repeated this use. Cerf and Kahn credit Louis Pouzin with important influences on TCP/IP design. National PTTs and commercial providers developed X.25 standards and deployed them on public data networks.
|
https://en.wikipedia.org/wiki?curid=14539
|
Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) funded the Computer Science Network (CSNET). In 1982, the Internet Protocol Suite (TCP/IP) was standardized, which permitted worldwide proliferation of interconnected networks. TCP/IP network access expanded again in 1986 when the National Science Foundation Network (NSFNet) provided access to supercomputer sites in the United States for researchers, first at speeds of 56 kbit/s and later at 1.5 Mbit/s and 45 Mbit/s. The NSFNet expanded into academic and research organizations in Europe, Australia, New Zealand and Japan in 1988–89. Although other network protocols such as UUCP and PTT public data networks had global reach well before this time, this marked the beginning of the Internet as an intercontinental network. Commercial Internet service providers (ISPs) emerged in 1989 in the United States and Australia. The ARPANET was decommissioned in 1990.
|
https://en.wikipedia.org/wiki?curid=14539
|
Steady advances in semiconductor technology and optical networking created new economic opportunities for commercial involvement in the expansion of the network in its core and for delivering services to the public. In mid-1989, MCI Mail and Compuserve established connections to the Internet, delivering email and public access products to the half million users of the Internet. Just months later, on 1 January 1990, PSInet launched an alternate Internet backbone for commercial use; one of the networks that added to the core of the commercial Internet of later years. In March 1990, the first high-speed T1 (1.5 Mbit/s) link between the NSFNET and Europe was installed between Cornell University and CERN, allowing much more robust communications than were capable with satellites. Six months later Tim Berners-Lee would begin writing WorldWideWeb, the first web browser, after two years of lobbying CERN management. By Christmas 1990, Berners-Lee had built all the tools necessary for a working Web: the HyperText Transfer Protocol (HTTP) 0.9, the HyperText Markup Language (HTML), the first Web browser (which was also an HTML editor and could access Usenet newsgroups and FTP files), the first HTTP server software (later known as CERN httpd), the first web server, and the first Web pages that described the project itself. In 1991 the Commercial Internet eXchange was founded, allowing PSInet to communicate with the other commercial networks CERFnet and Alternet. Stanford Federal Credit Union was the first financial institution to offer online Internet banking services to all of its members in October 1994. In 1996, OP Financial Group, also a cooperative bank, became the second online bank in the world and the first in Europe. By 1995, the Internet was fully commercialized in the U.S. when the NSFNet was decommissioned, removing the last restrictions on use of the Internet to carry commercial traffic.
|
https://en.wikipedia.org/wiki?curid=14539
|
Since 1995, the Internet has tremendously impacted culture and commerce, including the rise of near instant communication by email, instant messaging, telephony (Voice over Internet Protocol or VoIP), two-way interactive video calls, and the World Wide Web with its discussion forums, blogs, social networking services, and online shopping sites. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1 Gbit/s, 10 Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking services. During the late 1990s, it was estimated that traffic on the public Internet grew by 100 percent per year, while the mean annual growth in the number of Internet users was thought to be between 20% and 50%. This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary nature of the Internet protocols, which encourages vendor interoperability and prevents any one company from exerting too much control over the network. , the estimated total number of Internet users was 2.095 billion (30.2% of world population). It is estimated that in 1993 the Internet carried only 1% of the information flowing through two-way telecommunication. By 2000 this figure had grown to 51%, and by 2007 more than 97% of all telecommunicated information was carried over the Internet.
|
https://en.wikipedia.org/wiki?curid=14539
|
The Internet is a global network that comprises many voluntarily interconnected autonomous networks. It operates without a central governing body. The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise. To maintain interoperability, the principal name spaces of the Internet are administered by the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is governed by an international board of directors drawn from across the Internet technical, business, academic, and other non-commercial communities. ICANN coordinates the assignment of unique identifiers for use on the Internet, including domain names, IP addresses, application port numbers in the transport protocols, and many other parameters. Globally unified name spaces are essential for maintaining the global reach of the Internet. This role of ICANN distinguishes it as perhaps the only central coordinating body for the global Internet.
|
https://en.wikipedia.org/wiki?curid=14539
|
Regional Internet registries (RIRs) were established for five regions of the world. The African Network Information Center (AfriNIC) for Africa, the American Registry for Internet Numbers (ARIN) for North America, the Asia-Pacific Network Information Centre (APNIC) for Asia and the Pacific region, the Latin American and Caribbean Internet Addresses Registry (LACNIC) for Latin America and the Caribbean region, and the Réseaux IP Européens – Network Coordination Centre (RIPE NCC) for Europe, the Middle East, and Central Asia were delegated to assign IP address blocks and other Internet parameters to local registries, such as Internet service providers, from a designated pool of addresses set aside for each region.
|
https://en.wikipedia.org/wiki?curid=14539
|
The National Telecommunications and Information Administration, an agency of the United States Department of Commerce, had final approval over changes to the DNS root zone until the IANA stewardship transition on 1 October 2016. The Internet Society (ISOC) was founded in 1992 with a mission to ""assure the open development, evolution and use of the Internet for the benefit of all people throughout the world"". Its members include individuals (anyone may join) as well as corporations, organizations, governments, and universities. Among other activities ISOC provides an administrative home for a number of less formally organized groups that are involved in developing and managing the Internet, including: the IETF, Internet Architecture Board (IAB), Internet Engineering Steering Group (IESG), Internet Research Task Force (IRTF), and Internet Research Steering Group (IRSG). On 16 November 2005, the United Nations-sponsored World Summit on the Information Society in Tunis established the Internet Governance Forum (IGF) to discuss Internet-related issues.
|
https://en.wikipedia.org/wiki?curid=14539
|
Internet service providers (ISPs) establish the worldwide connectivity between individual networks at various levels of scope. End-users who only access the Internet when needed to perform a function or obtain information, represent the bottom of the routing hierarchy. At the top of the routing hierarchy are the tier 1 networks, large telecommunication companies that exchange traffic directly with each other via very high speed fibre optic cables and governed by peering agreements. Tier 2 and lower-level networks buy Internet transit from other providers to reach at least some parties on the global Internet, though they may also engage in peering. An ISP may use a single upstream provider for connectivity, or implement multihoming to achieve redundancy and load balancing. Internet exchange points are major traffic exchanges with physical connections to multiple ISPs. Large organizations, such as academic institutions, large enterprises, and governments, may perform the same function as ISPs, engaging in peering and purchasing transit on behalf of their internal networks. Research networks tend to interconnect with large subnetworks such as GEANT, GLORIAD, Internet2, and the UK's national research and education network, JANET.
|
https://en.wikipedia.org/wiki?curid=14539
|
Common methods of Internet access by users include dial-up with a computer modem via telephone circuits, broadband over coaxial cable, fiber optics or copper wires, Wi-Fi, satellite, and cellular telephone technology (e.g. 3G, 4G). The Internet may often be accessed from computers in libraries and Internet cafes. Internet access points exist in many public places such as airport halls and coffee shops. Various terms are used, such as "public Internet kiosk", "public access terminal", and "Web payphone". Many hotels also have public terminals that are usually fee-based. These terminals are widely accessed for various usages, such as ticket booking, bank deposit, or online payment. Wi-Fi provides wireless access to the Internet via local computer networks. Hotspots providing such access include Wi-Fi cafes, where users need to bring their own wireless devices such as a laptop or PDA. These services may be free to all, free to customers only, or fee-based.
