CONTENTS Acknowledgments xiii Foreword xv PART ONE BUILDING THE FOUNDATION It All Begins with You 3 Structure 3 Your Life and Your Business 4 What Is Your Current Situation? 5 What Are Your Interests, Talents, or Expertise? 7 What Are Your Desires? 8 Your Ideal Day 10 Guest Expert Article: Creating Abundance In Your Career (Thomas L. Pauley and Penelope J. Pauley) 11 Select the Best Business Model for You 17 Bring Your Off-Line Business Online 17 Guest Expert Article: Get Your Real Estate Business Online (Larry Goins) 21 Sales of Physical Products 23 Support Services for the World Wide Web 26 News and General Information Sites 26 Blogs 28 Entertainment Sites 31 Auction Sites 33 Affi liate Sales Sites 33 Social Networking Sites/Forums 34 Sale of Information Products 36 Education Sites 37 Guest Expert Article: Educating for Entrepreneurship (Rhea Perry) 38 Membership Sites 40 Multilevel Marketing/Network Marketing 40 Guest Expert Article: Geometric Giving: The Easy Way to Donate $1 Million a Month to Charity (Paulie Sabol) 43 Gambling and Adult Sites 46 A Closer Look at Online Auctions 50 Getting Started on eBay 51 What to Sell? 54 Pricing 56 Buying for Resale on Auction Sites 58 Promoting Your Auctions 60 Shipping 60 Timing Your Auction 61 The Path of the PowerSeller 62 Treat it like a Real Business 63 Bells and Whistles 64 How to Leverage eBay 64 Guest Expert Article: eBay and Beyond (Jim Cochrum) 65 A Closer Look at Affi liate Sales Sites 70 Advantages 70 Making Money as an Affi liate 71 How to Select Merchant Partners 72 Include Valuable Content 77 Google AdSense 78 Marketing through Social Networking Sites 80 Guest Expert Article: Use MySpace to Build Your eBay Business (Adam Ginsberg) 81 Guest Expert Article: A New Model of Social Networking (Sam Heyer) 83 Create Your Own Information Products 87 What Is an Information Product? 87 Determining Demand 88 Delivery 89 Benefi ts of Information Products 89 Guest Expert Article: What’s the Best Product to Sell Online? Why, Information, of Course (Tim Knox) 90 Guest Expert Article: How to Make and Sell a Video Product at Zero Cost (Nerissa Oden) 95 PART TWO THE ACTION STEPS Set Up Your Web Site 105 Equip Yourself 105 Get Your Piece of Internet Real Estate 106 Guest Expert Article: Profi tably Naming Your New Internet Business (Marcia Yudkin) 107 Find the Best Web Host 110 Set Up Your Infrastructure 111 Design Your Web Site 114 Physical Construction of Your Site 117 The Single-Page Sales Site 119 Guest Expert Article: Three Secrets to Making Your Sales Letters Sell (Mark Hendricks) 121 Get the Word Out 127 E-Mail Marketing 127 Articles 128 Search Engine Optimization 129 Your Blog 132 Branding 134 Joint Ventures 134 Your Affi liate Program 139 Newsletters 140 Newsgroups 140 Press Releases/Public Relations 140 Guest Expert Article: Publicity Secrets to Attain Massive Success for Your Internet Business (Annie Jennings) 141 Teleseminars and Webinars 145 Guest Expert Article: Webinars—The Future of Online Marketing (Jim Edwards) 145 Other Ways to Increase Traffi c and Grow Your List 147 Guest Expert Article: Build Your List with Pay per Click (Simon Leung) 150 Guest Expert Article: Made You Look! (Wendi Friesen) 152 Make it Hypnotic! 157 What Is Hypnotic Writing? 158 The Formula for Causing Action 159 The Updated Formula 162 What about Your Web Site? 163 How Long Is Too Long? 166 How People Think 167 How to Create Hypnotic Stories 168 Reminders as Triggers 170 Guest Expert Article: Buying Trances: The Real Secret to Hypnotic Selling (Dr. Joe Vitale) 171 Changing Average Writing into Hypnotic Writing 176 Final Thoughts 181 PART THREE GROW YOUR BUSINESS! It’s All About Quality 185 No Place to Hide 186 Deliver on Customer Service 186 Go Beyond Your Customer’s Expectations 187 Guest Expert Article: Make Sure Your Customers Actually Get the Benefi ts (Bill Harris) 188 Build Your Business Support Network 194 The Power of the