第一篇:翻譯網(wǎng)站集
翻譯網(wǎng)站集
特別推薦1:http:///mt?open&t=grp=word2word
http://http://babelfish.altavista.com/http://可翻譯成中文的網(wǎng)站:
http://www.tmdps.cn/default.asp英語、日語、繁體
http://165net.com/英語、日語、俄語、德語
http://www.translate.ru/eng/srvurl.asp法、德、俄等互譯
第二篇:翻譯網(wǎng)站集
翻譯網(wǎng)站集 特別推薦1:http:///mt?open&t=grp=Word2Word http://http://babelfish.altavista.com/http://可翻譯成中文的網(wǎng)站: http://www.tmdps.cn/default.asp英語、日語、繁體 http://165net.com/英語、日語、俄語、德語 http://www.translate.ru/eng/srvurl.asp法、德、俄等互譯
第三篇:翻譯網(wǎng)站
(1)句庫(kù)
網(wǎng)址:http:///
翻譯的非常好,基本上都能找到自己所需的,同時(shí)也可以發(fā)音,這有利于提高自己的專業(yè)英語聽力!
舉例:
翻譯 first principles
在第4個(gè)清楚的給出了”第一原理“的解釋!
(2)詞博
網(wǎng)址:http:///
翻譯的很雜,可以供多種選擇;而且可以發(fā)音,這一點(diǎn)感覺很好!
舉例: 翻譯 first principles
沒有找到確切的”第一原理“的翻譯,但是其他詞匯的翻譯還好!
(3)句譯
網(wǎng)址:http:///viewPage.php
翻譯的很好,基本你都可以在他的翻譯中找到合適的!
舉例: 翻譯 first principles
first principle)
翻譯結(jié)果非常好!它給出10個(gè)例句,結(jié)果又8個(gè)符合我們的要求,而且給出的例句非常有用,完全是文獻(xiàn)里摘出來的!!
4)詞都
查詞也還算不錯(cuò),并且給出很多來自文獻(xiàn)的例句,非常不錯(cuò)!
舉例: 翻譯 first principles
給出了“第一原理”的翻譯,而且給出了很多直接來自文獻(xiàn)的例句,有些都是長(zhǎng)句。并且給出一些參考詞頭,進(jìn)行詞語聯(lián)系,這個(gè)特點(diǎn)非常有用!
第四篇:網(wǎng)站遠(yuǎn)程管理外文翻譯
湖北大學(xué)本科畢業(yè)論文(設(shè)計(jì))外文翻譯
外文翻譯:
淺談網(wǎng)絡(luò)中的遠(yuǎn)程控制
原文來源:
Rabiner, L.R.;Gold, B.Englewood Cliffs, N.J., Prentice-Hall, Inc., 2009 p.譯文正文:
摘要:在網(wǎng)絡(luò)高速發(fā)展的今天,隨著計(jì)算機(jī)應(yīng)用的普及,遠(yuǎn)程控制也逐漸被人們所關(guān)注。遠(yuǎn)程控制是網(wǎng)絡(luò)的一大優(yōu)勢(shì),在網(wǎng)絡(luò)管理、遠(yuǎn)程協(xié)作、遠(yuǎn)程辦公等計(jì)算機(jī)領(lǐng)域都有著廣泛的應(yīng)用,它進(jìn)一步克服了由于地域性的差異而帶來的操作中的不便性,使得網(wǎng)絡(luò)的效率得到了更大的發(fā)揮。遠(yuǎn)程控制可通過多種方法加以實(shí)現(xiàn)。關(guān)鍵詞:遠(yuǎn)程控制;遙控操作;技術(shù)應(yīng)用;實(shí)現(xiàn)方法 計(jì)算機(jī)遠(yuǎn)程控制
計(jì)算機(jī)遠(yuǎn)程控制是在網(wǎng)絡(luò)上由一臺(tái)電腦(主控端Remote/客戶端)遠(yuǎn)距離去控制另一臺(tái)電腦(被控端Host/J]服務(wù)器端)的技術(shù)?。這里的遠(yuǎn)程不是字面意思的遠(yuǎn)距離,而是指通過網(wǎng)絡(luò)來對(duì)遠(yuǎn)端的計(jì)算機(jī)實(shí)施遙控。
遠(yuǎn)程控制只是通過網(wǎng)絡(luò)來操縱計(jì)算機(jī)的一種手段而已,只要運(yùn)用得當(dāng),操縱遠(yuǎn)程的計(jì)算機(jī)也就如同你操縱眼前正在使用的計(jì)算機(jī)一樣沒有任何區(qū)別。當(dāng)操作者使用主控端電腦控制被控端電腦時(shí),就如同坐在被控端電腦的屏幕前一樣,可以啟動(dòng)被控端電腦的應(yīng)用程序,可以使用被控端電腦的文件資料,甚至可以利用被控端電腦的外部打印設(shè)備和通信設(shè)備來進(jìn)行打印和訪問互聯(lián)網(wǎng)。在這個(gè)過程中主控端電腦只是將鍵盤和鼠標(biāo)的指令傳送給遠(yuǎn)程電腦,同時(shí)將被控端電腦的屏幕畫面通過通信線回傳過來。也就是說,我們控制被控端電腦進(jìn)行操作似乎是在眼前的電腦上進(jìn)行的,實(shí)質(zhì)是在遠(yuǎn)程的電腦中實(shí)現(xiàn)的,不論打開文件,還是上網(wǎng)瀏覽、下載,所有的資料和上網(wǎng)等都是存儲(chǔ)在遠(yuǎn)程的被控端電腦中的。
實(shí)行遠(yuǎn)程控制,實(shí)際上就是一個(gè)服務(wù)器程序(以下簡(jiǎn)稱被控程序)和一個(gè)客戶程序(以下簡(jiǎn)稱主控程序),被控方即為服務(wù)器程序,它監(jiān)聽客戶的請(qǐng)求,并做出處理;主控方即為客戶程序,它連接上服務(wù)器后,發(fā)出自己的請(qǐng)求,服務(wù)器便根據(jù)客戶的請(qǐng)求做出不同的響應(yīng)。遠(yuǎn)程控制系統(tǒng)組成如圖1所示。
當(dāng)今的遠(yuǎn)程控制技術(shù)支持的網(wǎng)絡(luò)方式有:LAN、WAN、撥號(hào)方式、互聯(lián)網(wǎng)方式。此外,有的遠(yuǎn)程控制軟件還支持通過串口、并口、紅外端口來對(duì)遠(yuǎn)程機(jī)進(jìn)行控制。遠(yuǎn)程控制克服了由于地域性的差異而帶來的操作中的不便性,使得網(wǎng)絡(luò)的效率得到了更大的發(fā)揮。
2遠(yuǎn)程控制的技術(shù)實(shí)現(xiàn)
2.1遠(yuǎn)程控制的原理
“只要網(wǎng)絡(luò)有通路就可以實(shí)現(xiàn)遠(yuǎn)程控制”,遠(yuǎn)程控制必須通過網(wǎng)絡(luò)才能進(jìn)行。位于本地的、已被安裝了客戶端程序的主控端是操縱指令的發(fā)出端,它像一個(gè)普通客戶一樣向非本地、安裝了服務(wù)器端程序的被控端發(fā)出信號(hào),建立并通過一個(gè)特殊的遠(yuǎn)程服務(wù),使用各種遠(yuǎn)程控制功能發(fā)送遠(yuǎn)程控制命令,控制被控端電腦中的各種應(yīng)用程序運(yùn)行,使得被控端按照主控端的 要求進(jìn)行各種操作,從而實(shí)現(xiàn)遠(yuǎn)程控制的目的。圖2遠(yuǎn)程控制示意圖
