第一篇:翻译网站集
翻译网站集 特别推荐1:http:///mt?open&t=grp=Word2Word http://http://babelfish.altavista.com/http://可翻译成中文的网站: http://www.xiexiebang.com/default.asp英语、日语、繁体 http://165net.com/英语、日语、俄语、德语 http://www.translate.ru/eng/srvurl.asp法、德、俄等互译
第二篇:翻译网站集
翻译网站集
特别推荐1:http:///mt?open&t=grp=word2word
http://http://babelfish.altavista.com/http://可翻译成中文的网站:
http://www.xiexiebang.com/default.asp英语、日语、繁体
http://165net.com/英语、日语、俄语、德语
http://www.translate.ru/eng/srvurl.asp法、德、俄等互译
第三篇:翻译网站
(1)句库
网址:http:///
翻译的非常好,基本上都能找到自己所需的,同时也可以发音,这有利于提高自己的专业英语听力!
举例:
翻译 first principles
在第4个清楚的给出了”第一原理“的解释!
(2)词博
网址:http:///
翻译的很杂,可以供多种选择;而且可以发音,这一点感觉很好!
举例: 翻译 first principles
没有找到确切的”第一原理“的翻译,但是其他词汇的翻译还好!
(3)句译
网址:http:///viewPage.php
翻译的很好,基本你都可以在他的翻译中找到合适的!
举例: 翻译 first principles
first principle)
翻译结果非常好!它给出10个例句,结果又8个符合我们的要求,而且给出的例句非常有用,完全是文献里摘出来的!!
4)词都
查词也还算不错,并且给出很多来自文献的例句,非常不错!
举例: 翻译 first principles
给出了“第一原理”的翻译,而且给出了很多直接来自文献的例句,有些都是长句。并且给出一些参考词头,进行词语联系,这个特点非常有用!
第四篇:网站远程管理外文翻译
湖北大学本科毕业论文(设计)外文翻译
外文翻译:
浅谈网络中的远程控制
原文来源:
Rabiner, L.R.;Gold, B.Englewood Cliffs, N.J., Prentice-Hall, Inc., 2009 p.译文正文:
摘要:在网络高速发展的今天,随着计算机应用的普及,远程控制也逐渐被人们所关注。远程控制是网络的一大优势,在网络管理、远程协作、远程办公等计算机领域都有着广泛的应用,它进一步克服了由于地域性的差异而带来的操作中的不便性,使得网络的效率得到了更大的发挥。远程控制可通过多种方法加以实现。关键词:远程控制;遥控操作;技术应用;实现方法 计算机远程控制
计算机远程控制是在网络上由一台电脑(主控端Remote/客户端)远距离去控制另一台电脑(被控端Host/J]服务器端)的技术⋯。这里的远程不是字面意思的远距离,而是指通过网络来对远端的计算机实施遥控。
远程控制只是通过网络来操纵计算机的一种手段而已,只要运用得当,操纵远程的计算机也就如同你操纵眼前正在使用的计算机一样没有任何区别。当操作者使用主控端电脑控制被控端电脑时,就如同坐在被控端电脑的屏幕前一样,可以启动被控端电脑的应用程序,可以使用被控端电脑的文件资料,甚至可以利用被控端电脑的外部打印设备和通信设备来进行打印和访问互联网。在这个过程中主控端电脑只是将键盘和鼠标的指令传送给远程电脑,同时将被控端电脑的屏幕画面通过通信线回传过来。也就是说,我们控制被控端电脑进行操作似乎是在眼前的电脑上进行的,实质是在远程的电脑中实现的,不论打开文件,还是上网浏览、下载,所有的资料和上网等都是存储在远程的被控端电脑中的。
实行远程控制,实际上就是一个服务器程序(以下简称被控程序)和一个客户程序(以下简称主控程序),被控方即为服务器程序,它监听客户的请求,并做出处理;主控方即为客户程序,它连接上服务器后,发出自己的请求,服务器便根据客户的请求做出不同的响应。远程控制系统组成如图1所示。
当今的远程控制技术支持的网络方式有:LAN、WAN、拨号方式、互联网方式。此外,有的远程控制软件还支持通过串口、并口、红外端口来对远程机进行控制。远程控制克服了由于地域性的差异而带来的操作中的不便性,使得网络的效率得到了更大的发挥。
2远程控制的技术实现
2.1远程控制的原理
“只要网络有通路就可以实现远程控制”,远程控制必须通过网络才能进行。位于本地的、已被安装了客户端程序的主控端是操纵指令的发出端,它像一个普通客户一样向非本地、安装了服务器端程序的被控端发出信号,建立并通过一个特殊的远程服务,使用各种远程控制功能发送远程控制命令,控制被控端电脑中的各种应用程序运行,使得被控端按照主控端的 要求进行各种操作,从而实现远程控制的目的。图2远程控制示意图
湖北大学本科毕业论文(设计)外文翻译
通过网络实现的远程控制示意图如图2所示。
2.2远程控制实现方法
2.2.1 利用微软Windows XP系统中远程控制功能
每台Windows XP电脑都同时包括客户端和服务器端,也就是说它既可以当成客户端来连接其他的Windows XP电脑,也可以将自己当成服务器端,让别的电脑来控制自己。服务器端的系统都是使用Windows XP,而客户端就可以是Windows XP、Windows 2000或者Windows Me,并且对客户端没有语言的限制。用户可以利用远程桌面通过网络对远程计算机进行控制,控制后可以访问所有应用程序、文件和网络资源等。
2.2.2利用一些功能强大的远程控制软件。
远程控制技术发展到今天,产生了许多优秀的远程控制软件,有提供多层次安全防护的远程遥控软件,还有加速远程遥控操作软件,以及更加利于快速文档传送的控制软件。还有如“RemotelyAnywhere”只需在服务器端一次性安装,客户端在网络中不需要再增加任何软件,就可以直接通过浏览器来对服务器进行远程控制。它不仅仅只是让客户端能够远程控制服务器的桌面,还可以给多个用户设置不同的权限,以便让他们根据授权对服务器的文件管理器、注册表等项目进行查询和管理;它允许服务器和客户端之间传递剪贴板,也可实现普通文档的传送。另外,一些集远程控制、数据通信和文件传输等功能于一体,具有很高的数据传输效率和系统安全保障的远程控制系统正在被推广。
2.2.3根据实际需求开发实现远程控制
自行开发实现远程控制,涉及主控机和受控机,故采用Client/Server结构。可以用Delphi编程环境分别在两台不同的电脑上编制控制和被控制程序,一个为Clientdpr.exe,装在受控机上;另一个为Serverdpr.exe,装在主控机上。Serverdpr.exe指定要监视的受控机的IP地址和发送指令给客户机的Clientdpr.exe,客户机的Clientdpr.exe得到指令后,接着在本机执行相应指令,将结果返回给主控机。主控方的功能是这样实现的:读取命令串一将命令串转换成数组一清除内存流一指定目标计算机(通过读取所输入的IP地址)一将指令码发送给目标计算机。当主控机将指令发给受控机后,受控机将在本机上调用Windows的应用程序接口API函数以执行所接收的指令。当受控机接收到数据时,便开始执行主控机发送的操作。具体操作是这样的:读取控制码_+识别控制码一执行相应的过程或API函数以达到相应的功能。结束语
远程控制虽然可以方便地操纵远程计算机,给人们带来很多便利,但它也会由此带来安全方面的隐患。随着远程控制市场的成熟,网络安全变得越发重要,只有彻底解决这一关键问题,才能促进远程控制真正走向应用。
湖北大学本科毕业论文(设计)外文翻译
Remote control of network