Mastermind Group 194 Guest Expert Article: Mastermind Groups for Internet Marketers (Bill Hibbler) 195 The Fine Art of Delegation 198 Comply with Cyber Law 200 Spam 200 Copyrights 201 Trademarks 201 Free Speech 202 Guest Expert Article: Legal Issues for Internet Marketers (Bob Silber) 202 Plan for Success 205 Your Business Plan 205 Incorporation 207 Guest Expert Article: How to Predict Your Way to Wealth (Mike Mograbi) 208 | The Linguistics of Eating and Drinking Download Table of contents Preface vii A cross-linguistic overview of ‘eat’ and ‘drink’ 1 John Newman How transitive are eat and drink verbs? 27 Åshild Næss Quirky alternations of transitivity: The case of ingestive predicates 45 Mengistu Amberber All people eat and drink: Does this mean that ‘eat’ and ‘drink’ are universal human concepts? 65 Anna Wierzbicka ‘Eating’, ‘drinking’ and ‘smoking’: a generic verb and its semantics in Manambu 91 Alexandra Y. Aikhenvald Athapaskan eating and drinking verbs and constructions 109 Sally Rice The semantic evolution of EAT-expressions: Ways and byways 153 Peter Hook & Prashant Pardeshi Literal and figurative uses of Japanese EAT and DRINK 173 Toshiko Yamaguchi What (not) to eat or drink: Metaphor and metonymy of eating and drinking in Korean 195 Jae Jung Song Metaphorical extensions of ‘eat’ ⇒ [overcome] and ‘drink’ ⇒ [undergo] in Hausa 229 Philip J. Jaggar & Malami Buba Amharic eat and drink verbs 253 John Newman & Daniel Aberra Table of contents Author index 273 Language index 277 Subject index 279 |
Photographers Forum 2011 winter Download BOOK REVIEW by Amanda Quintenz-Fiedler Gregory Crewdson: In a Lonely Place NOTED by Amanda Quintenz-Fiedler A snapshot look at four new photography books. NEW PRODUCTS DIGITAL PHOTOGRAPHY Wacom: The Next Generation by Cynthia Anderson FEATURE Kenro Izu: An Architecture of Faith by Claire Sykes The photographer’s keen eye, huge portable camera and fascination with sacred places take him on global travels. PROFILE The World of Charles Grogg by Nell Campbell Grogg’s fractured and reconnected images become metaphors for the bound and unbound world. WINNERS 31st Annual Spring Photography Contest INTERVIEW Rich Clarkson A Perfectionist with Flexibility by Ken Lassiter A conversation with the veteran photographer, journalist, publisher, promoter, producer, teacher… and rabid sports fan. WORKSHOPS A listing of classes and workshops in the U.S and abroad. | Permaculture PLANTS Download Contents INTRODUCTION OVERVIEW OF PERMACULTURE PROPAGATING PLANTS THE PIONEERS TAGASASTE (Chamaecytisus palmensis) 15 TREE LUPIN (Lupinus arboreus) 17 WATTLES (Acacia spp) 17 ALBIZIAS (Albizia spp) 22 CASUARINAS (Casuarina spp) 22 ROSEWOOD (Tipuana tipu) 24 LEUCAENA (Leucaena spp) 24 ALDERS (Alnus spp) 26 MIRACLE PLANT (Lespedeza bicolor) 27 BLACK LOCUST (Robinia pseudoacacia) 28 HONEY LOCUST (Gleditsia triacanthos) 28 ICE CREAM BEAN (Inga spp) THE NUTS MACADAMIA (Macadamia spp WALNUTS (Juglans spp CHESTNUTS (Castanea spp CHINQUAPINS (Chrysolepis spp ALMONDS (Prunus amygdalus HAZELNUT (Corylus spp PECAN (Carya illinoensis PISTACHIO NUTS (Pistacia spp BUNYA BUNYA Arau(caria idwibllii) PINES WITH EDIBLE NUTS (Pinus spp) JOJOBA (Simmondsia chinensis, syn. Simmondsia californica COLOUR PLATES THE FRUITS FIGS (Ficus spp MULBERRIES (Morus spp PERSIMMON (Diospyros kaki OLIVE (Olea uroepaea) JUJUBE (Ziziphus psp LOQUAT (Eriobotrya japonica ACEROLA, BARBADOS CHERRY (Malpighia glabra PAPAYA (Carica papaya HIGHLAND PAPAYAS (Carica spp PEPINO (Solanum uricamtum TAMARILLO (Cyphomandra betacea CAPULI Pru(nus salicifolia WHITE SAPOTE (Casimiroa deulis LUCUMA (Pouteria obovata, syn. Pouteria lucmo, Lucumo obovata). SAPODILLA (Manilkara zapota, syn. Achras sapota PASSIONFRUIT (Passiflora spp CHERIMOYAS (Annona spp Permaculture Plants: A Selection PAWPAW (Asimina triloba GUAVAS (Psidium spp FEIJOA (Feijoa sellowiana UGNI (Ugni molinaea, syn. Myrtus ugni, Ugni molinae