|
https://en.wikipedia.org/wiki?curid=14539
|
Grassroots efforts have led to wireless community networks. Commercial Wi-Fi services that cover large areas are available in many cities, such as New York, London, Vienna, Toronto, San Francisco, Philadelphia, Chicago and Pittsburgh, where the Internet can then be accessed from places such as a park bench. Experiments have also been conducted with proprietary mobile wireless networks like Ricochet, various high-speed data services over cellular networks, and fixed wireless services. Modern smartphones can also access the Internet through the cellular carrier network. For Web browsing, these devices provide applications such as Google Chrome, Safari, and Firefox and a wide variety of other Internet software may be installed from app-stores. Internet usage by mobile and tablet devices exceeded desktop worldwide for the first time in October 2016.
|
https://en.wikipedia.org/wiki?curid=14539
|
The International Telecommunication Union (ITU) estimated that, by the end of 2017, 48% of individual users regularly connect to the Internet, up from 34% in 2012. Mobile Internet connectivity has played an important role in expanding access in recent years especially in Asia and the Pacific and in Africa. The number of unique mobile cellular subscriptions increased from 3.89 billion in 2012 to 4.83 billion in 2016, two-thirds of the world's population, with more than half of subscriptions located in Asia and the Pacific. The number of subscriptions is predicted to rise to 5.69 billion users in 2020. , almost 60% of the world's population had access to a 4G broadband cellular network, up from almost 50% in 2015 and 11% in 2012. The limits that users face on accessing information via mobile applications coincide with a broader process of fragmentation of the Internet. Fragmentation restricts access to media content and tends to affect poorest users the most.
|
https://en.wikipedia.org/wiki?curid=14539
|
Zero-rating, the practice of Internet service providers allowing users free connectivity to access specific content or applications without cost, has offered opportunities to surmount economic hurdles, but has also been accused by its critics as creating a two-tiered Internet. To address the issues with zero-rating, an alternative model has emerged in the concept of 'equal rating' and is being tested in experiments by Mozilla and Orange in Africa. Equal rating prevents prioritization of one type of content and zero-rates all content up to a specified data cap. A study published by Chatham House, 15 out of 19 countries researched in Latin America had some kind of hybrid or zero-rated product offered. Some countries in the region had a handful of plans to choose from (across all mobile network operators) while others, such as Colombia, offered as many as 30 pre-paid and 34 post-paid plans.
|
https://en.wikipedia.org/wiki?curid=14539
|
The Internet standards describe a framework known as the Internet protocol suite (also called TCP/IP, based on the first two components.) This is a suite of protocols that are ordered into a set of four conceptional layers by the scope of their operation, originally documented in and . At the top is the application layer, where communication is described in terms of the objects or data structures most appropriate for each application. For example, a web browser operates in a client–server application model and exchanges information with the Hypertext Transfer Protocol (HTTP) and an application-germane data structure, such as the Hypertext Markup Language (HTML).
|
https://en.wikipedia.org/wiki?curid=14539
|
IPv6 is not directly interoperable by design with IPv4. In essence, it establishes a parallel version of the Internet not directly accessible with IPv4 software. Thus, translation facilities must exist for internetworking or nodes must have duplicate networking software for both networks. Essentially all modern computer operating systems support both versions of the Internet Protocol. Network infrastructure, however, has been lagging in this development. Aside from the complex array of physical connections that make up its infrastructure, the Internet is facilitated by bi- or multi-lateral commercial contracts, e.g., peering agreements, and by technical specifications or protocols that describe the exchange of data over the network. Indeed, the Internet is defined by its interconnections and routing policies.
|
https://en.wikipedia.org/wiki?curid=14539
|
While the hardware components in the Internet infrastructure can often be used to support other software systems, it is the design and the standardization process of the software that characterizes the Internet and provides the foundation for its scalability and success. The responsibility for the architectural design of the Internet software systems has been assumed by the Internet Engineering Task Force (IETF). The IETF conducts standard-setting work groups, open to any individual, about the various aspects of Internet architecture. The resulting contributions and standards are published as "Request for Comments" (RFC) documents on the IETF web site. The principal methods of networking that enable the Internet are contained in specially designated RFCs that constitute the Internet Standards. Other less rigorous documents are simply informative, experimental, or historical, or document the best current practices (BCP) when implementing Internet technologies.
|
https://en.wikipedia.org/wiki?curid=14539
|
The World Wide Web is a global collection of documents, images, multimedia, applications, and other resources, logically interrelated by hyperlinks and referenced with Uniform Resource Identifiers (URIs), which provide a global system of named references. URIs symbolically identify services, web servers, databases, and the documents and resources that they can provide. Hypertext Transfer Protocol (HTTP) is the main access protocol of the World Wide Web. Web services also use HTTP for communication between software systems for information transfer, sharing and exchanging business data and logistic and is one of many languages or protocols that can be used for communication on the Internet.
|
https://en.wikipedia.org/wiki?curid=14539
|
World Wide Web browser software, such as Microsoft's Internet Explorer/Edge, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome, lets users navigate from one web page to another via the hyperlinks embedded in the documents. These documents may also contain any combination of computer data, including graphics, sounds, text, video, multimedia and interactive content that runs while the user is interacting with the page. Client-side software can include animations, games, office applications and scientific demonstrations. Through keyword-driven Internet research using search engines like Yahoo!, Bing and Google, users worldwide have easy, instant access to a vast and diverse amount of online information. Compared to printed media, books, encyclopedias and traditional libraries, the World Wide Web has enabled the decentralization of information on a large scale.
|
https://en.wikipedia.org/wiki?curid=14539
|
The Web has enabled individuals and organizations to publish ideas and information to a potentially large audience online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial cost and many cost-free services are available. However, publishing and maintaining large, professional web sites with attractive, diverse and up-to-date information is still a difficult and expensive proposition. Many individuals and some companies and groups use "web logs" or blogs, which are largely used as easily updatable online diaries. Some commercial organizations encourage staff to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information, and be attracted to the corporation as a result.
|
https://en.wikipedia.org/wiki?curid=14539
|
When the Web developed in the 1990s, a typical web page was stored in completed form on a web server, formatted in HTML, complete for transmission to a web browser in response to a request. Over time, the process of creating and serving web pages has become dynamic, creating a flexible design, layout, and content. Websites are often created using content management software with, initially, very little content. Contributors to these systems, who may be paid staff, members of an organization or the public, fill underlying databases with content using editing pages designed for that purpose while casual visitors view and read this content in HTML form. There may or may not be editorial, approval and security systems built into the process of taking newly entered content and making it available to the target visitors.
|
https://en.wikipedia.org/wiki?curid=14539
|
Internet telephony is a common communications service realized with the Internet. The name of the principle internetworking protocol, the Internet Protocol, lends its name to voice over Internet Protocol (VoIP). The idea began in the early 1990s with walkie-talkie-like voice applications for personal computers. VoIP systems now dominate many markets, and are as easy to use and as convenient as a traditional telephone. The benefit has been substantial cost savings over traditional telephone calls, especially over long distances. Cable, ADSL, and mobile data networks provide Internet access in customer premises and inexpensive VoIP network adapters provide the connection for traditional analog telephone sets. The voice quality of VoIP often exceeds that of traditional calls. Remaining problems for VoIP include the situation that emergency services may not be universally available, and that devices rely on a local power supply, while older traditional phones are powered from the local loop, and typically operate during a power failure.
|
https://en.wikipedia.org/wiki?curid=14539
|
File sharing is an example of transferring large amounts of data across the Internet. A computer file can be emailed to customers, colleagues and friends as an attachment. It can be uploaded to a website or File Transfer Protocol (FTP) server for easy download by others. It can be put into a "shared location" or onto a file server for instant use by colleagues. The load of bulk downloads to many users can be eased by the use of "mirror" servers or peer-to-peer networks. In any of these cases, access to the file may be controlled by user authentication, the transit of the file over the Internet may be obscured by encryption, and money may change hands for access to the file. The price can be paid by the remote charging of funds from, for example, a credit card whose details are also passed—usually fully encrypted—across the Internet. The origin and authenticity of the file received may be checked by digital signatures or by MD5 or other message digests. These simple features of the Internet, over a worldwide basis, are changing the production, sale, and distribution of anything that can be reduced to a computer file for transmission. This includes all manner of print publications, software products, news, music, film, video, photography, graphics and the other arts. This in turn has caused seismic shifts in each of the existing industries that previously controlled the production and distribution of these products.
