Wednesday, December 1, 2010

Video Podcast Timeline

· On 1 January 2004 Steve Garfield launches his video blog and declares that 2004 would be the year of the video blog.
· On 1 November 2004 Steve Garfield launches Steve Garfield's VideoPodcast to test distribution of RSS video enclosures with a video blog. RSS Feed iTunes feed
· On October 1, 2005 Terra: The Nature of Our World launched making it the first Natural History video podcast. It is produced in conjunction with the MFA program in Science & Natural History Filmmaking at Montana State University, Filmmakers for Conservation, and PBS.
· On October 14, 2005 Steve Jobs introduced the new "iPod with video" at the Keynote speech of Macworld 2005. The Video podcasts Tiki Bar TV and Rocketboom are mentioned, and Jobs shows a brief clip of Tiki Bar TV to the audience. The image of Kevin Gamble, one of the co-creators of Tiki Bar TV, is featured on Apple's homepage for a month next to U2's Bono.
· On June 8, 2006, the German chancellor, Angela Merkel, launched her video podcast via the Chancellor's website, making her the first head of government to issue a regular video podcast.
· On December 16, 2006, Time magazine named its Person of the Year as "You", referring to independent content creators on the web and video podcasters in particular. Crash Test Kitchen, a video podcast begun in April 2005 by home cooks Waz and Lenny, was featured in the magazine as an example of this phenomenon. The magazine itself was a distinctive issue that featured a flexible mirror on the cover.
· On April 13, 2007, the British panel game Have I Got News for You started to broadcast a vodcast called Have I Got News for You: The Inevitable Internet Spin-off. The first HIGNFY vodcast was presented by Jeremy Clarkson.
· May 10, 2007, Feed Me Bubbe featured in The Wall Street Journal by Jessica E. Vascellaro who wrote an article, discussing "Feed Me Bubbe" that was distributed by The AP Datastream ("Using Youtube for posterity," May 10, 2007)
· Another British panel game, QI, also announced that it would create a vodcast, starting in Series E. However, this was changed into a set of "Quickies", not downloadable and only viewable from the BBC website.
· On November 25, 2007, Neil Fairbrother was featured in the Sunday Observer's Courvoisier Future 500 for creating pod3.tv, a web TV channel that creates and distributes TV shows as video podcasts.

source:Wikepedia

Sunday, November 28, 2010

Technology and history

From a web server, a video podcast can be distributed as a file or as a stream. Both methods have their advantages and disadvantages. Downloading complete video podcasts in advance gives the user the ability to play the video podcasts offline on, for example, a portable media player. A downloaded version can be watched many times with only one download, reducing bandwidth costs in this case. Streaming allows seeking (skipping portions of the file) without downloading the full video podcast, better statistics and lower bandwidth costs for the servers; however, users may have to face pauses in playback caused by slow transfer speeds.
A podcast client may work with a separate, or integrated player. One such example of the latter is iTunes, which is an unusual case of a web feed aggregator being added to a media player rather than vice versa.

source:Wikepedia

Saturday, November 27, 2010

Video podcast

Video podcast (sometimes shortened to vodcast) is a term used for the online delivery of video on demand video clip content via Atom or RSS enclosures. The term is used to distinguish between podcasts which most commonly contain audio files and those referring to the distribution of video where the RSS feed is used as a non-linear TV channel to which consumers can subscribe using a PC, TV, set-top box, media center or mobile multimedia device. Web television series are often distributed as video podcasts.
However, the term podcast has from its inception described the distribution of digital media files, including video and audio via RSS enclosures and hence the terms video podcast, vodcast, and less commonly vidcast, are redundant.

source:Wikepedia

Friday, November 26, 2010

Screencast

A screencast is a digital recording of computer screen output, also known as a video screen capture, often containing audio narration. Although the term screencast dates from 2004, products such as Lotus ScreenCam were used as early as 1994. Early products produced large files and had limited editing features. More recent products support more compact file formats such as Adobe Flash and have more sophisticated editing features, allowing relatively easy changes in sequence, mouse movement, audio, etc.
A screenshot is a picture of a computer screen; a screencast is essentially a movie of the changes over time that a user sees on a computer screen, enhanced with audio narration.

sourc:Wikepedia

Thursday, November 25, 2010

More on podcasting

Health
· Health, fitness and wellness resources, both general and specific.
Special interests
· Farm Podcasting makes information available about farming. The term was coined to identify a program that is produced exclusively as a podcast on the subject of agriculture. There are now multiple companies who specialize in farm podcasting and are producing regular programming targeted to farmers and the general public on the subject of agriculture.
Non-traditional and alternative content
· A way for people and organizations to avoid regulatory bodies, such as the British Ofcom, or American Federal Communications Commission (FCC) that would not allow a program to be broadcast in traditional media.

source:Wikepedia

Sunday, November 21, 2010

Publicity and marketing

As a promotional vehicle for an upcoming event, such as Pixar's Cars Video Podcast, which advertised the release of Disney/Pixar's Cars animated feature film with a series of behind-the-scenes clips.

source:Wikepedia

Monday, November 15, 2010

Politics

Politics: In the U.S., both major political parties have various podcasts, as do numerous politicians.

source:Wikepedia

Sunday, November 14, 2010

Music

Replacement for live music audio streams. Whereas streaming a performance live over the Internet requires careful coordination of person and machine, podcasting offers the ability to do slight time-shifting of performances and greatly reduces the complexity of the effort. The quality of the program is often higher as post-production adjustments can be made prior to release. For example, programs can provide a live stream of their program, but most listeners don't hear it until weeks later on NPR. Podcasted versions of the programs split the difference, usually coming out a few days after the live program, but well before the traditional broadcast.

source:Wikepedia

Saturday, November 13, 2010

News

Newspapers. Newspapers use podcasts to broadcast audio content from print interviews and drive traffic to their websites. The San Francisco Chronicle is believed to be the first major daily newspaper to start podcasting using an external website,in Feb 2005. Hong Kong's South China Morning Post was the first to use its own website and the first in Asia, having launched on April 19, 2005
Communication from space. On 7 August 2005. American astronaut Steve Robinson claimed the first podcast from space during the Space Shuttle Discovery mission STS-114 - although there was no subscription feed, merely an audio file that required manual downloading.
Conference and meeting alerts. Podcasts can be packaged to alert attendees to agendas, hosted roundtables and daily feedback.

source:Wikepedia

Friday, November 12, 2010

Entertainment

* Comedy. Comedians such as Ricky Gervais and Stephen Fry have created some of the most popular podgrams.
* Television commentary. Battlestar Galactica writer and executive producer Ronald D. Moore creates commentary podcasts for each new episode of Battlestar Galactica. Other television shows such as Doctor Who have since followed suit.
* Radio series. Some radio programs such as The Now Show and The News Quiz allow entire episodes to be downloaded as podcasts.
* As a platform for fan DVD-style commentary tracks (Audio commentary). Enables fans to add their own comments and thoughts to any of their favorite films.
* Sports. In 2005, unofficial podcasts for major sports teams launched, providing fans both in and outside of the teams' direct broadcast areas with on-demand commentary. The Cubscast founders also formed the first city-specific sports podcast network, hosting one podcast for each major Chicago team.
* Pornography. Porncasting and podnography are sometimes used to refer to pornography in podcasts.
* Reintroducing Classical Childrens Literature. Podcasts such as Albert Lea Public Library's Classics On-the-Go program bring classical (non-copyrighted) childrens literature back to life for everyone to share.
* Fiction. Podcasts like Escape Pod are used to distribute short stories in audio book format. Other podcasts distribute stories in the format of radio drama.

source:Wikepedia

Thursday, November 11, 2010

Education and academia

Podcasts enable students and teachers to share information with anyone anytime. If a student is absent, he or she can download the podcast of the recorded lesson. Teachers may also create podcasts to be used as a preparation tool for students. This would be pedagogically equivalent to having students read a text before a lesson. It can be a tool for teachers or administrators to communicate curriculum, assignments and other information with parents and the community. Teachers can record book talks, vocabulary or foreign language lessons, international pen pal letters (podcast pals!), music performance, interviews, debates. Podcasting can be a publishing tool for student oral presentations. Video podcasts can be used in all these ways as well.
Mobile Learning: Podcasting can be categorised as an m-learning strategy for teaching and learning. In 2004 Musselburgh Grammar School pioneered podcast lessons with foreign language audio revision and homework. In the second half of 2005, a Communication Studies course at the University of Western Australia used student-created podcasts as the main assessment item have proven beneficial in early elementary education as well. In 2005 Students in the Write was created for second grade students at Morse Elementary School in Tarrytown, NY. By providing students with an authentic audience, teachers noticed significantly increased motivation to write. Students were also found to improve fluency and listening skills. On the 21st February 2006 Lance Anderson, Dr. Chris Smith (the Naked Scientist), Nigel Paice and Debbie McGowan took part in the first podcast forum at Cambridge University. The event was hosted by the Centre for Applied Research in Educational Technologies.
Mobile Knowledge Transfer: Podcasting is also used as a further channel in Corporations to disseminate information and knowledge faster and easier. It can be seen as a further development of Rapid E-Learning as the content can be created fast end without much effort. Learners can learn in idle times which saves time and money for them and the organizations. If audiopodcasts are used they can be used during other activities like driving a car, or traveling by train/bus. A target group often targeted is the salesforce, as they are highly mobile. There Podcasting can be used for sales enablement (see case study) with the goal of having the sales employee aware and knowledgeable on the companies products, processes, initiatives etc. An often used format is expert interviews with statements of experienced role models to bring across also informal/tacit knowledge.
Journalism Education: School podcasts can be created to expose students to journalism and new-media concepts. Regularly released "news" podcasts can be released by a school group.
Academic Journal Digests: The Society of Critical Care Medicine has a podcast used to update clinicians with summaries of important articles, as well as interviews.
Supply Chain Management Education: In October, 2007 Dr Stephan Brady presented his paper on "Podcasting in Supply Chain Education" at the CSCMP Educators Conference. In this paper he outlined how podcasting can be used in and outside of the classroom for enhancing supply chain courses through blended, or hybrid learning.
Professional Development: Professional development podcasts exist for educators. Some podcasts may be general in nature or may be slightly more specific and focus on the use of interactive white boards in the classroom.
Religion: Godcasting has been used by many religious groups. Many churches produce podcasts of talks and sermons. Disciples with Microphones provides podcasts relating to the Catholic Church.
Tutorials: A tutorial on almost any subject can be created as either an audio podcast or video vodcast. Through screencasting, many video podcasts demonstrate how to use software and operating systems.