湖北大學(xué)本科畢業(yè)論文(設(shè)計(jì))外文翻譯
通過網(wǎng)絡(luò)實(shí)現(xiàn)的遠(yuǎn)程控制示意圖如圖2所示。
2.2遠(yuǎn)程控制實(shí)現(xiàn)方法
2.2.1 利用微軟Windows XP系統(tǒng)中遠(yuǎn)程控制功能
每臺(tái)Windows XP電腦都同時(shí)包括客戶端和服務(wù)器端,也就是說它既可以當(dāng)成客戶端來連接其他的Windows XP電腦,也可以將自己當(dāng)成服務(wù)器端,讓別的電腦來控制自己。服務(wù)器端的系統(tǒng)都是使用Windows XP,而客戶端就可以是Windows XP、Windows 2000或者Windows Me,并且對(duì)客戶端沒有語言的限制。用戶可以利用遠(yuǎn)程桌面通過網(wǎng)絡(luò)對(duì)遠(yuǎn)程計(jì)算機(jī)進(jìn)行控制,控制后可以訪問所有應(yīng)用程序、文件和網(wǎng)絡(luò)資源等。
2.2.2利用一些功能強(qiáng)大的遠(yuǎn)程控制軟件。
遠(yuǎn)程控制技術(shù)發(fā)展到今天,產(chǎn)生了許多優(yōu)秀的遠(yuǎn)程控制軟件,有提供多層次安全防護(hù)的遠(yuǎn)程遙控軟件,還有加速遠(yuǎn)程遙控操作軟件,以及更加利于快速文檔傳送的控制軟件。還有如“RemotelyAnywhere”只需在服務(wù)器端一次性安裝,客戶端在網(wǎng)絡(luò)中不需要再增加任何軟件,就可以直接通過瀏覽器來對(duì)服務(wù)器進(jìn)行遠(yuǎn)程控制。它不僅僅只是讓客戶端能夠遠(yuǎn)程控制服務(wù)器的桌面,還可以給多個(gè)用戶設(shè)置不同的權(quán)限,以便讓他們根據(jù)授權(quán)對(duì)服務(wù)器的文件管理器、注冊(cè)表等項(xiàng)目進(jìn)行查詢和管理;它允許服務(wù)器和客戶端之間傳遞剪貼板,也可實(shí)現(xiàn)普通文檔的傳送。另外,一些集遠(yuǎn)程控制、數(shù)據(jù)通信和文件傳輸?shù)裙δ苡谝惑w,具有很高的數(shù)據(jù)傳輸效率和系統(tǒng)安全保障的遠(yuǎn)程控制系統(tǒng)正在被推廣。
2.2.3根據(jù)實(shí)際需求開發(fā)實(shí)現(xiàn)遠(yuǎn)程控制
自行開發(fā)實(shí)現(xiàn)遠(yuǎn)程控制,涉及主控機(jī)和受控機(jī),故采用Client/Server結(jié)構(gòu)。可以用Delphi編程環(huán)境分別在兩臺(tái)不同的電腦上編制控制和被控制程序,一個(gè)為Clientdpr.exe,裝在受控機(jī)上;另一個(gè)為Serverdpr.exe,裝在主控機(jī)上。Serverdpr.exe指定要監(jiān)視的受控機(jī)的IP地址和發(fā)送指令給客戶機(jī)的Clientdpr.exe,客戶機(jī)的Clientdpr.exe得到指令后,接著在本機(jī)執(zhí)行相應(yīng)指令,將結(jié)果返回給主控機(jī)。主控方的功能是這樣實(shí)現(xiàn)的:讀取命令串一將命令串轉(zhuǎn)換成數(shù)組一清除內(nèi)存流一指定目標(biāo)計(jì)算機(jī)(通過讀取所輸入的IP地址)一將指令碼發(fā)送給目標(biāo)計(jì)算機(jī)。當(dāng)主控機(jī)將指令發(fā)給受控機(jī)后,受控機(jī)將在本機(jī)上調(diào)用Windows的應(yīng)用程序接口API函數(shù)以執(zhí)行所接收的指令。當(dāng)受控機(jī)接收到數(shù)據(jù)時(shí),便開始執(zhí)行主控機(jī)發(fā)送的操作。具體操作是這樣的:讀取控制碼_+識(shí)別控制碼一執(zhí)行相應(yīng)的過程或API函數(shù)以達(dá)到相應(yīng)的功能。結(jié)束語
遠(yuǎn)程控制雖然可以方便地操縱遠(yuǎn)程計(jì)算機(jī),給人們帶來很多便利,但它也會(huì)由此帶來安全方面的隱患。隨著遠(yuǎn)程控制市場(chǎng)的成熟,網(wǎng)絡(luò)安全變得越發(fā)重要,只有徹底解決這一關(guān)鍵問題,才能促進(jìn)遠(yuǎn)程控制真正走向應(yīng)用。
湖北大學(xué)本科畢業(yè)論文(設(shè)計(jì))外文翻譯
Remote control of network
Abstract: The rapid development of the network today, with the popularization of computer applications, remote control have gradually been of concern to the people.Network remote control is a major advantage in network management, remote collaboration, remote office and other computer fields have a wide range of applications, it further to overcome regional differences in the operation brought the inconvenience, making the network efficiency Given greater play.Remote control can be achieved through a variety of ways.Keywords: remote control;remote operation;technology;Implementation 1 computer remote control