|
https://en.wikipedia.org/wiki?curid=14539
|
Streaming media is the real-time delivery of digital media for the immediate consumption or enjoyment by end users. Many radio and television broadcasters provide Internet feeds of their live audio and video productions. They may also allow time-shift viewing or listening such as Preview, Classic Clips and Listen Again features. These providers have been joined by a range of pure Internet "broadcasters" who never had on-air licenses. This means that an Internet-connected device, such as a computer or something more specific, can be used to access on-line media in much the same way as was previously possible only with a television or radio receiver. The range of available types of content is much wider, from specialized technical webcasts to on-demand popular multimedia services. Podcasting is a variation on this theme, where—usually audio—material is downloaded and played back on a computer or shifted to a portable media player to be listened to on the move. These techniques using simple equipment allow anybody, with little censorship or licensing control, to broadcast audio-visual material worldwide.
|
https://en.wikipedia.org/wiki?curid=14539
|
Webcams are a low-cost extension of this phenomenon. While some webcams can give full-frame-rate video, the picture either is usually small or updates slowly. Internet users can watch animals around an African waterhole, ships in the Panama Canal, traffic at a local roundabout or monitor their own premises, live and in real time. Video chat rooms and video conferencing are also popular with many uses being found for personal webcams, with and without two-way sound. YouTube was founded on 15 February 2005 and is now the leading website for free streaming video with more than two billion users. It uses an HTML5 based web player by default to stream and show video files. Registered users may upload an unlimited amount of video and build their own personal profile. YouTube claims that its users watch hundreds of millions, and upload hundreds of thousands of videos daily.
|
https://en.wikipedia.org/wiki?curid=14539
|
From 2000 to 2009, the number of Internet users globally rose from 394 million to 1.858 billion. By 2010, 22 percent of the world's population had access to computers with 1 billion Google searches every day, 300 million Internet users reading blogs, and 2 billion videos viewed daily on YouTube. In 2014 the world's Internet users surpassed 3 billion or 43.6 percent of world population, but two-thirds of the users came from richest countries, with 78.0 percent of Europe countries population using the Internet, followed by 57.4 percent of the Americas. However, by 2018, Asia alone accounted for 51% of all Internet users, with 2.2 billion out of the 4.3 billion Internet users in the world coming from that region. The number of China's Internet users surpassed a major milestone in 2018, when the country's Internet regulatory authority, China Internet Network Information Centre, announced that China had 802 million Internet users. By 2019, China was the world's leading country in terms of Internet users, with more than 800 million users, followed closely by India, with some 700 million users, with the United States a distant third with 275 million users. However, in terms of penetration, China has a 38.4% penetration rate compared to India's 40% and the United States's 80%. As of 2020, it was estimated that 4.5 billion people use the Internet, more than half of the world's population.
|
https://en.wikipedia.org/wiki?curid=14539
|
After English (27%), the most requested languages on the World Wide Web are Chinese (25%), Spanish (8%), Japanese (5%), Portuguese and German (4% each), Arabic, French and Russian (3% each), and Korean (2%). By region, 42% of the world's Internet users are based in Asia, 24% in Europe, 14% in North America, 10% in Latin America and the Caribbean taken together, 6% in Africa, 3% in the Middle East and 1% in Australia/Oceania. The Internet's technologies have developed enough in recent years, especially in the use of Unicode, that good facilities are available for development and communication in the world's widely used languages. However, some glitches such as "mojibake" (incorrect display of some languages' characters) still remain.
|
https://en.wikipedia.org/wiki?curid=14539
|
Educational material at all levels from pre-school to post-doctoral is available from websites. Examples range from CBeebies, through school and high-school revision guides and virtual universities, to access to top-end scholarly literature through the likes of Google Scholar. For distance education, help with homework and other assignments, self-guided learning, whiling away spare time or just looking up more detail on an interesting fact, it has never been easier for people to access educational information at any level from anywhere. The Internet in general and the World Wide Web in particular are important enablers of both formal and informal education. Further, the Internet allows researchers (especially those from the social and behavioral sciences) to conduct research remotely via virtual laboratories, with profound changes in reach and generalizability of findings as well as in communication between scientists and in the publication of results.
|
https://en.wikipedia.org/wiki?curid=14539
|
The low cost and nearly instantaneous sharing of ideas, knowledge, and skills have made collaborative work dramatically easier, with the help of collaborative software. Not only can a group cheaply communicate and share ideas but the wide reach of the Internet allows such groups more easily to form. An example of this is the free software movement, which has produced, among other things, Linux, Mozilla Firefox, and OpenOffice.org (later forked into LibreOffice). Internet chat, whether using an IRC chat room, an instant messaging system, or a social networking service, allows colleagues to stay in touch in a very convenient way while working at their computers during the day. Messages can be exchanged even more quickly and conveniently than via email. These systems may allow files to be exchanged, drawings and images to be shared, or voice and video contact between team members.
|
https://en.wikipedia.org/wiki?curid=14539
|
The Internet allows computer users to remotely access other computers and information stores easily from any access point. Access may be with computer security, i.e. authentication and encryption technologies, depending on the requirements. This is encouraging new ways of remote work, collaboration and information sharing in many industries. An accountant sitting at home can audit the books of a company based in another country, on a server situated in a third country that is remotely maintained by IT specialists in a fourth. These accounts could have been created by home-working bookkeepers, in other remote locations, based on information emailed to them from offices all over the world. Some of these things were possible before the widespread use of the Internet, but the cost of private leased lines would have made many of them infeasible in practice. An office worker away from their desk, perhaps on the other side of the world on a business trip or a holiday, can access their emails, access their data using cloud computing, or open a remote desktop session into their office PC using a secure virtual private network (VPN) connection on the Internet. This can give the worker complete access to all of their normal files and data, including email and other applications, while away from the office. It has been referred to among system administrators as the Virtual Private Nightmare, because it extends the secure perimeter of a corporate network into remote locations and its employees' homes.
|
https://en.wikipedia.org/wiki?curid=14539
|
Many people use the World Wide Web to access news, weather and sports reports, to plan and book vacations and to pursue their personal interests. People use chat, messaging and email to make and stay in touch with friends worldwide, sometimes in the same way as some previously had pen pals. Social networking services such as Facebook have created new ways to socialize and interact. Users of these sites are able to add a wide variety of information to pages, pursue common interests, and connect with others. It is also possible to find existing acquaintances, to allow communication among existing groups of people. Sites like LinkedIn foster commercial and business connections. YouTube and Flickr specialize in users' videos and photographs. Social networking services are also widely used by businesses and other organizations to promote their brands, to market to their customers and to encourage posts to "go viral". "Black hat" social media techniques are also employed by some organizations, such as spam accounts and astroturfing.
|
https://en.wikipedia.org/wiki?curid=14539
|
A risk for both individuals and organizations writing posts (especially public posts) on social networking services, is that especially foolish or controversial posts occasionally lead to an unexpected and possibly large-scale backlash on social media from other Internet users. This is also a risk in relation to controversial "offline" behavior, if it is widely made known. The nature of this backlash can range widely from counter-arguments and public mockery, through insults and hate speech, to, in extreme cases, rape and death threats. The online disinhibition effect describes the tendency of many individuals to behave more stridently or offensively online than they would in person. A significant number of feminist women have been the target of various forms of harassment in response to posts they have made on social media, and Twitter in particular has been criticised in the past for not doing enough to aid victims of online abuse.