source:Wikepedia

Wednesday, November 10, 2010

Uses of podcasting

Public services
Unofficial audio tours of museums.
Official cultural or historic audio tours of cities
A way for news organizations to distribute audio or video as an addition to their existing text (or mostly text) news products. For example, Wikinews began to podcast its News Briefs in 2005. Companies are also using podcasts as a way to distribute their multimedia news to journalists and consumers through companies like MultiVu. In 2006, the online magazine Slate began textcasting articles to their readers, by attaching a written article to a blank audio file and delivering the content to readers through their regular podcasting mechanism.
Advocacy. The 5,500 locked out staff (editors, journalists, technicians, hosts, etc.) of the Canadian Broadcasting Corporation were podcasting news and other programming during August and September 2005.
Youth media. Podcasting has become a way for youth media organizations, such as Youth Radio, to bring youth perspectives to a wider audience.
Public libraries can podcast local publications free of Copyright, offering spoken word alternatives to the visually impaired. Non-profit organizations podcast readings of short-format magazine articles for visually impaired readers.
Law enforcement. The Chicago Police Department has a free video podcast of its half-hour weekly news magazine called "CrimeWatch," which airs on local TV. It documents community policing (CAPS) success stories.
Educational Institutions use Podcast for self guided Campus Tour.

source:Wikepedia

Tuesday, November 9, 2010

Cyberstalking legislation continued...

Australia
In Australia, the Stalking Amendment Act (1999) includes the use of any form of technology to harass a target as forms of "criminal stalking."
United Kingdom
In the United Kingdom, the Malicious Communications Act (1998) classified cyberstalking as a criminal offense.
Spain
In Spain, it is possible to provide information about cyber-crime in an anonymous way to four safety bodies:
Grupo de Delitos Telemáticos of the Civil Guard (Spain)
Brigada de Investigación Tecnológica of the National Police Corps of Spain
Mossos d'Esquadra in Catalonia
Ertzaintza in Euskadi
It is also possible to provide information to an NGO.

source:Wikepedia

Monday, November 8, 2010

Cyberstalking legislation

United States
The current US Federal Anti-Cyber-Stalking law is found at 47 USC sec. 223.

The first U.S. cyberstalking law went into effect in 1999 in California. Other states include prohibition against cyberstalking in their harassment or stalking legislation. In Florida, HB 479 was introduced in 2003 to ban cyberstalking. This was signed into law on October 2003.

Some states in the U.S. have begun to address the issue of cyberstalking:

Alabama, Arizona, Connecticut, Hawaii, Illinois, New Hampshire, and New York have included prohibitions against harassing electronic, computer or e-mail communications in their harassment legislation.
Alaska, Florida, Oklahoma, Wyoming, and California, have incorporated electronically communicated statements as conduct constituting stalking in their anti-stalking laws.
Texas enacted the Stalking by Electronic Communications Act, 2001.
Missouri revised its state harassment statutes to include stalking and harassment by telephone and electronic communications (as well as cyber-bullying) after the Megan Meier suicide case of 2006.
A few states have both stalking and harassment statutes that criminalize threatening and unwanted electronic communications.
Other states have laws other than harassment or anti-stalking statutes that prohibit misuse of computer communications and e-mail, while others have passed laws containing broad language that can be interpreted to include cyberstalking behaviors
Cyberstalking has also been addressed in recent U.S. federal law. For example, the Violence Against Women Act, passed in 2000, made cyberstalking a part of the federal interstate stalking statute. Still, there remains a lack of legislation at the federal level to specifically address cyberstalking, leaving the majority of legislative prohibitions against cyberstalking at the state level.

Most stalking laws require that the perpetrator make a credible threat of violence against the victim; others include threats against the victim's immediate family; and still others require the alleged stalker's course of conduct constitute an implied threat. While some conduct involving annoying or menacing behavior might fall short of illegal stalking, such behavior may be a prelude to stalking and violence and should be treated seriously.

Online identity stealth blurs the line on infringement of the rights of would-be victims to identify their perpetrators. There is a debate on how internet use can be traced without infringing on protected civil liberties.

source:Wikepedia

Thursday, November 4, 2010

Cyberstalker behaviors

Cyberstalkers meet or target their victims by using search engines, online forums, bulletin and discussion boards, chat rooms, and more recently, through online communities such as MySpace, Facebook, Bebo, Friendster, Twitter, and Indymedia, a media outlet known for self-publishing. They may engage in live chat harassment or flaming or they may send electronic viruses and unsolicited e-mails. Victims of cyberstalking may not even know that they are being stalked. Cyberstalkers may research individuals to feed their obsessions and curiosity. Conversely, the acts of cyberstalkers may become more intense, such as repeatedly instant messaging their targets.
More commonly they will post defamatory or derogatory statements about their stalking target on web pages, message boards and in guest books designed to get a reaction or response from their victim, thereby initiating contact. In some cases, they have been known to create fake blogs in the name of the victim containing defamatory or pornographic content.
When prosecuted, many stalkers have unsuccessfully attempted to justify their behavior based on their use of public forums, as opposed to direct contact. Once they get a reaction from the victim, they will typically attempt to track or follow the victim's internet activity. Classic cyberstalking behavior includes the tracing of the victim's IP address in an attempt to verify their home or place of employment.
Some cyberstalking situations do evolve into physical stalking, and a victim may experience abusive and excessive phone calls, vandalism, threatening or obscene mail, trespassing, and physical assault. Moreover, many physical stalkers will use cyberstalking as another method of harassing their victims.
A 2007 study, led by Paige Padgett from the University of Texas Health Science Center, found that there was a false degree of safety assumed by women looking for love online.

source:Wikepedia

Wednesday, November 3, 2010

Cyberstalking

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass. The definition of "harassment" must meet the criterion that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress.
Cyber Angels has written about how to identify cyberstalking:
When identifying cyberstalking "in the field," and particularly when considering whether to report it to any kind of legal authority, the following features or combination of features can be considered to characterize a true stalking situation: malice, premeditation, repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop, harassment, and threats.
A number of key factors have been identified:
· False accusations. Many cyberstalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms or other sites that allow public contributions, such as Wikipedia or Amazon.com.
· Attempts to gather information about the victim. Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective. They often will monitor the victim's online activities and attempt to trace their IP address in an effort to gather more information about their victims.
· Encouraging others to harass the victim. Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.
· False victimization. The cyberstalker will claim that the victim is harassing him/her. Bocij writes that this phenomenon has been noted in a number of well-known cases.
· Attacks on data and equipment. They may try to damage the victim's computer by sending viruses.
· Ordering goods and services. They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography or ordering sex toys then having them delivered to the victim's workplace.
· Arranging to meet. Young people face a particularly high risk of having cyberstalkers try to set up meetings between them.


source:Wikepedia

Tuesday, November 2, 2010

Blogger's Code of Conduct

The Blogger's Code of Conduct is a proposal by Tim O'Reilly for bloggers to enforce civility on their blogs by being civil themselves and moderating comments on their blog. The code was proposed due to threats made to blogger Kathy Sierra. The idea of the code was first reported by BBC News, who quoted O'Reilly saying, "I do think we need some code of conduct around what is acceptable behaviour, I would hope that it doesn't come through any kind of regulation it would come through self-regulation."
O'Reilly and others came up with a list of seven proposed ideas:
1. Take responsibility not just for your own words, but for the comments you allow on your blog.
2. Label your tolerance level for abusive comments.
3. Consider eliminating anonymous comments.
4. Ignore the trolls.
5. Take the conversation offline, and talk directly, or find an intermediary who can do so.
6. If you know someone who is behaving badly, tell them so.
7. Don't say anything online that you wouldn't say in person.

source:Wikepedia

Monday, November 1, 2010

Personal safety

One consequence of blogging is the possibility of attacks or threats against the blogger, sometimes without apparent reason. Kathy Sierra, author of the innocuous blog Creating Passionate Users, was the target of such vicious threats and misogynistic insults that she canceled her keynote speech at a technology conference in San Diego, fearing for her safety. While a blogger's anonymity is often tenuous, Internet trolls who would attack a blogger with threats or insults can be emboldened by anonymity. Sierra and supporters initiated an online discussion aimed at countering abusive online behavior and developed a blogger's code of conduct.

source:Wikepedia

Sunday, October 31, 2010

Political dangers

Blogging can sometimes have unforeseen consequences in politically sensitive areas. Blogs are much harder to control than broadcast or even print media. As a result, totalitarian and authoritarian regimes often seek to suppress blogs and/or to punish those who maintain them.
In Singapore, two ethnic Chinese were imprisoned under the country’s anti-sedition law for posting anti-Muslim remarks in their blogs.
Egyptian blogger Kareem Amer was charged with insulting the Egyptian president Hosni Mubarak and an Islamic institution through his blog. It is the first time in the history of Egypt that a blogger was prosecuted. After a brief trial session that took place in Alexandria, the blogger was found guilty and sentenced to prison terms of three years for insulting Islam and inciting sedition, and one year for insulting Mubarak.
Egyptian blogger Abdel Monem Mahmoud was arrested in April 2007 for anti-government writings in his blog. Monem is a member of the banned Muslim Brotherhood.
After expressing opinions in his personal blog about the state of the Sudanese armed forces, Jan Pronk, United Nations Special Representative for the Sudan, was given three days notice to leave Sudan. The Sudanese army had demanded his deportation.
In Myanmar, Nay Phone Latt, a blogger, was sentenced to 20 years in jail for posting a cartoon critical of head of state Than Shwe.