Abstract: The rapid development of the network today, with the popularization of computer applications, remote control have gradually been of concern to the people.Network remote control is a major advantage in network management, remote collaboration, remote office and other computer fields have a wide range of applications, it further to overcome regional differences in the operation brought the inconvenience, making the network efficiency Given greater play.Remote control can be achieved through a variety of ways.Keywords: remote control;remote operation;technology;Implementation 1 computer remote control
Computer remote control is on the network by a computer(host Remote / Client)remote to control another computer technology.Here is not the literal meaning of the long-distance remote, but rather through the network to the remote computer on the implementation of remote control.Remote control is to manipulate the computer through the network as a means only, if used properly, will control the remote computer as you manipulate the front of the computer being used as there is no difference.When the operator using the host computer control host computer to host computer as if sitting in front of the screen as the computer can start the host application, you can use the host computer documentation, or even Host computer using the external printing device and communications equipment to print and access the Internet.In this process, host computer is just a keyboard and mouse commands sent to the remote computer, while host computer's screen image come through the communication line return.That is, we control the host computer to operate in front of the computer seems to be carried out, in essence, a remote computer to achieve, whether to open the file, or Web browsing, downloading, all the information and the Internet are all Stored in the remote host computer.Implementation of remote control, in fact, a server program(hereinafter referred to as charged program)and a client(hereinafter referred to as master control program), the prosecution is the server program that listens to customer requests, and to deal with it;Master Is the client side, it is connected to the server, to make their request, the server will be made according to customer's request a different response.Remote control system shown in Figure 1.Today's technical support network remote control methods are: LAN, WAN, dial-up Internet way.In addition, some remote control software also supports serial, parallel, infrared port to control a remote machine.Remote control to overcome regional differences in the operation brought the inconvenience, make the network to play a greater efficiency.2 remote control technology 2.1 Principles of remote control
“As long as the network has access to connect remote control ”, remote control must be carried out through the network.At local, has been installed, the host is a client program to issue control instructions side, it is the same as an ordinary customer to non-local, the installation of the host server program signals, and through the establishment of a special Remote service, using a variety of remote control function to send a remote control command, control, host computers running various applications, making the host in accordance with the master's
湖北大学本科毕业论文(设计)外文翻译
Requirements for various operations, in order to achieve the remote control.Figure 2 Schematic diagram of the remote control