|
https://en.wikipedia.org/wiki?curid=14539
|
Some websites, such as Reddit, have rules forbidding the posting of personal information of individuals (also known as doxxing), due to concerns about such postings leading to mobs of large numbers of Internet users directing harassment at the specific individuals thereby identified. In particular, the Reddit rule forbidding the posting of personal information is widely understood to imply that all identifying photos and names must be censored in Facebook screenshots posted to Reddit. However, the interpretation of this rule in relation to public Twitter posts is less clear, and in any case, like-minded people online have many other ways they can use to direct each other's attention to public social media posts they disagree with.
|
https://en.wikipedia.org/wiki?curid=14539
|
Children also face dangers online such as cyberbullying and approaches by sexual predators, who sometimes pose as children themselves. Children may also encounter material which they may find upsetting, or material that their parents consider to be not age-appropriate. Due to naivety, they may also post personal information about themselves online, which could put them or their families at risk unless warned not to do so. Many parents choose to enable Internet filtering or supervise their children's online activities in an attempt to protect their children from inappropriate material on the Internet. The most popular social networking services, such as Facebook and Twitter, commonly forbid users under the age of 13. However, these policies are typically trivial to circumvent by registering an account with a false birth date, and a significant number of children aged under 13 join such sites anyway. Social networking services for younger children, which claim to provide better levels of protection for children, also exist.
|
https://en.wikipedia.org/wiki?curid=14539
|
Another area of leisure activity on the Internet is multiplayer gaming. This form of recreation creates communities, where people of all ages and origins enjoy the fast-paced world of multiplayer games. These range from MMORPG to first-person shooters, from role-playing video games to online gambling. While online gaming has been around since the 1970s, modern modes of online gaming began with subscription services such as GameSpy and MPlayer. Non-subscribers were limited to certain types of game play or certain games. Many people use the Internet to access and download music, movies and other works for their enjoyment and relaxation. Free and fee-based services exist for all of these activities, using centralized servers and distributed peer-to-peer technologies. Some of these sources exercise more care with respect to the original artists' copyrights than others.
|
https://en.wikipedia.org/wiki?curid=14539
|
A 2017 book claimed that the Internet consolidates most aspects of human endeavor into singular arenas of which all of humanity are potential members and competitors, with fundamentally negative impacts on mental health as a result. While successes in each field of activity are pervasively visible and trumpeted, they are reserved for an extremely thin sliver of the world's most exceptional, leaving everyone else behind. Whereas, before the Internet, expectations of success in any field were supported by reasonable probabilities of achievement at the village, suburb, city or even state level, the same expectations in the Internet world are virtually certain to bring disappointment today: there is always someone else, somewhere on the planet, who can do better and take the now one-and-only top spot.
|
https://en.wikipedia.org/wiki?curid=14539
|
Cybersectarianism is a new organizational form which involves: "highly dispersed small groups of practitioners that may remain largely anonymous within the larger social context and operate in relative secrecy, while still linked remotely to a larger network of believers who share a set of practices and texts, and often a common devotion to a particular leader. Overseas supporters provide funding and support; domestic practitioners distribute tracts, participate in acts of resistance, and share information on the internal situation with outsiders. Collectively, members and practitioners of such sects construct viable virtual communities of faith, exchanging personal testimonies and engaging in the collective study via email, on-line chat rooms, and web-based message boards." In particular, the British government has raised concerns about the prospect of young British Muslims being indoctrinated into Islamic extremism by material on the Internet, being persuaded to join terrorist groups such as the so-called "Islamic State", and then potentially committing acts of terrorism on returning to Britain after fighting in Syria or Iraq.
|
https://en.wikipedia.org/wiki?curid=14539
|
Electronic business ("e-business") encompasses business processes spanning the entire value chain: purchasing, supply chain management, marketing, sales, customer service, and business relationship. E-commerce seeks to add revenue streams using the Internet to build and enhance relationships with clients and partners. According to International Data Corporation, the size of worldwide e-commerce, when global business-to-business and -consumer transactions are combined, equate to $16 trillion for 2013. A report by Oxford Economics added those two together to estimate the total size of the digital economy at $20.4 trillion, equivalent to roughly 13.8% of global sales.
|
https://en.wikipedia.org/wiki?curid=14539
|
Author Andrew Keen, a long-time critic of the social transformations caused by the Internet, has focused on the economic effects of consolidation from Internet businesses. Keen cites a 2013 Institute for Local Self-Reliance report saying brick-and-mortar retailers employ 47 people for every $10 million in sales while Amazon employs only 14. Similarly, the 700-employee room rental start-up Airbnb was valued at $10 billion in 2014, about half as much as Hilton Worldwide, which employs 152,000 people. At that time, Uber employed 1,000 full-time employees and was valued at $18.2 billion, about the same valuation as Avis Rent a Car and The Hertz Corporation combined, which together employed almost 60,000 people.
|
https://en.wikipedia.org/wiki?curid=14539
|
Wikis have also been used in the academic community for sharing and dissemination of information across institutional and international boundaries. In those settings, they have been found useful for collaboration on grant writing, strategic planning, departmental documentation, and committee work. The United States Patent and Trademark Office uses a wiki to allow the public to collaborate on finding prior art relevant to examination of pending patent applications. Queens, New York has used a wiki to allow citizens to collaborate on the design and planning of a local park. The English Wikipedia has the largest user base among wikis on the World Wide Web and ranks in the top 10 among all Web sites in terms of traffic.
|
https://en.wikipedia.org/wiki?curid=14539
|
The spread of low-cost Internet access in developing countries has opened up new possibilities for peer-to-peer charities, which allow individuals to contribute small amounts to charitable projects for other individuals. Websites, such as DonorsChoose and GlobalGiving, allow small-scale donors to direct funds to individual projects of their choice. A popular twist on Internet-based philanthropy is the use of peer-to-peer lending for charitable purposes. Kiva pioneered this concept in 2005, offering the first web-based service to publish individual loan profiles for funding. Kiva raises funds for local intermediary microfinance organizations that post stories and updates on behalf of the borrowers. Lenders can contribute as little as $25 to loans of their choice, and receive their money back as borrowers repay. Kiva falls short of being a pure peer-to-peer charity, in that loans are disbursed before being funded by lenders and borrowers do not communicate with lenders themselves.
|
https://en.wikipedia.org/wiki?curid=14539
|
The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies. Packet capture is the monitoring of data traffic on a computer network. Computers communicate over the Internet by breaking up messages (emails, images, videos, web pages, files, etc.) into small chunks called "packets", which are routed through a network of computers, until they reach their destination, where they are assembled back into a complete "message" again. Packet Capture Appliance intercepts these packets as they are traveling through the network, in order to examine their contents using other programs. A packet capture is an information "gathering" tool, but not an "analysis" tool. That is it gathers "messages" but it does not analyze them and figure out what they mean. Other programs are needed to perform traffic analysis and sift through intercepted data looking for important/useful information. Under the Communications Assistance For Law Enforcement Act all U.S. telecommunications providers are required to install packet sniffing technology to allow Federal law enforcement and intelligence agencies to intercept all of their customers' broadband Internet and VoIP traffic.
|
https://en.wikipedia.org/wiki?curid=14539
|
An Internet blackout or outage can be caused by local signalling interruptions. Disruptions of submarine communications cables may cause blackouts or slowdowns to large areas, such as in the 2008 submarine cable disruption. Less-developed countries are more vulnerable due to a small number of high-capacity links. Land cables are also vulnerable, as in 2011 when a woman digging for scrap metal severed most connectivity for the nation of Armenia. Internet blackouts affecting almost entire countries can be achieved by governments as a form of Internet censorship, as in the blockage of the Internet in Egypt, whereby approximately 93% of networks were without access in 2011 in an attempt to stop mobilization for anti-government protests.