source:Wikepedia

Saturday, October 30, 2010

Employment

Employees who blog about elements of their place of employment can begin to affect the brand recognition of their employer. In general, attempts by employee bloggers to protect themselves by maintaining anonymity have proved ineffective. In late 2004, Ellen Simonetti was fired for what was deemed by her employer, Delta Air Lines, to be inappropriate material on her blog. She subsequently wrote a book based on her blog.
Delta Air Lines fired flight attendant Ellen Simonetti because she posted photographs of herself in uniform on an airplane and because of comments posted on her blog "Queen of Sky: Diary of a Flight Attendant" which the employer deemed inappropriate. This case highlighted the issue of personal blogging and freedom of expression versus employer rights and responsibilities, and so it received wide media attention. Simonetti took legal action against the airline for "wrongful termination, defamation of character and lost future wages". The suit was postponed while Delta was in bankruptcy proceedings.
In early 2006, Erik Ringmar, a tenured senior lecturer at the London School of Economics, was ordered by the convenor of his department to "take down and destroy" his blog in which he discussed the quality of education at the school.
Mark Cuban, owner of the Dallas Mavericks, was fined during the 2006 NBA playoffs for criticizing NBA officials on the court and in his blog.
Mark Jen was terminated in 2005 after 10 days of employment as an Assistant Product Manager at Google for discussing corporate secrets on his personal blog, then called 99zeros and hosted on the Google-owned Blogger service. He blogged about unreleased products and company finances a week before the company's earnings announcement. He was fired two days after he complied with his employer's request to remove the sensitive material from his blog.
In India, blogger Gaurav Sabnis resigned from IBM after his posts exposing the false claims of a management school, IIPM, led to management of IIPM threatening to burn their IBM laptops as a sign of protest against him.
Jessica Cutler, aka "The Washingtonienne", blogged about her sex life while employed as a congressional assistant. After the blog was discovered and she was fired, she wrote a novel based on her experiences and blog: The Washingtonienne: A Novel. Cutler is presently being sued by one of her former lovers in a case that could establish the extent to which bloggers are obligated to protect the privacy of their real life associates.
Catherine Sanderson, a.k.a. Petite Anglaise, lost her job in Paris at a British accountancy firm because of blogging. Although given in the blog in a fairly anonymous manner, some of the descriptions of the firm and some of its people were less than flattering. Sanderson later won a compensation claim case against the British firm, however.
On the other hand, Penelope Trunk wrote an upbeat article in the Boston Globe back in 2006, entitled "Blogs 'essential' to a good career". She was one of the first journalists to point out that a large portion of bloggers are professionals and that a well-written blog can help attract employers.

source:Wikepedia

Friday, October 29, 2010

Legal and social consequences

Blogging can result in a range of legal liabilities and other unforeseen consequences.
Defamation or liability
Several cases have been brought before the national courts against bloggers concerning issues of defamation or liability. U.S. payouts related to blogging totaled $17.4 million by 2009; in some cases these have been covered by umbrella insurance. The courts have returned with mixed verdicts. Internet Service Providers (ISPs), in general, are immune from liability for information that originates with third parties (U.S. Communications Decency Act and the EU Directive 2000/31/EC).
In Doe v. Cahill, the Delaware Supreme Court held that stringent standards had to be met to unmask the anonymous posts of bloggers and also took the unusual step of dismissing the libel case itself (as unfounded under American libel law) rather than referring it back to the trial court for reconsideration. In a bizarre twist, the Cahills were able to obtain the identity of John Doe, who turned out to be the person they suspected: the town's mayor, Councilman Cahill's political rival. The Cahills amended their original complaint, and the mayor settled the case rather than going to trial.
In January 2007, two prominent Malaysian political bloggers, Jeff Ooi and Ahiruddin Attan, were sued by pro-government newspaper, The New Straits Times Press (Malaysia) Berhad, Kalimullah bin Masheerul Hassan, Hishamuddin bin Aun and Brenden John a/l John Pereira over an alleged defamation. The plaintiff was supported by the Malaysian government. Following the suit, the Malaysian government proposed to "register" all bloggers in Malaysia in order to better control parties against their interest. This is the first such legal case against bloggers in the country.
In the United States, blogger Aaron Wall was sued by Traffic Power for defamation and publication of trade secrets in 2005. According to Wired Magazine, Traffic Power had been "banned from Google for allegedly rigging search engine results." Wall and other "white hat" search engine optimization consultants had exposed Traffic Power in what they claim was an effort to protect the public. The case was watched by many bloggers because it addressed the murky legal question of who is liable for comments posted on blogs. The case was dismissed for lack of personal jurisdiction, and Traffic Power failed to appeal within the allowed time.
In 2009, a controversial and landmark decision by The Hon. Mr Justice Eady refused to grant an order to protect the anonymity of Richard Horton.
In 2009, NDTV issued a legal notice to Indian blogger Chetan Kunte for "abusive free speech" regarding a blog post criticizing their coverage of the Mumbai attacks. The blogger unconditionally withdrew his post, replacing it with legal undertaking and an admission that his post had been "defamatory and untrue" which resulted in several Indian bloggers criticizing NDTV for trying to silence critics.

source:Wikepedia

Thursday, October 28, 2010

Consumer generated advertising in blogs

Consumer generated advertising is a relatively new and controversial development and it has created a new model of marketing communication from businesses to consumers. Among the various forms of advertising on blog, the most controversial are the sponsored posts. These are blog entries or posts and may be in the form of feedbacks, reviews, opinion, videos, etc. and usually contains a link back to the desired site using a keyword.
Blogs have led to some disintermediation and a breakdown of the traditional advertising model where companies can skip over the advertising agencies (previously the only interface with the customer) and contact the customers directly themselves. On the other hand, new companies specialised in blog advertising have been established, to take advantage of this new development as well.
However, there are many people who look negatively on this new development. Some believe that any form of commercial activity on blogs will destroy the blogosphere’s credibility.

source:Wikepedia

Wednesday, October 27, 2010

Blurring with the mass media

Many bloggers, particularly those engaged in participatory journalism, differentiate themselves from the mainstream media, while others are members of that media working through a different channel. Some institutions see blogging as a means of "getting around the filter" and pushing messages directly to the public. Some critics worry that bloggers respect neither copyright nor the role of the mass media in presenting society with credible news. Bloggers and other contributors to user-generated content are behind Time magazine naming their 2006 person of the year as "you".
Many mainstream journalists, meanwhile, write their own blogs — well over 300, according to CyberJournalist.net's J-blog list. The first known use of a blog on a news site was in August 1998, when Jonathan Dube of The Charlotte Observer published one chronicling Hurricane Bonnie.
Some bloggers have moved over to other media. The following bloggers (and others) have appeared on radio and television: Duncan Black (known widely by his pseudonym, Atrios), Glenn Reynolds (Instapundit), Markos Moulitsas Zúniga (Daily Kos), Alex Steffen (Worldchanging), Ana Marie Cox (Wonkette), Nate Silver (FiveThirtyEight.com), and Ezra Klein (Ezra Klein blog in The American Prospect, now in the Washington Post). In counterpoint, Hugh Hewitt exemplifies a mass-media personality who has moved in the other direction, adding to his reach in "old media" by being an influential blogger. Equally many established authors, for example Mitzi Szereto have started using Blogs to not only update fans on their current works but also to expand into new areas of writing.
Blogs have also had an influence on minority languages, bringing together scattered speakers and learners; this is particularly so with blogs in Gaelic languages. Minority language publishing (which may lack economic feasibility) can find its audience through inexpensive blogging.
There are many examples of bloggers who have published books based on their blogs, e.g., Salam Pax, Ellen Simonetti, Jessica Cutler, ScrappleFace. Blog-based books have been given the name blook. A prize for the best blog-based book was initiated in 2005, the Lulu Blooker Prize. However, success has been elusive offline, with many of these books not selling as well as their blogs. Only blogger Tucker Max made the New York Times Bestseller List. The book based on Julie Powell's blog "The Julie/Julia Project" was made into the film Julie & Julia, apparently the first to do so.

source:Wikepedia

Monday, October 25, 2010

Blog popularity

Researchers have analyzed the dynamics of how blogs become popular. There are essentially two measures of this: popularity through citations, as well as popularity through affiliation (i.e. blogroll). The basic conclusion from studies of the structure of blogs is that while it takes time for a blog to become popular through blogrolls, permalinks can boost popularity more quickly, and are perhaps more indicative of popularity and authority than blogrolls, since they denote that people are actually reading the blog's content and deem it valuable or noteworthy in specific cases.
The blogdex project was launched by researchers in the MIT Media Lab to crawl the Web and gather data from thousands of blogs in order to investigate their social properties. It gathered this information for over 4 years, and autonomously tracked the most contagious information spreading in the blog community, ranking it by recency and popularity. It can therefore be considered the first instantiation of a memetracker. The project is no longer active, but a similar function is now served by tailrank.com.
Blogs are given rankings by Technorati based on the number of incoming links and Alexa Internet based on the Web hits of Alexa Toolbar users. In August 2006, Technorati found that the most linked-to blog on the internet was that of Chinese actress Xu Jinglei. Chinese media Xinhua reported that this blog received more than 50 million page views, claiming it to be the most popular blog in the world. Technorati rated Boing Boing to be the most-read group-written blog.