LlLLIPILLIs (Eugenia spp. Acmena spp. Syzigium spp BLUEBERRIES (Vaccinium spp FUCHSIA (Fuchsia spp) HACKBERRY (Celtis Australis IRISH STRAWBERRY TREE (Arbutus unedo) JAPANESE RAISIN TREE (Hovenia dulcis OTHER UTILITY PLANTS CAROB Ceratonia iliqSua OAKS Quercus psp BEECHES (Fagus spp WILLOWS (Salix spp POPLARS (Populus pps CASTOR (Ricinus ommcunis CAPE LILAC Me( liaazedarach NEEM (Azadirachta ndiica INDIAN BEECH (Derris indica COTONEASTER (Cotoneaster pps DOGWOOD (Cornuscapitata COPROSMA (Coprosma repens HORSERADISH TREE, DRUMSTICK (Moringa oleifera CHINESE TALLOW TREE (Sapium esbiferum MOUNTAIN ASH, ROWAN (Sorbus aucuparia, syn. Sorbus edulis BOX ELDER MAPLE A(cer negundo, syn. Negundo aceroides CEDARS (Cedrus spp EUCALYPTS (Eucalyptus spp BAMBOOS FAST GROWING, TALL, PERENNIAL GRASSES, SUITABLE AS LOCKUP FODDER PALMS WITH UTILITY TO MAN UTILITY LISTS TREES AND SHRUBS WITH LOW FIRE POTENTIAL GROUND COVER WITH LOW FIRE POTENTIAL MEDICINAL HERBS FOR LIVESTOCK BEE FORAGE SYSTEM COMPANION PLANTS WATER PLANTS UTILITY SUBMERGED PLANTS UTILITY FLOATING - LEAVED PLANTS UTILITY EMERGENT PLANTS UTILITY PLANTS OF MARGINS AND WATER MEADOWS DIFFICULT SITES SALT TOLERANT FODDER SPECIES SALT TOLERANT REEST PLANTS WHICH SURVIVE RIGHT TO THE OCEAN PLANTS TOLERANT OF ALKALINE SOILS INDEX |
List of Figures ix List of Tables xiii Preface xv 1 Introduction 1 1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Road Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 P2P Applications 5 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Distributed Processing . . . . . . . . . . . . . . . . . . . . . 8 2.2.1 Internet Computing . . . . . . . . . . . . . . . . . . . 8 2.2.2 Wireless Sensor Networks . . . . . . . . . . . . . . . . 9 2.3 File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.4 Voice over IP and Instant Messaging . . . . . . . . . . . . . . 14 2.5 Video Streaming . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.6 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.7 Case Study: PPLive . . . . . . . . . . . . . . . . . . . . . . . 27 2.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 2.9 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . 28 3 P2P Network Architectures 29 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 3.2 Structured P2P Systems . . . . . . . . . . . . . . . . . . . . 30 3.2.1 Chord . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 3.2.2 CAN (Content Addressable Network) . . . . . . . . . 35 3.2.3 Other Structured Approaches . . . . . . . . . . . . . . 37 3.3 Unstructured (Mesh) P2P Systems . . . . . . . . . . . . . . . 39 3.4 Hybrid P2P Systems . . . . . . . . . . . . . . . . . . . . . . 41 3.5 Network Architecture with QoS Provisioning . . . . . . . . . 43 3.5.1 AAA Tasks . . . . . . . . . . . . . . . . . . . . . . . . 47 3.5.2 Charging . . . . . . . . . . . . . . . . . . . . . . . . . 47 3.5.3 Dynamic QoS . . . . . . . . . . . . . . . . . . . . . . . 47 3.5.4 Service Brokerage . . . . . . . . . . . . . . . . . . . . 48 3.5.5 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . 48 3.6 Video Streaming Network Architecture . . . . . . . . . . . . 49 3.7 Case Study: PPLive . . . . . . . . . . . . . . . . . . . . . . . 51 3.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 3.9 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . 53 4 Topology Control 55 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 4.2 A General Framework for Distributed Topology Control . . . 58 4.3 Structured Topology Control . . . . . . . . . . . . . . . . . . 59 4.4 Unstructured Topology Control . . . . . . . . . . . . . . . . 63 4.5 Network-Coding-Based Distributed Topology Control . . . . 69 4.6 Energy Efficient Distributed Topology Control in a Wireless P2P System . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 4.7 Case Study: PPLive . . . . . . . . . . . . . . . . . . . . . . . 72 4.