Computer remote control is on the network by a computer(host Remote / Client)remote to control another computer technology.Here is not the literal meaning of the long-distance remote, but rather through the network to the remote computer on the implementation of remote control.Remote control is to manipulate the computer through the network as a means only, if used properly, will control the remote computer as you manipulate the front of the computer being used as there is no difference.When the operator using the host computer control host computer to host computer as if sitting in front of the screen as the computer can start the host application, you can use the host computer documentation, or even Host computer using the external printing device and communications equipment to print and access the Internet.In this process, host computer is just a keyboard and mouse commands sent to the remote computer, while host computer's screen image come through the communication line return.That is, we control the host computer to operate in front of the computer seems to be carried out, in essence, a remote computer to achieve, whether to open the file, or Web browsing, downloading, all the information and the Internet are all Stored in the remote host computer.Implementation of remote control, in fact, a server program(hereinafter referred to as charged program)and a client(hereinafter referred to as master control program), the prosecution is the server program that listens to customer requests, and to deal with it;Master Is the client side, it is connected to the server, to make their request, the server will be made according to customer's request a different response.Remote control system shown in Figure 1.Today's technical support network remote control methods are: LAN, WAN, dial-up Internet way.In addition, some remote control software also supports serial, parallel, infrared port to control a remote machine.Remote control to overcome regional differences in the operation brought the inconvenience, make the network to play a greater efficiency.2 remote control technology 2.1 Principles of remote control
“As long as the network has access to connect remote control ”, remote control must be carried out through the network.At local, has been installed, the host is a client program to issue control instructions side, it is the same as an ordinary customer to non-local, the installation of the host server program signals, and through the establishment of a special Remote service, using a variety of remote control function to send a remote control command, control, host computers running various applications, making the host in accordance with the master's
湖北大學(xué)本科畢業(yè)論文(設(shè)計(jì))外文翻譯
Requirements for various operations, in order to achieve the remote control.Figure 2 Schematic diagram of the remote control
Remote control through the network diagram shown in Figure 2.2.2Implementation of Remote Control 2.2.1 Microsoft Windows XP system using the remote control function