source:Wikepedia

Sunday, October 24, 2010

Community and cataloging

The Blogosphere
The collective community of all blogs is known as the blogosphere. Since all blogs are on the internet by definition, they may be seen as interconnected and socially networked, through blogrolls, comments, linkbacks (refbacks, trackbacks or pingbacks) and backlinks. Discussions "in the blogosphere" are occasionally used by the media as a gauge of public opinion on various issues. Because new, untapped communities of bloggers can emerge in the space of a few years, Internet marketers pay close attention to "trends in the blogosphere".
BlogDay
BlogDay was created with the belief that bloggers should have one day dedicated to getting to know other bloggers from other countries and areas of interest. The designated date is August 31, because when written 3108, it resembles the word "Blog". On that day, bloggers recommend five new blogs to their visitors, so that readers discover new, previously unknown blogs.
Blog search engines
Several blog search engines are used to search blog contents, such as Bloglines, BlogScope, and Technorati. Technorati, which is among the most popular blog search engines, provides current information on both popular searches and tags used to categorize blog postings. The research community is working on going beyond simple keyword search, by inventing new ways to navigate through huge amounts of information present in the blogosphere, as demonstrated by projects like BlogScope.
Blogging communities and directories
Several online communities exist that connect people to blogs and bloggers to other bloggers, including BlogCatalog and MyBlogLog.
Interest-specific blogging platforms are also available. For instance, Blogster has a sizable community of political bloggers among its members.
Blogging and advertising
It is common for blogs to feature advertisements either to financially benefit the blogger or to promote the blogger's favorite causes. The popularity of blogs has also given rise to "fake blogs" in which a company will create a fictional blog as a marketing tool to promote a product.

source:Wikepedia

Saturday, October 23, 2010

Blog types

There are many different types of blogs, differing not only in the type of content, but also in the way that content is delivered or written.
Personal blogs
The personal blog, an ongoing diary or commentary by an individual, is the traditional, most common blog. Personal bloggers usually take pride in their blog posts, even if their blog is never read. Blogs often become more than a way to just communicate; they become a way to reflect on life, or works of art. Blogging can have a sentimental quality. Few personal blogs rise to fame and the mainstream, but some personal blogs quickly garner an extensive following. One type of personal blog, referred to as a microblog, is extremely detailed and seeks to capture a moment in time. Some sites, such as Twitter, allow bloggers to share thoughts and feelings instantaneously with friends and family, and are much faster than emailing or writing.
Corporate and organizational blogs
A blog can be private, as in most cases, or it can be for business purposes. Blogs used internally to enhance the communication and culture in a corporation or externally for marketing, branding or public relations purposes are called corporate blogs. Similar blogs for clubs and societies are called club blogs, group blogs, or by similar names; typical use is to inform members and other interested parties of club and member activities.
By genre
Some blogs focus on a particular subject, such as political blogs, travel blogs (also known as travelogs), house blogs, fashion blogs, project blogs, education blogs, niche blogs, classical music blogs, quizzing blogs and legal blogs (often referred to as a blawgs) or dreamlogs. Two common types of genre blogs are art blogs and music blogs. A blog featuring discussions especially about home and family is not uncommonly called a mom blog. While not a legitimate type of blog, one used for the sole purpose of spamming is known as a Splog.
By media type
A blog comprising videos is called a vlog, one comprising links is called a linklog, a site containing a portfolio of sketches is called a sketchblog or one comprising photos is called a photoblog. Blogs with shorter posts and mixed media types are called tumblelogs. Blogs that are written on typewriters and then scanned are called typecast or typecast blogs; see typecasting (blogging).
A rare type of blog hosted on the Gopher Protocol is known as a Phlog.
By device
Blogs can also be defined by which type of device is used to compose it. A blog written by a mobile device like a mobile phone or PDA could be called a moblog. One early blog was Wearable Wireless Webcam, an online shared diary of a person's personal life combining text, video, and pictures transmitted live from a wearable computer and EyeTap device to a web site. This practice of semi-automated blogging with live video together with text was referred to as sousveillance. Such journals have been used as evidence in legal matters.

source:Wikepedia

Friday, October 22, 2010

Mainstream popularity

By 2004, the role of blogs became increasingly mainstream, as political consultants, news services, and candidates began using them as tools for outreach and opinion forming. Blogging was established by politicians and political candidates to express opinions on war and other issues and cemented blogs' role as a news source. (See Howard Dean and Wesley Clark.) Even politicians not actively campaigning, such as the UK's Labour Party's MP Tom Watson, began to blog to bond with constituents.
In January 2005, Fortune magazine listed eight bloggers that business people "could not ignore": Peter Rojas, Xeni Jardin, Ben Trott, Mena Trott, Jonathan Schwartz, Jason Goldman, Robert Scoble, and Jason Calacanis.
Israel's was among the first national governments to set up an official blog. Under David Saranga, the Israeli Ministry of Foreign Affairs became active in adopting Web 2.0 initiatives, including an official video blog and a political blog. The Foreign Ministry also held a microblogging press conference via Twitter about its war with Hamas, with Saranga answering questions from the public in common text-messaging abbreviations during a live worldwide press conference. The questions and answers were later posted on IsraelPolitik, the country's official political blog.
The impact of blogging upon the mainstream media has also been acknowledged by governments. In 2009, the presence of the American journalism industry had declined to the point that several newspaper corporations were filing for bankruptcy, resulting in less direct competition between newspapers within the same circulation area. Discussion emerged as to whether the newspaper industry would benefit from a stimulus package by the federal government. President Barack Obama acknowledged the emerging influence of blogging upon society by saying "if the direction of the news is all blogosphere, all opinions, with no serious fact-checking, no serious attempts to put stories in context, that what you will end up getting is people shouting at each other across the void but not a lot of mutual understanding”.

source:Wikepedia

Thursday, October 21, 2010

Political impact

Since 2002, blogs have gained increasing notice and coverage for their role in breaking, shaping, and spinning news stories. For the first time in the history of modern journalism, the financial and political goals of U.S.-Israeli relations are being analyzed in depth. The Iraq war saw bloggers taking measured and passionate points of view that go beyond the traditional left-right divide of the political spectrum. On 6 December 2002, Josh Marshall's talkingpointsmemo.com blog called attention to U.S. Senator Lott's comments regarding Senator Thurmond. Senator Lott was eventually to resign his Senate leadership position over the matter.
An early milestone in the rise in importance of blogs came in 2002, when many bloggers focused on comments by U.S. Senate Majority Leader Trent Lott. Senator Lott, at a party honoring U.S. Senator Strom Thurmond, praised Senator Thurmond by suggesting that the United States would have been better off had Thurmond been elected president. Lott's critics saw these comments as a tacit approval of racial segregation, a policy advocated by Thurmond's 1948 presidential campaign. This view was reinforced by documents and recorded interviews dug up by bloggers. (See Josh Marshall's Talking Points Memo.) Though Lott's comments were made at a public event attended by the media, no major media organizations reported on his controversial comments until after blogs broke the story. Blogging helped to create a political crisis that forced Lott to step down as majority leader.
Similarly, blogs were among the driving forces behind the "Rathergate" scandal. To wit: (television journalist) Dan Rather presented documents (on the CBS show 60 Minutes) that conflicted with accepted accounts of President Bush's military service record. Bloggers declared the documents to be forgeries and presented evidence and arguments in support of that view. Consequently, CBS apologized for what it said were inadequate reporting techniques (see Little Green Footballs). Many bloggers view this scandal as the advent of blogs' acceptance by the mass media, both as a news source and opinion and as means of applying political pressure.
The impact of these stories gave greater credibility to blogs as a medium of news dissemination. Though often seen as partisan gossips,[citation needed] bloggers sometimes lead the way in bringing key information to public light, with mainstream media having to follow their lead. More often, however, news blogs tend to react to material already published by the mainstream media. Meanwhile, an increasing number of experts blogged, making blogs a source of in-depth analysis. (See Daniel Drezner, J. Bradford DeLong or Brad Setser.)

source:Wikepedia

Wednesday, October 20, 2010

Rise in popularity

After a slow start, blogging rapidly gained in popularity. Blog usage spread during 1999 and the years following, being further popularized by the near-simultaneous arrival of the first hosted blog tools:
· Bruce Ableson launched Open Diary in October 1998, which soon grew to thousands of online diaries. Open Diary innovated the reader comment, becoming the first blog community where readers could add comments to other writers' blog entries.
· Brad Fitzpatrick started LiveJournal in March 1999.
· Andrew Smales created Pitas.com in July 1999 as an easier alternative to maintaining a "news page" on a Web site, followed by Diaryland in September 1999, focusing more on a personal diary community.
· Evan Williams and Meg Hourihan (Pyra Labs) launched blogger.com in August 1999 (purchased by Google in February 2003)

source:Wikepedia

Tuesday, October 19, 2010

Blog origins

Before blogging became popular, digital communities took many forms, including Usenet, commercial online services such as GEnie, BiX and the early CompuServe, e-mail lists and Bulletin Board Systems (BBS). In the 1990s, Internet forum software, created running conversations with "threads." Threads are topical connections between messages on a virtual "corkboard."
The modern blog evolved from the online diary, where people would keep a running account of their personal lives. Most such writers called themselves diarists, journalists, or journalers. Justin Hall, who began personal blogging in 1994 while a student at Swarthmore College, is generally recognized as one of the earliest bloggers, as is Jerry Pournelle. Dave Winer's Scripting News is also credited with being one of the oldest and longest running weblogs. Another early blog was Wearable Wireless Webcam, an online shared diary of a person's personal life combining text, video, and pictures transmitted live from a wearable computer and EyeTap device to a web site in 1994. This practice of semi-automated blogging with live video together with text was referred to as sousveillance, and such journals were also used as evidence in legal matters.
Early blogs were simply manually updated components of common Web sites. However, the evolution of tools to facilitate the production and maintenance of Web articles posted in reverse chronological order made the publishing process feasible to a much larger, less technical, population. Ultimately, this resulted in the distinct class of online publishing that produces blogs we recognize today. For instance, the use of some sort of browser-based software is now a typical aspect of "blogging". Blogs can be hosted by dedicated blog hosting services, or they can be run using blog software, or on regular web hosting services.
Some early bloggers, such as The Misanthropic Bitch, who began in 1997, actually referred to their online presence as a zine, before the term blog entered common usage.