|
https://en.wikipedia.org/wiki?curid=14539
|
In 2011, academic researchers estimated the overall energy used by the Internet to be between 170 and 307 GW, less than two percent of the energy used by humanity. This estimate included the energy needed to build, operate, and periodically replace the estimated 750 million laptops, a billion smart phones and 100 million servers worldwide as well as the energy that routers, cell towers, optical switches, Wi-Fi transmitters and cloud storage devices use when transmitting Internet traffic. According to a non-peer reviewed study published in 2018 by The Shift Project (a French think tank funded by corporate sponsors), nearly 4% of global CO emissions could be attributed to global data transfer and the necessary infrastructure. The study also said that online video streaming alone accounted for 60% of this data transfer and therefore contributed to over 300 million tons of CO emission per year, and argued for new "digital sobriety" regulations restricting the use and size of video files.
|
https://en.wikipedia.org/wiki?curid=14539
|
Twitter was created by Jack Dorsey, Noah Glass, Biz Stone, and Evan Williams in March 2006 and launched in July of that year. Twitter, Inc. is based in San Francisco, California and has more than 25 offices around the world. , more than 100 million users posted 340 million tweets a day, and the service handled an average of 1.6 billion search queries per day. In 2013, it was one of the ten most-visited websites and has been described as "the SMS of the Internet". , Twitter had more than 330 million monthly active users. In practice, the vast majority of tweets are written by a minority of users. In 2020, it was estimated that approximately 48 million accounts (15% of all accounts) were fake.
|
https://en.wikipedia.org/wiki?curid=9988187
|
Twitter's origins lie in a "daylong brainstorming session" held by board members of the podcasting company Odeo. Jack Dorsey, then an undergraduate student at New York University, introduced the idea of an individual using an SMS service to communicate with a small group. The original project code name for the service was "twttr", an idea that Williams later ascribed to Noah Glass, inspired by Flickr and the five-character length of American SMS short codes. The decision was also partly due to the fact that the domain twitter.com was already in use, and it was six months after the launch of twttr that the crew purchased the domain and changed the name of the service to "Twitter". The developers initially considered "10958" as the service's short code for SMS text messaging, but later changed it to "40404" for "ease of use and memorability". Work on the project started on March 21, 2006, when Dorsey published the first Twitter message at 12:50 p.m. PST (): "just setting up my twttr". Dorsey has explained the origin of the "Twitter" title:
|
https://en.wikipedia.org/wiki?curid=9988187
|
The first Twitter prototype, developed by Dorsey and contractor Florian Weber, was used as an internal service for Odeo employees. The full version was introduced publicly on July 15, 2006. In October 2006, Biz Stone, Evan Williams, Dorsey, and other members of Odeo formed Obvious Corporation and acquired Odeo, together with its assets—including Odeo.com and Twitter.com—from the investors and shareholders. Williams fired Glass, who was silent about his part in Twitter's startup until 2011. Twitter spun off into its own company in April 2007. Williams provided insight into the ambiguity that defined this early period in a 2013 interview:
|
https://en.wikipedia.org/wiki?curid=9988187
|
The tipping point for Twitter's popularity was the 2007 South by Southwest Interactive (SXSWi) conference. During the event, Twitter usage increased from 20,000 tweets per day to 60,000. "The Twitter people cleverly placed two 60-inch plasma screens in the conference hallways, exclusively streaming Twitter messages," remarked "Newsweek"s Steven Levy. "Hundreds of conference-goers kept tabs on each other via constant twitters. Panelists and speakers mentioned the service, and the bloggers in attendance touted it." Reaction at the conference was highly positive. Twitter staff received the festival's Web Award prize with the remark "we'd like to thank you in 140 characters or less. And we just did!"
|
https://en.wikipedia.org/wiki?curid=9988187
|
The company experienced rapid initial growth. It had 400,000 tweets posted per quarter in 2007. This grew to tweets posted per quarter in 2008. In February 2010, Twitter users were sending tweets per day. In 2009, Twitter won the "Breakout of the Year" Webby Award. On November 29, 2009, Twitter was named the Word of the Year by the Global Language Monitor, declaring it "a new form of social interaction". By March 2010, the company recorded over 70,000 registered applications. As of June 2010, about tweets were posted each day, equaling about 750 tweets sent each second, according to Twitter. As of March 2011, that was about tweets posted daily. As noted on Compete.com, Twitter moved up to the third-highest-ranking social networking site in January 2009 from its previous rank of twenty-second.
|
https://en.wikipedia.org/wiki?curid=9988187
|
Twitter's usage spikes during prominent events. For example, a record was set during the 2010 FIFA World Cup when fans wrote 2,940 tweets per second in the thirty-second period after Japan scored against Cameroon on June 14, 2010. The record was broken again when 3,085 tweets per second were posted after the Los Angeles Lakers' victory in the 2010 NBA Finals on June 17, 2010, and then again at the close of Japan's victory over Denmark in the World Cup when users published 3,283 tweets per second. The record was set again during the 2011 FIFA Women's World Cup Final between Japan and the United States, when 7,196 tweets per second were published. When American singer Michael Jackson died on June 25, 2009, Twitter servers crashed after users were updating their status to include the words "Michael Jackson" at a rate of 100,000 tweets per hour. The current record as of August 3, 2013, was set in Japan, with 143,199 tweets per second during a television screening of the movie "Castle in the Sky" (beating the previous record of 33,388, also set by Japan for the television screening of the same movie).
|
https://en.wikipedia.org/wiki?curid=9988187
|
From September through October 2010, the company began rolling out "New Twitter", an entirely revamped edition of twitter.com. Changes included the ability to see pictures and videos without leaving Twitter itself by clicking on individual tweets which contain links to images and clips from a variety of supported websites, including YouTube and Flickr, and a complete overhaul of the interface, which shifted links such as '@mentions' and 'Retweets' above the Twitter stream, while 'Messages' and 'Log Out' became accessible via a black bar at the very top of twitter.com. As of November 1, 2010, the company confirmed that the "New Twitter experience" had been rolled out to all users. In 2019, Twitter was announced to be the 10th most downloaded mobile app of the decade, from 2010 to 2019.
|
https://en.wikipedia.org/wiki?curid=9988187
|
On April 5, 2011, Twitter tested a new homepage and phased out the "Old Twitter". However, a glitch came about after the page was launched, so the previous "retro" homepage was still in use until the issues were resolved; the new homepage was reintroduced on April 20. On December 8, 2011, Twitter overhauled its website once more to feature the "Fly" design, which the service says is easier for new users to follow and promotes advertising. In addition to the "Home" tab, the "Connect" and "Discover" tabs were introduced along with a redesigned profile and timeline of Tweets. The site's layout has been compared to that of Facebook. On February 21, 2012, it was announced that Twitter and Yandex agreed to a partnership. Yandex, a Russian search engine, finds value within the partnership due to Twitter's real time news feeds. Twitter's director of business development explained that it is important to have Twitter content where Twitter users go. On March 21, 2012, Twitter celebrated its sixth birthday by announcing that it had 140 million users, a 40% rise from September 2011, who were sending 340 million tweets per day.
|
https://en.wikipedia.org/wiki?curid=9988187
|
Twitter experienced considerable growth during the COVID-19 pandemic in 2020. The platform also was increasingly used for misinformation related to the pandemic. Twitter started marking tweets which contained misleading information, and adding links to fact-checks. In May 2020, Twitter moderators marked two tweets from U.S. President Donald Trump as "potentially misleading" and linked to a fact-check. Trump responded by signing an executive order to weaken Section 230 of the Communications Decency Act, which limits social media sites' liability for content moderation decisions. Twitter later banned Trump, claiming that he violated "the glorification of violence policy". The ban was criticized by conservatives and some European leaders, who saw it as an interference on freedom of speech.