Remote control through the network diagram shown in Figure 2.2.2Implementation of Remote Control 2.2.1 Microsoft Windows XP system using the remote control function
Windows XP computers each include both client and server side, meaning that both can be used as a client to connect to other Windows XP computer, you can also themselves as the server side, so that other computer to control themselves.Server systems are using Windows XP, the client can be Windows XP, Windows 2000 or Windows Me, and the client without language restrictions.Users can use the Remote Desktop computer through the network to the remote control, after controlling for access to all applications, files and network resources.2.2.2 using some powerful remote control software.Remote control technology to today, have a lot of great remote control software, providing multi-level security protection for remote control software, as well as speed up the remote control operating software, and more conducive to the rapid document transmission control software.Also, as “RemotelyAnywhere” just a one-time installation on the server side, the client in the network do not need to add any software to connect directly through the browser on the server for remote control.It is not just the client to remotely control the server's desktop, but also can set different permissions for multiple users so that they are under the authority of the server's file manager, registry, query and manage projects;it allows the server and Clipboard passed between the client can also be transmitted to achieve common document.In addition, some set of remote control, data communications and file transfer and other functions into one, with high data transmission efficiency and system security remote control system is being promoted.2.2.3 Development and implementation of the actual needs of the remote control
Develop their own remote control, involving the host computer and controlled machines, so the use of Client / Server structure.Delphi programming environment can be used separately on two different computers to be controlled preparation of control and procedures, one for Clientdpr.exe, installed in the controlled machine;one for Serverdpr.exe, installed in the main computer on.Serverdpr.exe designated to monitor the controlled machine IP address and send instructions to the client Clientdpr.exe, client Clientdpr.exe get command, and then execute the corresponding instructions in the machine, the results are returned to the host computer.Master side function is implemented as follows: Read command string into a string array of commands to clear the memory of a stream to a specified target computer(by reading the entered IP address)to send the script to a target computer.When the command sent to the host computer controlled machine, the machine will be controlled on the unit's application program interface calls Windows API functions to perform the received command.When the controlled unit receives the data, they begin to send the host computer operation.To do this: Read identification control code _ + implementation of the corresponding control code for a procedure or function to achieve the appropriate API function.3 Conclusion
Although the remote control can easily manipulate the remote computer, to bring a lot of convenience, but it also the resulting security risks.As the market matures remote control, network security becomes more important, only solve this critical issue, to really go for remote
control applications.