source:Wikepedia

Monday, October 18, 2010

History

The term "weblog" was coined by Jorn Barger on 17 December 1997. The short form, "blog," was coined by Peter Merholz, who jokingly broke the word weblog into the phrase we blog in the sidebar of his blog Peterme.com in April or May 1999. Shortly thereafter, Evan Williams at Pyra Labs used "blog" as both a noun and verb ("to blog," meaning "to edit one's weblog or to post to one's weblog") and devised the term "blogger" in connection with Pyra Labs' Blogger product, leading to the popularization of the terms.

source:Wikepedia

Sunday, October 17, 2010

Blogs

A blog (a blend of the term web log) is a type of website or part of a website. Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse-chronological order. Blog can also be used as a verb, meaning to maintain or add content to a blog.
Most blogs are interactive, allowing visitors to leave comments and even message each other via widgets on the blogs and it is this interactivity that distinguishes them from other static websites.
Many blogs provide commentary or news on a particular subject; others function as more personal online diaries. A typical blog combines text, images, and links to other blogs, Web pages, and other media related to its topic. The ability of readers to leave comments in an interactive format is an important part of many blogs. Most blogs are primarily textual, although some focus on art (Art blog), photographs (photoblog), videos (video blogging), music (MP3 blog), and audio (podcasting). Microblogging is another type of blogging, featuring very short posts.
As of December 2007, blog search engine Technorati was tracking more than 112,000,000 blogs.

source:Wikepedia

Saturday, October 16, 2010

Examples

Social media can take many different forms, including Internet forums, weblogs, social blogs, microblogging, wikis, podcasts, pictures, video, rating and social bookmarking. By applying a set of theories in the field of media research (social presence, media richness) and social processes (self-presentation, self-disclosure) Kaplan and Haenlein created a classification scheme for different social media types in their Business Horizons article published in 2010. According to Kaplan and Haenlein there are six different types of social media: Collaborative projects, blogs and microblogs, content communities, social networking sites, virtual game worlds, and virtual communities. Technologies include: blogs, picture-sharing, vlogs, wall-postings, email, instant messaging, music-sharing, crowdsourcing, and voice over IP, to name a few. Many of these social media services can be integrated via social network aggregation platforms.

source:Wikepedia

Friday, October 15, 2010

Social media and "social authority"

One of the key components in successful social media marketing implementation is building "social authority". Social authority is developed when an individual or organization establishes themselves as an "expert" in their given field or area, thereby becoming an "influencer" in that field or area.
It is through this process of "building social authority" that social media becomes effective. That is why one of the foundational concepts in social media has become that you cannot completely control your message through social media but rather you can simply begin to participate in the "conversation" in the hopes that you can become a relevant influence in that conversation.
However, this conversation participation must be cleverly executed because while people are resistant to marketing in general, they are even more resistant to direct or overt marketing through social media platforms. This may seem counter-intuitive but is the main reason building social authority with credibility is so important. A marketer can generally not expect people to be receptive to a marketing message in and of itself. In the Edleman Trust Barometer report in 2008, the majority (58%) of the respondents reported they most trusted company or product information coming from "people like me" inferred to be information from someone they trusted. In the 2010 Trust Report, the majority switched to 64% preferring their information from industry experts and academics. According to Inc. Technology's Brent Leary, "This loss of trust, and the accompanying turn towards experts and authorities, seems to be coinciding with the rise of social media and networks."
Thus, using social media as a form of marketing has taken on whole new challenges. As the 2010 Trust Study indicates, it is most effective if marketing efforts through social media revolve around the genuine building of authority. Someone performing a "marketing" role within a company must honestly convince people of their genuine intentions, knowledge, and expertise in a specific area or industry through providing valuable and accurate information on an ongoing basis without a marketing angle overtly associated. If this can be done, trust with, and of, the recipient of that information – and that message itself – begins to develop naturally. This person or organization becomes a thought leader and value provider - setting themselves up as a trusted "advisor" instead of marketer. "Top of mind awareness" develops and the consumer naturally begins to gravitate to the products and/or offerings of the authority/influencer.
Of course, there are many ways authority can be created – and influence can be accomplished – including: participation in Wikipedia which actually verifies user-generated content and information more than most people may realize; providing valuable content through social networks on platforms such as Facebook and Twitter; article writing and distribution through sites such as Ezine Articles and Scribd; and providing fact-based answers on "social question and answer sites" such as EHow and Yahoo! Answers.
As a result of social media – and the direct or indirect influence of social media marketers – today, consumers are as likely – or more likely – to make buying decisions based on what they read and see in platforms we call "social" but only if presented by someone they have come to trust. That is why a purposeful and carefully designed social media strategy has become an integral part of any complete and directed marketing plan but must also be designed using newer "authority building" techniques.

source:Wikepedia

Thursday, October 14, 2010

Distinction from industrial media

People gain information, education, news, etc., by electronic media and print media. Social media are distinct from industrial or traditional media, such as newspapers, television, and film. They are relatively inexpensive and accessible to enable anyone (even private individuals) to publish or access information, compared to industrial media, which generally require significant resources to publish information.
One characteristic shared by both social media and industrial media is the capability to reach small or large audiences; for example, either a blog post or a television show may reach zero people or millions of people. The properties that help describe the differences between social media and industrial media depend on the study. Some of these properties are:
1. Reach - both industrial and social media technologies provide scale and enable anyone to reach a global audience.
2. Accessibility - the means of production for industrial media are typically owned privately or by government; social media tools are generally available to anyone at little or no cost.
3. Usability - industrial media production typically requires specialized skills and training. Most social media does not, or in some cases reinvent skills, so anyone can operate the means of production.
4. Recency - the time lag between communications produced by industrial media can be long (days, weeks, or even months) compared to social media (which can be capable of virtually instantaneous responses; only the participants determine any delay in response). As industrial media are currently adopting social media tools, this feature may well not be distinctive anymore in some time.
5. Permanence - industrial media, once created, cannot be altered (once a magazine article is printed and distributed changes cannot be made to that same article) whereas social media can be altered almost instantaneously by comments or editing.
Community media constitute an interesting hybrid of industrial and social media. Though community-owned, some community radios, TV and newspapers are run by professionals and some by amateurs. They use both social and industrial media frameworks.
In his 2006 book, The Wealth of Networks: How Social Production Transforms Markets and Freedom, Yochai Benkler analyzed many of these distinctions and their implications in terms of both economics and political liberty. However, Benkler, like many academics, uses the neologism network economy or "network information economy" to describe the underlying economic, social, and technological characteristics of what has come to be known as "social media".
Andrew Keen criticizes social media in his book The Cult of the Amateur, writing, "Out of this anarchy, it suddenly became clear that what was governing the infinite monkeys now inputting away on the Internet was the law of digital Darwinism, the survival of the loudest and most opinionated. Under these rules, the only way to intellectually prevail is by infinite filibustering."
There are various statistics that account for social media usage and effectiveness for individuals worldwide. Some of the most recent statistics are as follows:
· Social networking now accounts for 11% of all time spent online in the US.
· A total of 234 million people age 13 and older in the U.S. used mobile devices in December 2009.
· Twitter processed more than one billion tweets in December 2009 and averages almost 40 million tweets per day.
· Over 25% of U.S. internet page views occurred at one of the top social networking sites in December 2009, up from 13.8% a year before.
· Australia has some of the highest social media usage statistics in the world. In terms of Facebook use Australia ranks highest with almost 9 hours per month from over 9 million users.

source:Wikepedia

Wednesday, October 13, 2010

Social media

Social media are media for social interaction, using highly accessible and scalable publishing techniques. Social media uses web-based technologies to turn communication into interactive dialogues. Andreas Kaplan and Michael Haenlein define social media as "a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, which allows the creation and exchange of user-generated content."Businesses also refer to social media as consumer-generated media (CGM). Social media utilization is believed to be a driving force in defining the current time period as the Attention Age. A common thread running through all definitions of social media is a blending of technology and social interaction for the co-creation of value.

source:Wikipedia

Tuesday, October 12, 2010

Apple trademark protections

On September 26, 2006, it was reported that Apple started to crack down on businesses using the acronym "POD", in product and company names. Apple sent a cease-and-desist order that week to Podcast Ready, Inc., which markets an application known as "myPodder". Lawyers for Apple contended that the term "pod" has been used by the public to refer to Apple's music player so extensively that it falls under Apple's trademark cover. It was speculated that such activity was part of a bigger campaign for Apple to expand the scope of its existing iPod trademark, which included trademarking "IPODCAST", "IPOD", and "POD". On November 16, 2006, the Apple Trademark Department stated that Apple does not object to third party usage of "the generic term" "podcast" to refer to podcasting services and that Apple does not license the term. However, no statement was made whether Apple believes they hold rights to it.