Windows XP computers each include both client and server side, meaning that both can be used as a client to connect to other Windows XP computer, you can also themselves as the server side, so that other computer to control themselves.Server systems are using Windows XP, the client can be Windows XP, Windows 2000 or Windows Me, and the client without language restrictions.Users can use the Remote Desktop computer through the network to the remote control, after controlling for access to all applications, files and network resources.2.2.2 using some powerful remote control software.Remote control technology to today, have a lot of great remote control software, providing multi-level security protection for remote control software, as well as speed up the remote control operating software, and more conducive to the rapid document transmission control software.Also, as “RemotelyAnywhere” just a one-time installation on the server side, the client in the network do not need to add any software to connect directly through the browser on the server for remote control.It is not just the client to remotely control the server's desktop, but also can set different permissions for multiple users so that they are under the authority of the server's file manager, registry, query and manage projects;it allows the server and Clipboard passed between the client can also be transmitted to achieve common document.In addition, some set of remote control, data communications and file transfer and other functions into one, with high data transmission efficiency and system security remote control system is being promoted.2.2.3 Development and implementation of the actual needs of the remote control
Develop their own remote control, involving the host computer and controlled machines, so the use of Client / Server structure.Delphi programming environment can be used separately on two different computers to be controlled preparation of control and procedures, one for Clientdpr.exe, installed in the controlled machine;one for Serverdpr.exe, installed in the main computer on.Serverdpr.exe designated to monitor the controlled machine IP address and send instructions to the client Clientdpr.exe, client Clientdpr.exe get command, and then execute the corresponding instructions in the machine, the results are returned to the host computer.Master side function is implemented as follows: Read command string into a string array of commands to clear the memory of a stream to a specified target computer(by reading the entered IP address)to send the script to a target computer.When the command sent to the host computer controlled machine, the machine will be controlled on the unit's application program interface calls Windows API functions to perform the received command.When the controlled unit receives the data, they begin to send the host computer operation.To do this: Read identification control code _ + implementation of the corresponding control code for a procedure or function to achieve the appropriate API function.3 Conclusion
Although the remote control can easily manipulate the remote computer, to bring a lot of convenience, but it also the resulting security risks.As the market matures remote control, network security becomes more important, only solve this critical issue, to really go for remote
control applications.