|
https://en.wikipedia.org/wiki?curid=9988187
|
Initially, Musk sought a position on the Twitter, Inc. Board of Directors by buying shares of the company, but the Board created a "poison pill" to prevent Musk from gaining sufficient shares. Subsequently, Musk made an unsolicited offer to buy Twitter, Inc. for $43 billion on April 14, 2022. This process went through a number of business and legal confrontations, but ultimately, Musk completed the acquisition on October 27, 2022, for $44 billion. Musk immediately fired the top three Twitter executives. About a week later, he began laying off about half of the company's approximately 7,500 employees.
|
https://en.wikipedia.org/wiki?curid=9988187
|
A week after the takeover, Musk revamped Twitter Blue, increasing its price to $8 per month and adding new features, including the "blue checkmark" verification that had previously been reserved for high-profile confirmed users. This plan was criticized by several outlets, fearing that the potential for misinformation would increase since anyone could pay to appear to be verified through Twitter Blue. Musk opted to delay the changes to blue checkmarks until after the 2022 midterm elections in the U.S. over these concerns, and stated that accounts that were faking identities, outside of parody accounts, would be terminated. Following the takeover, various brands and companies paused advertising on the platform.
|
https://en.wikipedia.org/wiki?curid=9988187
|
During December 2022, Musk provided internal documentation to a number of independent journalists and writers which were then publicly disseminated through a series of posts known as the "Twitter Files". The files describe internal discussion as related to Twitter's moderation steps in events such as the breaking of the Hunter Biden laptop story, shadow banning of some conservative commentators' accounts, and the decision to block Trump. While some on the right saw the documents as evidence of Twitter's liberal bias and hostility to free speech, many people on the left described them as a reflection of how difficult it is for social media platforms to make tough decisions about content moderation.
|
https://en.wikipedia.org/wiki?curid=9988187
|
The Twitter accounts of a number of journalists were permanently suspended on December 15, 2022. These journalists, including Mashable's Matt Binder, Aaron Rupar, "The New York Times"' Ryan Mac, and CNN's Donie O'Sullivan, have covered Twitter and recently wrote articles about Musk's takeover. Several of the reporters had recently tweeted about the controversy over Musk's banning of ElonJet and other accounts which track private jets. In response, Twitter Head of Trust and Safety Ella Irwin told The Verge "we will suspend any accounts that violate our privacy policies and put other users at risk." Binder denied violating any of Twitter's policies, saying "I did not share any location data, as per Twitter’s new terms. Nor did I share any links to ElonJet or other location tracking accounts." CNN journalist Oliver Darcy wrote that the bannings "called into serious question Musk’s supposed commitment to free speech." A group of the suspended users created a Space where they discussed the actions (a function they were still able to use); after Musk joined the space and continued to criticize the ElonJet account, Spaces was abruptly disabled site-wide, with employees citing a "legacy bug".
|
https://en.wikipedia.org/wiki?curid=9988187
|
On December 18, 2022 Twitter announced that it was banning users linking to what were referred to as "prohibited platforms" including Facebook, Mastodon, Instagram and Truth Social, as well as third party link aggregators such as Linktree. Six hours after his announcement Musk tweeted "Going forward, there will be a vote for major policy changes. My apologies. Won't happen again" although it is unclear if the earlier policy will be reversed. He also tweeted a poll asking users if he should remain as head of Twitter promising to abide by its results, in which 57.5% of the 17.5m votes were in favour of him stepping down.
|
https://en.wikipedia.org/wiki?curid=9988187
|
Tweets are publicly visible by default, but senders can restrict message delivery to only their followers. Users can mute users they do not wish to interact with, block accounts from viewing their tweets, and remove accounts from their followers list. Users can tweet via the Twitter website, compatible external applications (such as for smartphones), or by Short Message Service (SMS) available in certain countries. Users may subscribe to other users' tweets—this is known as "following" and subscribers are known as "followers" or "tweeps", a portmanteau of Twitter and peeps. Individual tweets can be forwarded by other users to their own feed, a process known as a "retweet". In 2015, Twitter launched "quote tweet" (originally called "retweet with comment"), a feature that allows users to add a comment to their retweet, nesting one tweet in the other. Users can also "like" (formerly "favorite") individual tweets.
|
https://en.wikipedia.org/wiki?curid=9988187
|
The counters for "likes", "retweets", and replies appear next to the respective buttons in timelines such as on profile pages and search results. Counters for likes and retweets exist on a tweet's standalone page too. Since September 2020, quote tweets, formerly known as "retweet with comment", have their own counter on their tweet page. Until the legacy desktop front end that was discontinued in 2020, a row with miniature profile pictures of up to ten liking or retweeting users was displayed (earliest documented implementation in December 2011 overhaul), as well as a tweet reply counter next to the according button on a tweet's page.
|
https://en.wikipedia.org/wiki?curid=9988187
|
The tweets were set to a largely constrictive 140-character limit for compatibility with SMS messaging, introducing the shorthand notation and slang commonly used in SMS messages. The 140-character limit also increased the usage of URL shortening services such as bit.ly, goo.gl, tinyurl.com, tr.im, and other content-hosting services such as TwitPic, memozu.com and NotePub to accommodate multimedia content and text longer than 140 characters. Since June 2011, Twitter has used its own t.co domain for automatic shortening of all URLs posted on its site, making other link shorteners unnecessary for staying within Twitter's 140 character limit.
|
https://en.wikipedia.org/wiki?curid=9988187
|
Twitter announced a number of new and expanded partnerships for its streaming video services at the event, including Bloomberg, BuzzFeed, Cheddar ("Opening Bell" and "Closing Bell" shows; the latter was introduced in October 2016) IMG Fashion (coverage of fashion events), Live Nation Entertainment (streaming concert events), Major League Baseball (weekly online game stream, plus a weekly program with live look-ins and coverage of trending stories), MTV and BET (red carpet coverage for their MTV Video Music Awards, MTV Movie & TV Awards, and BET Awards), NFL Network (the Monday-Thursday news program "NFL Blitz Live", and Sunday "Fantasy Gameday"), the PGA Tour ("PGA Tour Live" coverage of early tournament rounds preceding television coverage), "The Players' Tribune", Ben Silverman and Howard T. Owens' Propagate (daily entertainment show "#WhatsHappening"), "The Verge" (weekly technology show "Circuit Breaker: The Verge's Gadget Show"), Stadium (a new digital sports network being formed by Silver Chalice and Sinclair Broadcast Group) and the WNBA (weekly game).
|
https://en.wikipedia.org/wiki?curid=9988187
|
An October 21, 2021, report based on a "long-running, massive-scale randomized experiment" that analyzed "millions of tweets sent between 1 April and 15 August 2020", found that Twitter's machine learning algorithm amplified right-leaning politics on personalized user Home timelines. The report compared seven countries with active Twitter users where data was available—Germany, Canada, the United Kingdom, Japan, France, and Spain—and examined Tweets "from major political groups and politicians". Researchers used the 2019 Chapel Hill Expert Survey (CHESDATA) to position parties on political ideology within each country. The "machine learning algorithms"—introduced by Twitter in 2016—personalized 99% of users' feeds by displaying Tweets—even older Tweets and Retweets from accounts the user had not directly followed—but that the algorithm had "deemed relevant" to the users' past preferences. Twitter randomly chose 1% of users whose Home timelines displayed content in reverse-chronological order from users they directly followed.