source:Wikepedia

Friday, October 8, 2010

Trademark applications

February 10, 2005, Shae Spencer Management LLC of Fairport, New York filed a trademark application to register podcast for an "online prerecorded radio program over the internet". On September 9, 2005, the United States Patent and Trademark Office rejected the application, citing Wikipedia's podcast entry as describing the history of the term. The company amended their application in March, 2006, but the USPTO rejected the amended application as not sufficiently differentiated from the original. In November, 2006, the application was marked as abandoned.
As of September 20, 2005, known trademarks that attempted to capitalize on podcast include: Podcast Realty, GuidePod, PodGizmo, Pod-Casting, MyPod, Podvertiser, Podango, ePodcast, PodCabin, Podcaster, PodcastPeople, PodShop, PodKitchen, Podgram, GodPod and Podcast. By February 2007, there had been 24 attempts to register trademarks containing the word "PODCAST" in United States, but only "PODCAST READY" from Podcast Ready, Inc. was approved.

source:Wikepedia

Thursday, October 7, 2010

History of podcasting

Podcasting began to catch hold with the public in late 2004, though during the 1998–2001 dot-com era there were multiple "podcasts" done by major companies, such as Real Networks and ESPN.com. Many individuals and groups contributed to the emergence and popularity of podcasts. Adam Curry is credited with coming up with the idea to automate the delivery and syncing of textual content to portable audio players, and the first application to make this process feasible was iPodderX, developed by August Trometer and Ray Slakinski. Since the 1930's there have been radio talk shows and news programs. Today through the evolution of the internet TCP capabilities, cheaper hardware and software, audio podcasts are doing what was historically done through radio broadcast stations.
In June 2005, Apple released iTunes 4.9 with native support for podcasts. While this made receiving podcasts more convenient, it effectively ended advancement of the podcast medium by independent developers. To add to the cooling factor, Apple issued Cease and Desist orders to many podcast application developers and service providers for using the term "iPod" or "Pod" in the name of their product.

source:Wikepedia

Wednesday, October 6, 2010

Podcast

The term "podcasting" was first mentioned by Ben Hammersley in The Guardian newspaper in a February 2004 article, along with other proposed names for the new medium. It is a portmanteau of the words "pod"— from the name of Apple's portable media player, iPod—and "broadcasting". The name may be misleading, as despite the etymology it has never been necessary to use an iPod, or, indeed, any other form of portable media player, to use podcasts; the content can be accessed using any computer that can play media files. Use of the term "podcast" predates the addition of native support for podcasting to the iPod, or to Apple's iTunes software. To avoid a term suggestive of "iPod", some use the term netcast instead of podcast, such as the TWiT.tv podcaster Leo Laporte. A backronym has been posited where podcast stands for "personal on demand broadcast.


source:Wikepedia

Tuesday, October 5, 2010

Wedcast

A wedcast is a webcast of a wedding. It allows family and friends of the couple to watch the wedding in real time on the Internet. It is sometimes used for weddings in exotic locations, such as Cancun and the Riviera Maya, Hawaii or the Caribbean, for which it is very expensive or difficult for people to travel to see the wedding in person.
Webcasting a funeral is also a service provided by some funeral homes. Although it has been around for a decade, cheaper broadband, the financial strain of travel, and deployments to Iraq and Afghanistan have all lead to a recent increase in this phenomenon.

source:Wikepedia

Monday, October 4, 2010

Webcast Examples

Virtually all the major broadcasters have a webcast of their output, from the BBC to CNN to Al Jazeera to UNTV in television to Radio China, Vatican Radio, United Nations Radio and the World Service in radio.
The earliest webcast equivalent of an online concert and one of the earliest examples of webcasting itself was by Apple Computer's Webcasting Group in partnership with the entrepreneurs Michael Dorf and Andrew Rasiej. Together with David B. Pakman from Apple, they launched the Macintosh New York Music Festival from July 17 - July 22, 1995. This event audio webcasted concerts from more than 15 clubs in New York City. Apple later webcasted a concert by Metallica on June 10, 1996 live from Slim's in San Francisco.
In 1996, Apple webcasted the Recording Academy GRAMMY awards.
On August 13, 1998, it is generally believed the first webcast wedding took place, between Alan K'necht and Carrie Silverman in Toronto Canada.
A notable webcast took place in September 1999 to launch NetAid, a project to promote Internet use in the world's poorest countries. Three high profile concerts were to be broadcast simultaneously on the BBC, MTV and over the Internet: a London concert at Wembley Stadium featuring the likes of Robbie Williams and George Michael; a New York concert featuring Bono of U2 and Wyclef Jean; and a Geneva concert.
More recently, Live8 (AOL) claimed around 170,000 concurrent viewers (up to 400 Kbit/s) and the BBC received about the same (10 Gbit/s) on the day of the 7 July 2005 bombings in London. The growth of webcast traffic has roughly doubled, year on year, since 1995 and is directly linked to broadband penetration.
The first free Sunday morning webcast of a live worship service in the United States was initiated in January 2005 at Wekiva Presbyterian Church of Longwood, FL; this webcast ministry is ongoing.
Connecting Media was one of the first companies to do live webcasting using a special IFP Van (Internet Field Production) dedicated to webcasting.
Today, webcasts are being used more frequently and by novice users. Live webcasts enable the viewing of presentations, business meetings, and seminars etc. for those that telecommute rather than attend. Such sites offer live broadcasting as an affordable alternative to attending physical public speaking events expanding the viewing audience to anyone that has an internet connection. Other live webcasts are held completely online independent of any offline component. Webcast content network sites can enable users to find content that interests them by searching the site.
Private users can use social webcast forums such as YouTube or commercial webcast forums such as BrightTALK. Usually no sophisticated technical experience or equipment is required and content (usually limited to 10 or 30 minutes) can simply be uploaded.
Live sporting events, both local and national, have also quickly become frequent webcast subjects. With regard to smaller events such as Little League, amateur sports, small college sports, and high school sports, webcasting allows these events to have full audio or video coverage online when they may not be able to book standard radio or TV time. Websites like Meridix Webcast Network, Texas Sports Radio Network, SportsJuice, and others allow local schools, teams, and broadcasters to produce their own webcasts, which also have the advantage of being accessible to anyone with an internet connection (i.e. relatives several states away), unlike the range and market limitations of terrestrial radio and TV.

source:Wikepedia

Sunday, October 3, 2010

Webcast Origins

"Webcasting" was first publicly described and presented by Brian Raila of GTE Laboratories at InterTainment '89, 1989, held in New York City, USA. Raila recognized that a viewer/listener need not download the entirety of a program to view/listen to a portion thereof, so long as the receiving device ("client computer") could, over time, receive and present data more rapidly than the user could digest the same. Raila used the term "buffered media" to describe this concept.
Raila was joined by James Paschetto of GTE Laboratories to further demonstrate the concept. Paschetto was singularly responsible for the first workable prototype of streaming media, which Raila presented and demonstrated at the Voice Mail Association of Europe 1995 Fall Meeting of October, 1995, in Montreux, Switzerland. Alan Saperstein (Visual Data, now known as Onstream Media (Nasdaq:ONSM), was the first company to feature video webcasting in June 1993 with HotelView, a travel library of two minute videos featuring thousands of hotel properties worldwide.
On November 7, 1994, WXYC, the college radio station of the University of North Carolina at Chapel Hill became the first radio station in the world to broadcast its signal over the internet.
The term webcasting was coined (in the early/mid 1990s) when webcast/streaming pioneers Mark Cuban (Audionet), Howard Gordon (Xing Technologies), William Mutual (ITV.net), Craig Schmieder (Applied Media Resources) and Peggy Miles (InterVox Communications) got together with a community of webcasters to pick a term to describe the technology of sending audio and video on the Net...that might make sense to people. The term netcasting was a consideration, but one of the early webcast community members owned a company called NetCast, so that term was not used, seeking a name that would not be branded to one company. Discussions were also conducted about the term with the National Association of Broadcasters for their books - Internet Age Broadcaster I and II, written by Peggy Miles and Dean Sakai.
The actual word "webcast" was coined by Daniel Keys Moran in his 1988 novel The Armageddon Blues:

source:Wikepedia

Saturday, October 2, 2010

Webcast

A webcast is a media file distributed over the Internet using streaming media technology to distribute a single content source to many simultaneous listeners/viewers. A webcast may either be distributed live or on demand. Essentially, webcasting is “broadcasting” over the Internet.
The largest "webcasters" include existing radio and TV stations, who "simulcast" their output, as well as a multitude of Internet only "stations". The term webcasting usually refers to non-interactive linear streams or events. Rights and licensing bodies offer specific "webcasting licenses" to those wishing to carry out Internet broadcasting using copyrighted material.
Webcasting is also used extensively in the commercial sector for investor relations presentations (such as Annual General Meetings), in E-learning (to transmit seminars), and for related communications activities. However, webcasting does not bear much, if any, relationship to web conferencing, which is designed for many-to-many interaction.
The ability to webcast using cheap/accessible technology has allowed independent media to flourish. There are many notable independent shows that broadcast regularly online. Often produced by average citizens in their homes they cover many interests and topics. Webcasts relating to computers, technology, and news are particularly popular and many new shows are added regularly.

source:Wikepedia

Friday, October 1, 2010

Tips to make the Teleseminar Experience Good for Everyone continued…

8. Please refrain from typing or shuffling papers, talking to other people, doing the dishes or going to the toilet as we can hear you! (I have heard all of these happen on conference calls!).
9. Turn off mobiles, fax lines and other phone lines in the room if at all possible, as these will disrupt the call. (Turning off kids, dogs and other people would be great too! )
10. Feel free to ask questions - participation is how we get the greatest learning on the conference call. Whenever you speak please say your name first, then say what you want to say. Please be succinct and keep to the topic. It's great when everyone can be actively involved in the call, so please ensure you allow others space to share.
11. If you get disconnected for any reason, please just dial straight back in.
12. Come prepared to have fun and extend your knowledge!
13. If not a toll free number, It is your expense to phone into the bridge line. This will be the amount your long distance phone carrier charges. (If you don't have an unlimited long distance phone service, it is often cheaper to purchase calling cards which are often available from Post Offices and supermarkets).
14. If you are using a prepaid calling card, make sure you have ample minutes. Any warnings such as "you have one minute left" will most likely be heard by callers, plus you will have to disconnect and reconnect if you run out of time.