第五篇:社交網(wǎng)站_外文翻譯
社交網(wǎng)站
我們定義的社交網(wǎng)絡(luò)站點(diǎn)作為基于Web的服務(wù),允許個(gè)人:(1)有界系統(tǒng)內(nèi)構(gòu)建一個(gè)公共或半公共的配置文件。(2)闡明列表中的其他用戶,與他們共享一個(gè)連接。
(3)查看和遍歷他們的名單和那些由其他系統(tǒng)內(nèi)的連接。性質(zhì)和命名這些連接可能會(huì)有所不同,從站點(diǎn)到站點(diǎn)。
雖然我們使用的術(shù)語―社交網(wǎng)站‖來形容這種現(xiàn)象,―社交網(wǎng)站‖也出現(xiàn)在公共話語中,經(jīng)常交替使用這兩個(gè)術(shù)語。我們選擇不采用―聯(lián)網(wǎng)‖的原因有兩個(gè):重點(diǎn)和范圍。―物聯(lián)網(wǎng)‖強(qiáng)調(diào)關(guān)系啟動(dòng),往往陌生人之間。雖然網(wǎng)絡(luò)是可能在這些網(wǎng)站上,它是不是主要的做法,他們中的許多,也不是有什么區(qū)別他們從其他形式的計(jì)算機(jī)中介傳播(CMC)。
是什么讓獨(dú)特的社交網(wǎng)站并不是說他們?cè)试S個(gè)人見陌生人,而是他們讓使用者能夠表達(dá),使人們看到他們的社交網(wǎng)絡(luò)。這可能會(huì)導(dǎo)致個(gè)人之間的連接,否則不會(huì)進(jìn)行,但往往不是我們的目標(biāo),而這些會(huì)議之間―的潛在關(guān)系‖(Haythornthwaite,2005年)誰分享一些脫機(jī)連接頻繁。許多大型SNS網(wǎng)站,參與者不一定―網(wǎng)絡(luò)‖或?qū)ふ遥詽M足新的人,相反,它們是人誰已經(jīng)擴(kuò)展社交網(wǎng)絡(luò)的一部分,他們的主要溝通。為了強(qiáng)調(diào)這一點(diǎn)明確的社會(huì)網(wǎng)絡(luò),這些網(wǎng)站作為一個(gè)重要的組織特征,我們將它們標(biāo)記―社交網(wǎng)站‖。
雖然SNS網(wǎng)站已經(jīng)實(shí)施了各種各樣的技術(shù)特點(diǎn),他們的骨干組成可見型材顯示鉸接式的Friends1誰也系統(tǒng)的用戶列表。配置文件是獨(dú)特的網(wǎng)頁,人們可以―輸入自己的應(yīng)運(yùn)而生‖(松登,2003年,第3頁)。在加入一個(gè)SNS,一個(gè)人被要求填寫表格,包含了一系列的問題。回答這些問題,這些問題通常包括描述符,如年齡,位置,興趣,和一個(gè)―關(guān)于我‖一節(jié)使用該配置文件。大多數(shù)網(wǎng)站還鼓勵(lì)用戶上傳的個(gè)人資料照片。有些網(wǎng)站允許用戶添加多媒體內(nèi)容,或修改他們的個(gè)人資料的外觀和感覺,以提高他們的檔案。其他,如Facebook,允許用戶添加模塊(―應(yīng)用程序‖),提高他們的個(gè)人資料。
在一個(gè)檔案中的知名度不同的網(wǎng)站,并根據(jù)用戶的自由裁量權(quán)。默認(rèn)情況下,型材Friendster和Tribe.net被搜索引擎抓取,使他們的人看到,無論是否觀眾有一個(gè)帳戶。另外,LinkedIn的控制的基礎(chǔ)上,他或她是否有付費(fèi)帳戶,觀眾可能會(huì)看到什么。像MySpace允許用戶來選擇他們是否希望他們的個(gè)人資料,以成為公眾或―朋友只。‖F(xiàn)acebook的一個(gè)不同的方法默認(rèn)情況下,誰是在相同的―網(wǎng)絡(luò)‖的一部分用戶可以查看對(duì)方的輪廓,除非一個(gè)輪廓所有者已決定拒絕那些在其網(wǎng)絡(luò)的權(quán)限。結(jié)構(gòu)變化的可視性和訪問社交網(wǎng)站區(qū)別于對(duì)方的主要方式之一。
加入一個(gè)社交網(wǎng)絡(luò)站點(diǎn)后,會(huì)提示用戶識(shí)別系統(tǒng)與他們有關(guān)系的人在。這些關(guān)系的不同而有所不同的標(biāo)簽對(duì)網(wǎng)站熱門詞匯,包括―朋友‖,―聯(lián)系人‖和―粉絲‖,大多數(shù)SNS網(wǎng)站需要雙向確認(rèn)的友誼,但有些則沒有。這些單向的關(guān)系有時(shí)會(huì)標(biāo)示為―粉絲‖或―關(guān)注‖,但許多網(wǎng)站稱這些朋友。
―朋友‖一詞是誤導(dǎo),因?yàn)檫B接并不一定意味著在日常白話感的友誼,人們連接的原因是多種多樣的(博伊德,2006A)。
公共顯示器的連接是SNS網(wǎng)站的重要組成部分。好友列表中包含鏈接到每個(gè)朋友的個(gè)人資料,使觀眾通過點(diǎn)擊好友列表遍歷網(wǎng)絡(luò)圖。在大多數(shù)網(wǎng)站,好友列表是可見的人誰被允許查看配置文件,但也有例外。例如,一些MySpace的用戶已經(jīng)破解隱藏好友顯示他們的個(gè)人資料,LinkedIn允許用戶選擇退出顯示其網(wǎng)絡(luò)。
大多數(shù)SNS網(wǎng)站還提供了一種機(jī)制,用戶朋友的個(gè)人資料上留下消息。此功能通常涉及離開―的評(píng)論,‖雖然網(wǎng)站使用此功能的各種標(biāo)簽。此外,SNS網(wǎng)站往往有一個(gè)私人消息功能類似的webmail。雖然私人消息和評(píng)論上流行的主要SNS網(wǎng)站,他們尚未普及。
并非所有的社交網(wǎng)絡(luò)網(wǎng)站等開始。
QQ作為中國(guó)的即時(shí)通訊服務(wù),LunarStorm開始作為一個(gè)社區(qū)網(wǎng)站,賽我網(wǎng)作為韓國(guó)的討論區(qū)工具,以及環(huán)訊(原Skyblog)的加入SNS功能,是法國(guó)前博客服務(wù)。
Classmates.com,學(xué)校聯(lián)營(yíng)公司在1995年推出的一個(gè)目錄,開始支持SNS網(wǎng)站走紅后,鉸接式好友列表。在2005-2006年與SNS的功能和結(jié)構(gòu),然后再重新啟動(dòng),MiGente AsianAvenue,BlackPlanet早期流行的民族社區(qū)網(wǎng)站與好友的功能有限。
雖然SNS網(wǎng)站的設(shè)計(jì)通常是普及,許多吸引同質(zhì)人群最初,因此它并不少見找到組使用網(wǎng)站分開自己的國(guó)籍,年齡,教育程度,或其他因素,通常段的社會(huì)(Hargittai,這個(gè)問題)即使那是在沒有設(shè)計(jì)師的意圖。字的口碑策略有吸引力,因?yàn)樗麄兘Y(jié)合消費(fèi)者克服阻力顯著降低成本和快速的交付,尤其是通過技術(shù),如互聯(lián)網(wǎng)的前景。不幸的是,目前scantregarding經(jīng)驗(yàn)證據(jù)的相對(duì)有效性口碑營(yíng)銷提高企業(yè)績(jī)效隨著時(shí)間的推移。這就提出了一個(gè)需要研究企業(yè)如何測(cè)量WOM通信和口碑如何與其他形式的營(yíng)銷傳播效果。
字的口碑營(yíng)銷是互聯(lián)網(wǎng)上的一個(gè)特別突出的特點(diǎn)。互聯(lián)網(wǎng)為消費(fèi)者提供了大量的場(chǎng)地,分享自己的觀點(diǎn),喜好,或與別人的經(jīng)驗(yàn),以及公司利用口碑營(yíng)銷的機(jī)會(huì)。正如一位評(píng)論家指出,―折騰了數(shù)百萬美元的超級(jí)碗廣告,而不是初出茅廬的dot-com公司正試圖通過吸引注意力的營(yíng)銷策略,如博客和[口碑]運(yùn)動(dòng)‖(2006年,惠特曼B3A頁)便宜得多。因此,重要的是要了解是否口碑才是真正有效的,如果是這樣,如何與傳統(tǒng)營(yíng)銷活動(dòng)的影響比較。
萬維網(wǎng)發(fā)展最快的舞臺(tái)之一是所謂的社交網(wǎng)站的空間。社交網(wǎng)站通常由一小群發(fā)送了邀請(qǐng)函,以自己的個(gè)人網(wǎng)絡(luò)的成員加入該網(wǎng)站的創(chuàng)始人發(fā)起的。反過來,新的