|
https://en.wikipedia.org/wiki?curid=9988187
|
In May 2021, Twitter began testing a Tip Jar feature on its iOS and Android clients. The feature allows users to send monetary tips to certain accounts, providing a financial incentive for content creators on the platform. The Tip Jar is optional and users can choose whether or not to enable tips for their account. On September 23, 2021, Twitter announced that it will allow users to tip users on the social network with bitcoin. The feature will be available for iOS users. Previously, users could tip with fiat currency using services such as Square's Cash App and PayPal's Venmo. Twitter will integrate the Strike bitcoin lightning wallet service. It was noted that at this current time, Twitter will not take a cut of any money sent through the tips feature.
|
https://en.wikipedia.org/wiki?curid=9988187
|
In 2009, Twitter was mainly used by older adults who might not have used other social sites before Twitter, said Jeremiah Owyang, an industry analyst studying social media. "Adults are just catching up to what teens have been doing for years", he said. According to comScore only 11% of Twitter's users are aged 12 to 17. comScore attributed this to Twitter's "early adopter period" when the social network first gained popularity in business settings and news outlets attracting primarily older users. However, comScore also stated in 2009 that Twitter had begun to "filter more into the mainstream", and "along with it came a culture of celebrity as Shaq, Britney Spears and Ashton Kutcher joined the ranks of the Twitterati".
|
https://en.wikipedia.org/wiki?curid=9988187
|
Despite Jack Dorsey's own open contention that a message on Twitter is "a short burst of inconsequential information", social networking researcher danah boyd responded to the Pear Analytics survey by arguing that what the Pear researchers labeled "pointless babble" is better characterized as "social grooming" or "peripheral awareness" (which she justifies as persons "want[ing] to know what the people around them are thinking and doing and feeling, even when co-presence isn't viable"). Similarly, a survey of Twitter users found that a more specific social role of passing along messages that include a hyperlink is an expectation of reciprocal linking by followers.
|
https://en.wikipedia.org/wiki?curid=9988187
|
According to research published in April 2014, around 44% of user accounts have never tweeted. About 22% of Americans say they have ever used Twitter, according to a 2019 Pew Research Center survey. In 2009, Nielsen Online reported that Twitter had a user-retention rate of forty percent. Many people stop using the service after a month; therefore the site may potentially reach only about ten percent of all Internet users. Noting how demographics of Twitter users differ from the average Americans, commentators have cautioned against media narratives that treat Twitter as representative of the population, adding that only 10% of users Tweet actively, and that 90% of Twitter users have Tweeted no more than twice. In 2016, shareholders sued Twitter, alleging it "artificially inflated its stock price by misleading them about user engagement." The company announced on September 20, 2021, that it would pay $809.5 million to settle this class-action lawsuit.
|
https://en.wikipedia.org/wiki?curid=9988187
|
From Spring 2007 to 2008, the messages were handled by a Ruby persistent queue server called Starling. Since 2009, implementation has been gradually replaced with software written in Scala. The switch from Ruby to Scala and the JVM has given Twitter a performance boost from 200 to 300 requests per second per host to around 10,000–20,000 requests per second per host. This boost was greater than the 10x improvement that Twitter's engineers envisioned when starting the switch. The continued development of Twitter has also involved a switch from monolithic development of a single app to an architecture where different services are built independently and joined through remote procedure calls.
|
https://en.wikipedia.org/wiki?curid=9988187
|
From 2006 until 2010, Twitter's developer platform experienced strong growth and a highly favorable reputation. Developers built upon the public API to create the first Twitter mobile phone clients as well as the first URL shortener. Between 2010 and 2012, however, Twitter made a number of decisions that were received unfavorably by the developer community. In 2010, Twitter mandated that all developers adopt OAuth authentication with just 9 weeks of notice. Later that year, Twitter launched its own URL shortener, in direct competition with some of its most well-known third-party developers. And in 2012, Twitter introduced stricter usage limits for its API, "completely crippling" some developers. While these moves successfully increased the stability and security of the service, they were broadly perceived as hostile to developers, causing them to lose trust in the platform.
|
https://en.wikipedia.org/wiki?curid=9988187
|
Twitter has a history of both using and releasing open-source software while overcoming technical challenges of their service. A page in their developer documentation thanks dozens of open-source projects which they have used, from revision control software like Git to programming languages such as Ruby and Scala. Software released as open source by the company includes the Gizzard Scala framework for creating distributed datastores, the distributed graph database FlockDB, the Finagle library for building asynchronous RPC servers and clients, the TwUI user interface framework for iOS, and the Bower client-side package manager. The popular Bootstrap frontend framework was also started at Twitter and is 10th most popular repository on GitHub.
|
https://en.wikipedia.org/wiki?curid=9988187
|
In July 2019, Twitter officially released this redesign, with no further option to opt-out while logged in. It is designed to further-unify Twitter's user experience between the web and mobile application versions, adopting a three-column layout with a sidebar containing links to common areas (including "Explore" that has been merged with the search page) which previously appeared in a horizontal top bar, profile elements such as picture and header images and biography texts merged into the same column as the timeline, and features from the mobile version (such as multi-account support, and an opt-out for the "top tweets" mode on the timeline).
|
https://en.wikipedia.org/wiki?curid=9988187
|
On July 15, 2020, a major hack of Twitter affected 130 high-profile accounts, both verified and unverified ones such as Barack Obama, Bill Gates, and Elon Musk; the hack allowed bitcoin scammers to send tweets via the compromised accounts that asked the followers to send bitcoin to a given public address, with the promise to double their money. Within a few hours, Twitter disabled tweeting and reset passwords from all verified accounts. Analysis of the event revealed that the scammers had used social engineering to obtain credentials from Twitter employees to access an administration tool used by Twitter to view and change these accounts' personal details as to gain access as part of a "smash and grab" attempt to make money quickly, with an estimated in bitcoin deposited in various accounts before Twitter intervened. Several law enforcement entities including the FBI launched investigations into the attack.
|
https://en.wikipedia.org/wiki?curid=9988187
|
On August 5, 2022, Twitter disclosed that a bug introduced in a June 2021 update to the service allowed threat actors to link email addresses and phone numbers to twitter user's accounts. The bug was reported through Twitter's bug bounty program in January 2022 and subsequently fixed. While Twitter originally believed no one had taken advantage of the vulnerability, it was later revealed that a user on the online hacking forum Breached Forums had used the vulnerability to compile a list of over 5.4 million user profiles, which they offered to sell for $30,000. The information compiled by the hacker includes user's screen names, location and email addresses which could be utilised in phishing attacks or used to deanonymize accounts running under pseudonyms.
|
https://en.wikipedia.org/wiki?curid=9988187
|
In June 2009, after being criticized by Kanye West and sued by Tony La Russa over unauthorized accounts run by impersonators, the company launched their "Verified Accounts" program. Twitter stated that an account with a "blue tick" verification badge indicates "we've been in contact with the person or entity the account is representing and verified that it is approved". In July 2016, Twitter announced a public application process to grant verified status to an account "if it is determined to be of public interest" and that verification "does not imply an endorsement". Verified status allows access to some features unavailable to other users, such as only seeing mentions from other verified accounts.
|
https://en.wikipedia.org/wiki?curid=9988187
|
In October 2022, after the takeover of Twitter by Elon Musk, it was reported that verification would instead be included in the paid Twitter Blue service, and that existing verified accounts would lose their status if they do not subscribe. On November 1, Musk confirmed that verification would be included in Blue in the future, dismissing the existing verification system as a "lords & peasants system". Following concerns over the possibility of impersonation, Twitter subsequently reimplemented a second "Official" marker, consisting of a grey tick and "Official" text displayed under the username, for high-profile accounts of "government and commercial entities".