source:Wikepedia

Thursday, September 30, 2010

Tips to make the Teleseminar Experience Good for Everyone

1. Call the phone number you have been given for the teleseminar at the scheduled times. Make sure you clarify what time zone your conference call will be taking place.
2. Call from a regular land line or a headset phone. Please don't use a cell phone, an internet phone, or a speaker phone as these create problems including static and echos.
3. Disable your call waiting feature before calling in. Besides being disruptive, it can cause technical problems for the rest of the callers, if you take the second call while on the bridgeline.
4. Do not put the call on hold if you have music on hold. If you do, the other participants will hear your music until you return.
5. When you call, you may hear others on the line. Callers are greeted as they come on the line. Wait to be greeted before introducing yourself then say your name and where you are from. If I hear an echo come in with you I will ask you to hang up, count to 10 and call back in. This will usually clear the problem.
6. If you are late to your teleseminar, dial in and be silent until you are clear about what is going on in the call or for an instructor to greet you. If you leave the teleseminar early, do not announce you are leaving. Just hang up
7. Mimimize background noise by being in a quiet room. Please use your mute button if you have any noise going on, otherwise please use it sparingly - I like to know I'm not just talking to myself! If you do not have a mute button on your telephone you can mute yourself by hitting *6. When you wish to speak you can unmute yourself by hitting *6 again.

7 more tips tomorrow...

source:Wikepedia

Wednesday, September 29, 2010

Teleseminars Series

A TeleSeminar is similar to a normal face-to-face workshop -- some lecture, some questions, some discussion. It gives you the opportunity to learn and grow from other high performance people in different geographic locations and countries, thus broadening your outlook and network.
Sometimes you may simply attend a one-off stand alone session, normally of 60-75 minutes at other times you may attend a series. A series generally can have up to 24 sessions in it run either weekly or fortnightly
A series gives you an added advantage. Because of its on-going nature, you build a close relationship with your peers, over the phone, and you find that you challenge each other to apply what you have learned, brainstorm new ways of handling issues and set-up accountability structures that enables you to remain focused and on track - and phew all of this over the phone!
Your investment in TeleSeminars enables you to gain invaluable support, insight and wisdom not only from other Breakthrough Leaders, but your lead Facilitator.
A group teleseminar is one of the most time and cost effective methods for continuous leadership development. It gives you a wonderful opportunity to participate from wherever you are; no hassles in getting away from work or driving, parking, or doing your hair. All you need is a phone.
A Teleseminar is similar to a normal face-to-face workshop -- some lecture, some questions, some discussion. It gives you the opportunity to learn new tools and to learn from the other high performance people who are on the call: people, who are from different geographic locations and countries, thus broadening your outlook and network.
The information I will post tomorrow helps you give yourself the best chance of having a free-flowing experience on the call. With nothing distracting you, you'll be able to focus on your learning experience.

source:Wikepedia

Tuesday, September 28, 2010

Teleseminars

A Teleseminar is the ideal answer for the very busy leader who wants on-going growth in a group setting, yet can't get away from the office for days at a time.
A Group TeleSeminar is one of the most time and cost effective methods for continuous leadership development.
As you may have guessed, a TeleSeminar is a conference call. No travelling, or parking hassles and with the convenient choice of day or evening sessions. All you need is a phone. Since you can call in from anywhere this highly flexible way of learning is perfect for either intact teams who are on the go, or teams who are geographically dispersed, or people from varying organizations.

source:Wikepedia

Monday, September 27, 2010

Teleseminars

Teleseminars are used to provide information, training, or promote or sell products to group of people interested in a particular topic. They are similar to traditional seminars, in content and purpose, but they are given over a teleconference or bridgeline rather than at a specific location.
It is an emerging way to communicate, provide teletraining, and conduct business without the cost of travel. The host of the teleseminar will schedule a specific time and date in advance to communicate with his/her audience. The audience can vary in size from a few callers to 1,000 participants depending on the capacity of the bridgeline used and the popularity of the topic being discussed.
These conference calls are typically recorded. There is typically a fixed period of time devoted to the presentation of information followed by another fixed period of time for questions and answers.
Teleseminars provide an opportunity for a host to provide information to a large number of people at one time. It allows a trainer to train many participants at once, one on many rather than one on one. It also eliminates the need for travel, expensive preparation and presentation material costs. These factors make teleseminars a very cost effective delivery method.
Teleseminars can be free or have a cost associated with participation for the students. The cost will vary depending on the content being discussed and the organization hosting the call. Despite the participation fee, the advantage for students is this medium does not require the hassle and expense of traveling to a live seminar. Participants can join the teleconference from home or anywhere that there is a telephone connection.
After paying the fee, participants will receive a phone number and pass code for the call. If there is no charge for the teleseminar, the phone number and pass code may be distributed via email or may be available on the company’s website.

source:Wikepedia

Sunday, September 26, 2010

ILEC Duties

ILECs have the same duties of an LEC and in addition:
· Duty to negotiate - The duty to negotiate in good faith the particular terms and conditions of agreements to fulfill the duties described for an LEC and the specific ones for the ILEC. The requesting telecommunications carrier also has the duty to negotiate in good faith the terms and conditions of such agreements.
· Interconnection - The duty to provide, for the facilities and equipment of any requesting telecommunications carrier, interconnection with the LEC's network -
o For the transmission and routing of telephone exchange service and exchange access
o At any technically feasible point within the carrier's network
o That is at least equal in quality to that provided by the LEC to itself or to any subsidiary, affiliate or any other party to which the carrier provides interconnection
o On rates, terms and conditions that are just, reasonable and nondiscriminatory, in accordance with the terms and conditions of the agreement
· Unbundled access - The duty to provide, to any requesting telecommunications carrier for the provision of a telecommunications service, nondiscriminatory access to network elements on an unbundled basis at any technically feasible point on rates, terms and conditions that are just, reasonable and nondiscriminatory in accordance with the terms and conditions of the agreement. An ILEC shall provide such unbundled network elements in a manner that allows requesting carriers to combine such elements in order to provide such telecommunications service.
· Resale - The duty
o To offer for resale at wholesale rates any telecommunications service that the carrier provides at retail to subscribers who are not telecommunications carriers
o Not to prohibit, and not to impose unreasonable or discriminatory conditions or limitations on, the resale of such telecommunications service,
· Notice of changes - The duty to provide reasonable public notice of changes in the information necessary for the transmission and routing of services using that local exchange carrier's facilities or networks, as well as of any other changes that would affect the interoperability of those facilities and networks.
· Colocation - The duty to provide, on rates, terms and conditions that are just, reasonable and nondiscriminatory, for physical colocation of equipment necessary for interconnection or access to unbundled network elements at the premises of the local exchange carrier, except that the carrier may provide for virtual colocation if the LEC demonstrates that physical colocation is not practical for technical reasons or because of space limitations.

source:Wikepedia

Saturday, September 25, 2010

ILEC Definition

ILEC, with respect to an area in the United States, the local exchange carrier (LEC) that:
· On the date of enactment of the Telecommunications Act of 1996, provided telephone exchange service in such area
o And on such date of enactment, was deemed to be a member of the exchange carrier association pursuant to the Code of Federal Regulations (C.F.R) Title 47, section 69.601(b).
o Or is a person or entity that, on or after such date of enactment, became a successor or assignee of a member described in the previous bullet.
The Federal Communications Commission (FCC) may, by rule, provide for the treatment of an LEC (or class or category thereof) as an ILEC if:
· Such carrier occupies a position in the market for telephone exchange service within an area that is comparable to the position occupied by a carrier described in previously
· Such carrier has substantially replaced an ILEC described previously
· Such treatment is consistent with the public interest, convenience and necessity

source:Wikepedia

Thursday, September 23, 2010

Incumbent local exchange carrier

An ILEC, short for incumbent local exchange carrier, is a local telephone company in the United States that was in existence at the time of the break up of AT&T into the Regional Bell Operating Companies (RBOCs), also known as the "Baby Bells." The ILEC is the former Bell System or Independent Telephone Company responsible for providing local telephone exchange services in a specified geographic area. GTE was the second largest ILEC after the Bells, but it has since been absorbed into Verizon, an RBOC. ILECs compete with Competitive Local Exchange Carriers (CLEC). When referring to the technical communities ILEC is often used just to mean a telephone provider.
In Canada, the term ILEC refers to the original telephone companies such as Telus (BC Tel and AGT), SaskTel, Manitoba Telephone Systems (MTS Allstream), Bell Canada Enterprises and Aliant.

to be continued...

source:Wikepedia

Wednesday, September 22, 2010

Common causes of poor conference calls

There are three common causes of a poor quality conference call:
· People simply not showing up.
· Lack of familiarity with behaviour and protocol.
· Technology.
Each of these causes requires a different kind of corrective action. However, there is usually one primary root cause; for example, people may not be showing up because the technology does not work, or the technology may not work because people are not familiar with it.
Technology problems tend to fall into two kinds: lack of bandwidth and poor equipment. Again, it is worth checking which of these apply in the case of technology problems.