成員發(fā)送邀請(qǐng)到他們的網(wǎng)絡(luò),等等。
因此,邀請(qǐng)函(即口碑推薦)網(wǎng)站獲得新的成員一直是最重要的推動(dòng)力。隨著社交網(wǎng)站的成熟,他們可能會(huì)開始增加他們的傳統(tǒng)營(yíng)銷工具的使用。因此,在這個(gè)階段,管理層可能會(huì)開始質(zhì)疑口碑的相對(duì)有效性。
本研究的目的是開發(fā)和估計(jì)一個(gè)模型,捕捉新成員收購(gòu),口碑轉(zhuǎn)介,與傳統(tǒng)營(yíng)銷活動(dòng)之間的動(dòng)態(tài)關(guān)系。在這樣做,我們提供一些貢獻(xiàn)。
首先,我們之間的第一次直接觀察到的口碑鏈接
吸納新客戶。其次,我們將展示如何配裝有口碑與傳統(tǒng)營(yíng)銷的措施(例如,增加口碑營(yíng)銷行動(dòng)的活動(dòng),這反過來又增加了新的成員收購(gòu))的直接影響和間接影響。我們經(jīng)驗(yàn)證明,我們的數(shù)據(jù)集,新加入的會(huì)員UPS,這些營(yíng)銷變量之間的內(nèi)生性。這突出表明,需要考慮到這些間接影響口碑與傳統(tǒng)營(yíng)銷的效果,以避免偏估計(jì)。第三,我們量化和對(duì)比口碑和傳統(tǒng)的營(yíng)銷行動(dòng),立即和長(zhǎng)期彈性。特別是,我們結(jié)轉(zhuǎn)效果強(qiáng)的口碑在我們的數(shù)據(jù)文件。最后,我們估計(jì)貨幣價(jià)值附加到每個(gè)口碑推薦,提供一個(gè)上限的財(cái)政獎(jiǎng)勵(lì)管理可能會(huì)考慮提供口碑推薦。事實(shí)上,這種做法的播種或刺激口碑已迅速增長(zhǎng),但這一活動(dòng)的有效性仍然很難量化(例如,戈德斯和Mayzlin 2004的)。
我們本文的其余部分組織如下:首先,我們總結(jié)前人的研究,以幫助的角度,把我們的貢獻(xiàn)。然后,我們描述我們的建模方法。接下來,我們提出了我們的實(shí)證分析的數(shù)據(jù)合作的互聯(lián)網(wǎng)社交網(wǎng)站,并提供理論和管理者的影響。特別是,我們發(fā)現(xiàn),口碑推薦強(qiáng)烈影響收購(gòu)新客戶,并具有比傳統(tǒng)的營(yíng)銷形式由該公司與3至7天(21天)顯著較長(zhǎng)的結(jié)轉(zhuǎn)。我們估計(jì)口碑的長(zhǎng)期彈性為0.53-約20-30倍,高于傳統(tǒng)營(yíng)銷的彈性。
Social Network Sites: Definition, History, and Scholarship
danah m.boyd, Nicole B.Ellison
Journal of Computer-Mediated Communication, Volume 13, Issue 1, pages 210–230, October 2007
Social Network Sites: Definition We define social network sites as web-based services that allow individuals to(1)construct a public or semi-public profile within a bounded system,(2)articulate a list of other users with whom they share a connection, and(3)view and traverse their list of connections and those made by others within the system.The nature and nomenclature of these connections may vary from site to site.While we use the term ―social network site‖ to describe this phenomenon, the term ―social networking sites‖ also appears in public discourse, and the two terms are often used interchangeably.We chose not to employ the term ―networking‖ for two reasons: emphasis and scope.―Networking‖ emphasizes relationship initiation, often between strangers.While networking is possible on these sites, it is not the primary practice on many of them, nor is it what differentiates them from other forms of computer-mediated communication(CMC).What makes social network sites unique is not that they allow individuals to meet strangers, but rather that they enable users to articulate and make visible their social networks.This can result in connections between individuals that would not otherwise be made, but that is often not the goal, and these meetings are frequently between ―latent ties‖(Haythornthwaite, 2005)who share some offline connection.On many of the large SNSs, participants are not necessarily ―networking‖ or looking to meet new people;instead, they are primarily communicating with people who are already a part of their extended social network.To emphasize this articulated social network as a critical organizing feature of these sites, we label them ―social network sites.‖
While SNSs have implemented a wide variety of technical features, their backbone consists of visible profiles that display an articulated list of Friends1 who are also users of the system.Profiles are unique pages where one can ―type oneself into being‖(Sundén, 2003, p.3).After joining an SNS, an individual is asked to fill out forms containing a series of questions.The profile is generated using the answers to these questions, which typically include descriptors such as age, location, interests, and an ―about me‖ section.Most sites also encourage