|
https://en.wikipedia.org/wiki?curid=9988187
|
Tweets are public, but users can also send private "direct messages". Information about who has chosen to follow an account and who a user has chosen to follow is also public, though accounts can be changed to "protected" which limits this information (and all tweets) to approved followers. Twitter collects personally identifiable information about its users and shares it with third parties as specified in its privacy policy. The service also reserves the right to sell this information as an asset if the company changes hands. While Twitter displays no advertising, advertisers can target users based on their history of tweets and may quote tweets in ads directed specifically to the user.
|
https://en.wikipedia.org/wiki?curid=9988187
|
In May 2011, a claimant known as "CTB" in the case of "CTB v Twitter Inc." took action against Twitter at the High Court of Justice of England and Wales, requesting that the company release details of account holders. This followed gossip posted on Twitter about professional footballer Ryan Giggs's private life. This led to the 2011 British privacy injunctions controversy and the "super-injunction". Tony Wang, the head of Twitter in Europe, said that people who do "bad things" on the site would need to defend themselves under the laws of their own jurisdiction in the event of controversy and that the site would hand over information about users to the authorities when it was legally required to do so. He also suggested that Twitter would accede to a UK court order to divulge names of users responsible for "illegal activity" on the site.
|
https://en.wikipedia.org/wiki?curid=9988187
|
Twitter acquired Dasient, a startup that offers malware protection for businesses, in January 2012. Twitter announced plans to use Dasient to help remove hateful advertisers on the website. Twitter also offered a feature which would allow tweets to be removed selectively by country, before deleted tweets used to be removed in all countries. The first use of the policy was to block the account of German neo-Nazi group Besseres Hannover on October 18, 2012. The policy was used again the following day to remove anti-Semitic French tweets with the hashtag #unbonjuif ("a good Jew").
|
https://en.wikipedia.org/wiki?curid=9988187
|
In August 2013, Twitter announced plans to introduce a "report abuse" button for all versions of the site following uproar, including a petition with 100,000 signatures, over Tweets that included rape and death threats to historian Mary Beard, feminist campaigner Caroline Criado-Perez and the member of parliament Stella Creasy. Twitter announced new reporting and blocking policies in December 2014, including a blocking mechanism devised by Randi Harper, a target of GamerGate. In February 2015, CEO Dick Costolo said he was 'frankly ashamed' at how poorly Twitter handled trolling and abuse, and admitted Twitter had lost users as a result.
|
https://en.wikipedia.org/wiki?curid=9988187
|
Twitter banned 7,000 accounts and limited 150,000 more that had ties to QAnon on July 21, 2020. The bans and limits came after QAnon-related accounts began harassing other users through practices of swarming or brigading, coordinated attacks on these individuals through multiple accounts in the weeks prior. Those accounts limited by Twitter will not appear in searches nor be promoted in other Twitter functions. Twitter said they will continue to ban or limit accounts as necessary, with their support account stating "We will permanently suspend accounts Tweeting about these topics that we know are engaged in violations of our multi-account policy, coordinating abuse around individual victims, or are attempting to evade a previous suspension".
|
https://en.wikipedia.org/wiki?curid=9988187
|
In January 2016, Twitter was sued by the widow of a U.S. man killed in the 2015 Amman shooting attack, claiming that allowing the Islamic State of Iraq and the Levant (ISIL) to continually use the platform, including direct messages in particular, constituted the provision of material support to a terrorist organization, which is illegal under U.S. federal law. Twitter disputed the claim, stating that "violent threats and the promotion of terrorism deserve no place on Twitter and, like other social networks, our rules make that clear." The lawsuit was dismissed by the United States District Court for the Northern District of California, upholding the Section 230 safe harbor, which dictates that the operators of an interactive computer service are not liable for the content published by its users. The lawsuit was revised in August 2016, providing comparisons to other telecommunications devices.
|
https://en.wikipedia.org/wiki?curid=9988187
|
Twitter suspended multiple parody accounts that satirized Russian politics in May 2016, sparking protests and raising questions about where the company stands on freedom of speech. Following public outcry, Twitter restored the accounts the next day without explaining why the accounts had been suspended. The same day, Twitter, along with Facebook, Google, and Microsoft, jointly agreed to a European Union code of conduct obligating them to review "[the] majority of valid notifications for removal of illegal hate speech" posted on their services within 24 hours. In August 2016, Twitter stated that it had banned 235,000 accounts over the past six months, bringing the overall number of suspended accounts to 360,000 accounts in the past year, for violating policies banning use of the platform to promote extremism.
|
https://en.wikipedia.org/wiki?curid=9988187
|
In March 2021, Twitter suspended around 3,500 fake accounts that were running a campaign to influence the American audience, after the US intelligence officials concluded that the assassination of "The Washington Post" journalist, Jamal Khashoggi was "approved" by the Saudi Crown Prince Mohammed bin Salman. These Saudi accounts were working in two languages, English and Arabic, to influence public opinion around the issue. Many accounts commented directly on the tweets of US-based media houses, including "The Post", "CNN", "CBS News" and "The Los Angeles Times". Twitter was unable to identify the source of the influence campaign.
|
https://en.wikipedia.org/wiki?curid=9988187
|
A Twitter bot is a computer program that can automatically tweet, retweet, and follow other accounts. Twitter's open application programming interface and the availability of cloud servers make it possible for Twitter bots to exist within the social networking site. Benign Twitter bots may generate creative content and relevant product updates whereas malicious bots can make unpopular people seem popular, push irrelevant products on users and spread misinformation, spam or slander. Bots amass significant influence and have been noted to sway elections, influence the stock market, public appeal, and attack governments. , Twitter said there were 20 million fake accounts on Twitter, representing less than 5% of active users. A 2020 estimate put the figure at 15% of all accounts or around 48 million accounts.
|
https://en.wikipedia.org/wiki?curid=9988187
|
Twitter has been used for a variety of purposes in many industries and scenarios. For example, it has been used to organize protests, including the protests over the 2009 Moldovan election, the 2009 student protests in Austria, the 2009 Gaza–Israel conflict, the 2009 Iranian green revolution, the 2010 Toronto G20 protests, the 2010 Bolivarian Revolution, the 2010 Stuttgart21 protests in Germany, the 2011 Egyptian Revolution, 2011 England riots, the 2011 United States Occupy movement, the 2011 anti-austerity movement in Spain, the 2011 Aganaktismenoi movements in Greece, the 2011 demonstration in Rome, the 2011 Wisconsin labor protests, the 2012 Gaza–Israel conflict, the 2013 protests in Brazil, and the 2013 Gezi Park protests in Turkey.
|
https://en.wikipedia.org/wiki?curid=9988187
|
The service is also used as a form of civil disobedience: In 2010, users expressed outrage over the Twitter joke trial by copying a controversial joke about bombing an airport and attaching the hashtag #IAmSpartacus, a reference to the film "Spartacus" (1960) and a sign of solidarity and support to a man controversially prosecuted after posting a tweet joking about bombing an airport if they canceled his flight. #IAmSpartacus became the number one trending topic on Twitter worldwide. Another case of civil disobedience happened in the 2011 British privacy injunction debate, where several celebrities who had taken out anonymized injunctions were identified by thousands of users in protest to traditional journalism being censored.
|
https://en.wikipedia.org/wiki?curid=9988187
|
In May 2021, Twitter labeled one of the tweets by Sambit Patra, a spokesman of the local ruling party BJP in India, as "manipulated media", leading to Twitter's offices in Delhi and Gurgaon being raided by the local police. Twitter issued a statement, calling the police visit "a form of intimidation". Later, the Indian government released a statement in July 2021 claiming Twitter has lost its liability protection concerning user-generated content. This was brought on by Twitter's failure to comply with the new IT rules introduced in 2021 with a filing stating that the company failed to appoint executives to govern user content on the platform. Twitter stated to India's government in August 2021 that they have appointed permanent executives and staff to provide for compliance to these new IT rules.
|
https://en.wikipedia.org/wiki?curid=9988187
|
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 9