source:Wikepedia

Tuesday, September 21, 2010

Premium conferencing

Here participants dial in on a premium-rate number typically beginning with the prefix ‘09’, the conference call being hosted by anyone that adds value to the call in order to justify the premium rate element: this could be a celebrity, a sports personality, astrologer, lawyer, or expert in any given field. That person then receives the majority of the accrued revenue. Premium conferencing can also be used for charitable fundraiser.

source:Wikepedia

Monday, September 20, 2010

State legislation

Several long distance carriers lobbied the South Dakota legislature to propose legislation forbidding rural telephone carriers from entering into revenue-sharing agreements with traffic-pumped services. However, the legislation was defeated.

source:Wikepedia

Sunday, September 19, 2010

Court Rulings

Cases remain pending in several courts across the country, including federal courts in Iowa, South Dakota, Minnesota, Michigan, Kentucky, and New York. Several courts have recently asked the FCC for additional guidance on determining the appropriate rate that should be paid by the long distance carriers for calls directed to traffic-pumped services, calling it an area of regulation “in dynamic flux.

source:Wikepedia

Saturday, September 18, 2010

Federal Administrative Commission Rulings

In 1996, AT&T filed a Section 208 complaint with the FCC against Jefferson Telephone Company, a rural incumbent local exchange carrier (ILEC) based in Iowa, which entered into a commercial agreement with a chat-line provider. AT&T’s complaint alleged that Jefferson violated Section 201 of the Communications Act of 1934 because it “acquired a direct interest in promoting the delivery of calls to specific telephone numbers.” AT&T also argued that the access revenue-sharing arrangement with the chat-line provider was unreasonably discriminatory in violation of Section 202 of the Act, because Jefferson did not share revenues with all its customers. The FCC rejected both these arguments and denied AT&T’s complaint.
In 2002, the FCC issued two more orders, denying similar complaints by AT&T directed at LECs that shared access revenues with chat-line providers. In AT&T v. Frontier Communications, the Commission rejected AT&T’s allegations that “revenue-sharing arrangements” constituted unreasonable discrimination in violation of Section 202 or violations of the ILECs’ common carrier duties under Section 201(b).[19] In AT&T v. Beehive Telephone, the FCC again denied AT&T’s complaint against a LEC that engaged in a commercial relationship with a chat-line provider for the same reasons.
The FCC has more recently issued an order in a case involving an Iowa carrier relating to interstate calls (calls made from any state other than Iowa to an Iowa telephone number). In that order, the FCC determined that the Iowa carrier was not entitled to collect the entire amounts it billed to a long distance carrier, but that it was nevertheless entitled to some compensation. The exact amount of payment has not yet been fixed by the FCC.

source:Wikepedia

Friday, September 17, 2010

State Administrative Commission rulings

The Iowa Utilities Board recently issued its final order in a complaint proceeding brought by Qwest and intervened by AT&T and Sprint Nextel against eight rural telephone companies in Iowa. Except for one call blocking finding against Sprint, the decision was unfavorable for the rural carriers, which may have to return the fees they received for calls directed to traffic-pumped services by Iowa residents. However, damages have not yet been assessed and the Iowa Utilities Board does not have jurisdiction over the vast majority of disputed calls—those that were directed to Iowa from callers in other states—so the reach of its decision is limited. Moreover, the Board has indicated that it is reconsidering its decision and several appeals have been filed challenging the lawfulness of the Board’s order, thus it is not yet a final decision.
The FCC subsequently issued a ruling on this case

source:Wikepedia

Thursday, September 16, 2010

Role in dispute between AT&T and Google

The Google Voice telecommunications service offers a service similar to long-distance telephone calling at no cost, using VoIP to connect users with their calling destinations. In order to avoid paying high connection fees to traffic-pumping carriers, Google Voice has blocked calls to some of these carriers.
AT&T has appealed to the FCC to intervene, charging that Google Voice ought to be required to connect these calls just as plain old telephone service (POTS) carriers are required to do so. Google has responded that its service, and those of other VoIP providers such as Skype, is distinct from those of a traditional POTS common carrier, and that it should not be obligated to complete these calls. Google further charges that AT&T is trying to distract the FCC from concerns regarding network neutrality, and accuses AT&T of conducting regulatory capitalism, in which businesses exploit laws and regulations to stifle competition and slow innovation. Finally, Google urges the FCC to revise "outdated carrier compensation rules" to end the practice of traffic pumping.
AT&T has written to the FCC, stating that Google's blocking of calls to traffic pumping numbers gives it a substantial cost advantage over traditional carriers. AT&T further argues that the issue of network neutrality is highly relevant, since Google is violating its own statement of the principle of non-discrimination, that "a provider 'cannot block fair access' to another provider." AT&T agrees with Google that the FCC should act to forbid traffic pumping schemes in the first place, calling them "patently unlawful", but asks that Google be required to accept the same common carrier requirements even if they are not shut down.
A bipartisan group of U.S. Representatives has joined in AT&T's complaint, urging the FCC to investigate Google Voice's practice of blocking calls to high-fee rural local exchange carriers. Some of these legislators have received significant campaign contributions from AT&T, and represent districts where rural carriers profit from traffic pumping. Sam Gustin of DailyFinance suggests that there may be issues of conflict of interest and pork barrel politics involved in these legislators' efforts.

source:Wikepedia

Wednesday, September 15, 2010

Consequences of Traffic Pumping

End-users of traffic-pumped phone services often do not pay directly for the high fees collected by rural local carriers and service providers. Many wireless and land line customers now have unlimited long-distance plans, and thus the entire inflated cost of using these services is borne by their long-distance carrier. Providers of traffic-pumped conference calling service assert that these long-distances carriers still profit when their customers use traffic-pumped services.
In 2007, AT&T estimated that it would spend an additional $250 million to connect such calls, and has warned that it may have to raise its customers' calling plan prices unless regulators address the issue of traffic pumping. However, providers of traffic-pumped conference calls claim that AT&T has refused to provide evidence of these costs, and that it is a ploy by AT&T to leverage its market power to put competing conference calling providers out of business.
AT&T and other long-distance carriers have in some cases attempted to avoid these costs by blocking their customers from calling the phone numbers of traffic-pumping services. However, the FCC has forbidden common carriers from this kind of selective blocking, and so the long-distance carriers are essentially obligated to complete these calls.
Based upon an independent study of 50% of long distance calls originating on wireless networks in U.S., calls terminating to carriers meeting a traffic pumping profile were estimated to cost $95 million annually, representing 11% of all long distance costs in the study. Extending to all wireless service providers, the cost is estimated to be more than $190 million annually

source:Wikepedia

Tuesday, September 14, 2010

How Traffic Pumping works

Under the regulatory mechanisms of the Telecommunications Act of 1996, wireless and long distance carriers (such as AT&T, Sprint, or Verizon) pay access fees to local exchange carriers (LECs) for calls to those carriers' local subscribers. Rural carriers are allowed by the FCC to charge substantially higher access fees (as high as 10-20 cents/minute) than carriers in more urban areas, based on the rationale that they must pay for substantial fixed infrastructure costs while handling lower call volume.
In order to increase their incoming call volume, and thereby fees owed, rural carriers partner with certain telephone service providers to route their calls through the rural carrier. These services typically include phone sex and conference calling providers, which expect a high volume of incoming calls. Notably, these service providers do not need to establish a physical, local presence in order to route their calls in this way. Many of these companies are actually located in Los Angeles, California. As a consequence of this arrangement, the rural carriers can receive millions of dollars of fees, which they then share with the ostensibly "local" service providers, who are responsible for vastly increasing call volume above typical rural usage.
Many of the rural carriers participating in these schemes are located in Iowa, South Dakota and Minnesota.

source:Wikepedia

Monday, September 13, 2010

Traffic Pumping

Traffic pumping, also known as access stimulation, is a controversial practice by which some local exchange telephone carriers in rural areas of the United States inflate the volume of incoming calls to their networks, and profit from the greatly increased intercarrier compensation fees to which they are entitled by the Telecommunications Act of 1996.
As of March 2010, traffic pumping is the subject of an ongoing legal and regulatory dispute involving AT&T, Google Voice, rural phone carriers, and the U.S. Federal Communications Commission (FCC).

source:Wikepedia

Sunday, September 12, 2010

Free conference calling

Free conferencing is different from traditional conference calling where the organizer of the conference call pays either a flat rate fee or per minute charge or a mixture of both. It has no organizer fees and allows for multiple people to meet for the price of their long distance connections. Companies that provide free conference call services are usually compensated through traffic pumping arrangements, and consequently are subject to call blocking by some carriers. Calls to these seemingly free conference services and other reverse billing rate centers can be 20 times more expensive than a ‘normal’ call. In the United Kingdom the prefix 0870 system is used by UK-based free conference calling providers in order to receive a rebate from every call from telephone company that owns the number. However in April 2009 Ofcom, the independent regulator and competition authority for the UK communications industries, announced that the rebate that is payable to the telecom's supplier when an 0870 number is used would be removed. Removing the income stream for free conference call providers these providers had to find other ways to generate income in order to stay in business.

source:Wikepedia

Saturday, September 11, 2010

Prepaid conference calls

Prepaid conference call services allow businesses and individuals to purchase conferencing services online, and conduct conference calls on a pay-as-you-go basis. Typically, a conference call PIN and its associated calling instructions are displayed immediately online after being purchased and/or sent via email. Generally, prepaid conference call services are used with a landline telephone, mobile phone, or computer, and there is no need to buy additional expensive telecommunications hardware or add/switch long distance service. Some services allow you to start or join a conference call from virtually any country worldwide—with appropriate telephone access.
Large telecommunications providers such as AT&T, Embarq (formerly Sprint), Verizon and other large to medium conferencing service providers maintain a dominant position in the conferencing niche; servicing many of the World's biggest brands. However, the Internet and improved global VoIP networks have helped to significantly reduce the barrier of entry into this niche.

source:Wikepedia