users to upload a profile photo.Some sites allow users to enhance their profiles by adding multimedia content or modifying their profile’s look and feel.Others, such as Facebook, allow users to add modules(―Applications‖)that enhance their profile.The visibility of a profile varies by site and according to user discretion.By default, profiles on Friendster and Tribe.net are crawled by search engines, making them visible to anyone, regardless of whether or not the viewer has an account.Alternatively, LinkedIn controls what a viewer may see based on whether she or he has a paid account.Sites like MySpace allow users to choose whether they want their profile to be public or ―Friends only.‖ Facebook takes a different approach—by default, users who are part of the same ―network‖ can view each other’s profiles, unless a profile owner has decided to deny permission to those in their network.Structural variations around visibility and access are one of the primary ways that SNSs differentiate themselves from each other.After joining a social network site, users are prompted to identify others in the system with whom they have a relationship.The label for these relationships differs depending on the site—popular terms include ―Friends,‖―Contacts,‖ and ―Fans.‖ Most SNSs require bi-directional confirmation for Friendship, but some do not.These one-directional ties are sometimes labeled as ―Fans‖ or ―Followers,‖ but many sites call these Friends as well.The term ―Friends‖ can be misleading, because the connection does not necessarily mean friendship in the everyday vernacular sense, and the reasons people connect are varied(boyd, 2006a).The public display of connections is a crucial component of SNSs.The Friends list contains links to each Friend’s profile, enabling viewers to traverse the network graph by clicking through the Friends lists.On most sites, the list of Friends is visible to anyone who is permitted to view the profile, although there are exceptions.For instance, some MySpace users have hacked their profiles to hide the Friends display, and LinkedIn allows users to opt out of displaying their network.Most SNSs also provide a mechanism for users to leave messages on their Friends’ profiles.This feature typically involves leaving ―comments,‖ although sites employ various labels for this feature.In addition, SNSs often have a private messaging feature similar to webmail.While both private messages and comments are popular on most of the major SNSs, they are not universally available.Not all social network sites began as such.QQ started as a Chinese instant messaging service, LunarStorm as a community site, Cyworld as a Korean discussion forum tool, and Skyrock(formerly Skyblog)was a French blogging service before adding SNS features.Classmates.com, a directory of school affiliates launched in 1995, began supporting articulated lists of Friends after SNSs became popular.AsianAvenue, MiGente, and BlackPlanet were early popular ethnic community sites with limited Friends functionality before re-launching in 2005–2006 with SNS features and structure.While SNSs are often designed to be widely accessible, many attract homogeneous populations initially, so it is not uncommon to find groups using sites to segregate themselves by nationality, age, educational level, or other factors that typically segment society(Hargittai, this issue), even if that was not the intention of the designers.Word-of-mouth communication strategies are appealing because they combine the prospect of overcoming consumer resistance with significantly lower costs and fast delivery—especially