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 4.9 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . 73 5 Incentives 75 5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 5.2 Incentive Issues in P2P Systems on the Internet . . . . . . . 78 5.2.1 File Sharing Systems . . . . . . . . . . . . . . . . . . . 78 5.2.1.1 BitTorrent . . . . . . . . . . . . . . . . . . . 79 5.2.1.2 Hierarchical P2P Systems . . . . . . . . . . . 80 5.2.1.3 Payment-Based Systems . . . . . . . . . . . . 80 5.2.1.4 Cost of Sharing . . . . . . . . . . . . . . . . 82 5.2.1.5 Reciprocity and Reputation-Based Systems . 84 5.2.1.6 Penalty-Based Approaches . . . . . . . . . . 86 5.2.1.7 Game Theoretic Modeling . . . . . . . . . . . 87 5.2.1.8 Auction-Based Approaches . . . . . . . . . . 91 5.2.1.9 Exchange-Based Systems . . . . . . . . . . . 93 5.2.2 Media Streaming Systems . . . . . . . . . . . . . . . . 95 5.2.2.1 Layered Many-to-One Streaming . . . . . . . 95 5.2.2.2 Multicast One-to-Many Streaming . . . . . . 99 5.2.2.3 Coalition-Based Media Streaming . . . . . . 105 5.3 Incentive Issues in Wireless P2P Systems . . . . . . . . . . . 110 5.3.1 Routing and Data Forwarding . . . . . . . . . . . . . . 110 5.3.2 Wireless Information Sharing Systems . . . . . . . . . 112 5.3.3 Network Access Sharing . . . . . . . . . . . . . . . . . 115 5.3.4 Wireless P2P Media Streaming . . . . . . . . . . . . . 117 5.3.4.1 System Model . . . . . . . . . . . . . . . . . 117 5.3.4.2 Two Neighboring Clients . . . . . . . . . . . 121 5.3.4.3 Three Neighboring Clients . . . . . . . . . . 123 5.3.4.4 The General Scenario . . . . . . . . . . . . . 125 5.4 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 5.5 Case Study: PPLive . . . . . . . . . . . . . . . . . . . . . . . 127 5.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 5.7 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . 128 6 Trust 129 6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 6.1.1 Trust Modeling . . . . . . . . . . . . . . . . . . . . . . 129 6.2 EigenTrust . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 6.3 PeerTrust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 6.4 Trust-χ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 6.5 FuzzyTrust . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 6.6 Game Theoretic Analysis on Trust Management . 6.7 SuperTrust . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 6.8 PowerTrust . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 6.9 GossipTrust . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 6.10 Trust Establishment in Wireless Sensor Networks . . . . . . 150 6.10.1 Symmetric Key-Based Approaches . . . . . . . . . . . 150 6.10.1.1 Deterministic Key Pre-Distribution Schemes 150 6.10.1.2 Probabilistic Key Pre-Distribution Schemes . 151 6.10.2 Asymmetric Key-Based Approaches . . . . . . . . . . 153 6.11 Case Study: PPLive . . . . . . . . . . . . . . . . . . . . . . . 155 6.12 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 6.13 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . 156 7 Security Issues 159 7.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 7.2 Content Pollution . . . . . . . . . . . . . . . . . . . . . . . . 159 7.3 Buffer Map Cheating . . . . . . . . . . . . . . . . . . . . . . 163 7.4 Sybil Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 7.5 DDoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . 166 7.6 P2P Worm Propagation . . . . . . . . . . . . . . . . . . . . . 167 7.7 P2P SIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 7.8 Collusive Piracy . . . . . . . . . . . . . . . . . . . . . . . . . 168 7.9 Case Study: PPLive . . . . . . . . . . . . . . . . . . . . . . . 169 7.10 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 7.11 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . 170 8 Conclusions 171 8.1 Where Are We Now? . . . . . . . . . . . . . . . . . . . . . . 171 8.2 Peer into the Future . . . . . . . . . . . . . . . . . . . . . . . 172 |