through technology, such as the Internet.Unfortunately, empirical evidence is currently scantregarding the relative effectiveness of WOM marketing in increasing firm performance over time.This raises the need to study how firms can measure the effects of WOM communications and how WOM compares with other forms of marketing communication.Word-of-mouth marketing is a particularly prominent feature on the Internet.The Internet provides numerous venues for consumers to share their views, preferences, or experiences with others, as well as opportunities for firms to take advantage of WOM marketing.As one commentator stated, ―Instead of tossing away millions of dollars on Superbowl advertisements, fledgling dot-com companies are trying to catch attention through much cheaper marketing strategies such as blogging and [WOM] campaigns‖(Whitman 2006, p.B3A).Thus, it is important to understand whether WOM is truly effective and, if so, how its impact compares with traditional marketing activities.One of the fastest-growing arenas of the World Wide Web is the space of so-called social networking sites.A social networking site is typically initiated by a small group of founders who send out invitations to join the site to the members of their own personal networks.In turn, new members send invitations to their networks, and so on.Thus, invitations(i.e., WOM referrals)have been the foremost driving force for sites to acquire new members.As social networking sites mature, they may begin to increase their use of traditional marketing tools.Therefore, management may begin to question the relative effectiveness of WOM at this stage.The objective of this research is to develop and estimate a model that captures the dynamic relationships among new member acquisition, WOM referrals, and traditional marketing activities.In doing so, we offer several contributions.First, we are among the first to link observed WOM directly to new customer acquisition.Second, we show how toincorporate both the direct effects and the indirect effects of WOM and traditional marketing actions(e.g., a marketing action increases WOM activity, which in turn increases new member acquisition).We empirically demonstrate, for our data set, the endogeneity among new member sign-ups and these marketing variables.This highlights the need to account for these indirect effects to avoid biased estimates for both WOM and traditional marketing effects.Third, we quantify and contrast the immediate and long-term elasticities of WOM and traditional marketing actions.In particular, we document strong carryover effects for WOM in our data.Finally, we attach an estimated monetary value to each WOM referral, providing an upper bound to the financial incentive management might consider offering for WOM referrals.Indeed, the practice of seeding or stimulating WOM has grown rapidly, but quantifying the effectiveness of this activity remains difficult(e.g., Godes and Mayzlin 2004).We organize the remainder of this article as follows: We begin by summarizing previous research to help put our contributions in perspective.We then describe our modeling approach.Next, we present our empirical analysis of the data from a collaborating Internet social networking site and offer implications for theory and managers.In particular, we find that WOM referrals strongly affect new customer acquisitions and have significantly longer carryover than traditional forms of marketing used by the firm(21 days versus 3 to 7 days).We estimate a long-term elasticity for WOM of.53—approximately 20–30 times higher than the elasticities for traditional marketing.