第五篇:社交网站_外文翻译
社交网站
我们定义的社交网络站点作为基于Web的服务,允许个人:(1)有界系统内构建一个公共或半公共的配置文件。(2)阐明列表中的其他用户,与他们共享一个连接。
(3)查看和遍历他们的名单和那些由其他系统内的连接。性质和命名这些连接可能会有所不同,从站点到站点。
虽然我们使用的术语―社交网站‖来形容这种现象,―社交网站‖也出现在公共话语中,经常交替使用这两个术语。我们选择不采用―联网‖的原因有两个:重点和范围。―物联网‖强调关系启动,往往陌生人之间。虽然网络是可能在这些网站上,它是不是主要的做法,他们中的许多,也不是有什么区别他们从其他形式的计算机中介传播(CMC)。
是什么让独特的社交网站并不是说他们允许个人见陌生人,而是他们让使用者能够表达,使人们看到他们的社交网络。这可能会导致个人之间的连接,否则不会进行,但往往不是我们的目标,而这些会议之间―的潜在关系‖(Haythornthwaite,2005年)谁分享一些脱机连接频繁。许多大型SNS网站,参与者不一定―网络‖或寻找,以满足新的人,相反,它们是人谁已经扩展社交网络的一部分,他们的主要沟通。为了强调这一点明确的社会网络,这些网站作为一个重要的组织特征,我们将它们标记―社交网站‖。
虽然SNS网站已经实施了各种各样的技术特点,他们的骨干组成可见型材显示铰接式的Friends1谁也系统的用户列表。配置文件是独特的网页,人们可以―输入自己的应运而生‖(松登,2003年,第3页)。在加入一个SNS,一个人被要求填写表格,包含了一系列的问题。回答这些问题,这些问题通常包括描述符,如年龄,位置,兴趣,和一个―关于我‖一节使用该配置文件。大多数网站还鼓励用户上传的个人资料照片。有些网站允许用户添加多媒体内容,或修改他们的个人资料的外观和感觉,以提高他们的档案。其他,如Facebook,允许用户添加模块(―应用程序‖),提高他们的个人资料。
在一个档案中的知名度不同的网站,并根据用户的自由裁量权。默认情况下,型材Friendster和Tribe.net被搜索引擎抓取,使他们的人看到,无论是否观众有一个帐户。另外,LinkedIn的控制的基础上,他或她是否有付费帐户,观众可能会看到什么。像MySpace允许用户来选择他们是否希望他们的个人资料,以成为公众或―朋友只。‖Facebook的一个不同的方法默认情况下,谁是在相同的―网络‖的一部分用户可以查看对方的轮廓,除非一个轮廓所有者已决定拒绝那些在其网络的权限。结构变化的可视性和访问社交网站区别于对方的主要方式之一。
加入一个社交网络站点后,会提示用户识别系统与他们有关系的人在。这些关系的不同而有所不同的标签对网站热门词汇,包括―朋友‖,―联系人‖和―粉丝‖,大多数SNS网站需要双向确认的友谊,但有些则没有。这些单向的关系有时会标示为―粉丝‖或―关注‖,但许多网站称这些朋友。
―朋友‖一词是误导,因为连接并不一定意味着在日常白话感的友谊,人们连接的原因是多种多样的(博伊德,2006A)。
公共显示器的连接是SNS网站的重要组成部分。好友列表中包含链接到每个朋友的个人资料,使观众通过点击好友列表遍历网络图。在大多数网站,好友列表是可见的人谁被允许查看配置文件,但也有例外。例如,一些MySpace的用户已经破解隐藏好友显示他们的个人资料,LinkedIn允许用户选择退出显示其网络。
大多数SNS网站还提供了一种机制,用户朋友的个人资料上留下消息。此功能通常涉及离开―的评论,‖虽然网站使用此功能的各种标签。此外,SNS网站往往有一个私人消息功能类似的webmail。虽然私人消息和评论上流行的主要SNS网站,他们尚未普及。
并非所有的社交网络网站等开始。
QQ作为中国的即时通讯服务,LunarStorm开始作为一个社区网站,赛我网作为韩国的讨论区工具,以及环讯(原Skyblog)的加入SNS功能,是法国前博客服务。
Classmates.com,学校联营公司在1995年推出的一个目录,开始支持SNS网站走红后,铰接式好友列表。在2005-2006年与SNS的功能和结构,然后再重新启动,MiGente AsianAvenue,BlackPlanet早期流行的民族社区网站与好友的功能有限。
虽然SNS网站的设计通常是普及,许多吸引同质人群最初,因此它并不少见找到组使用网站分开自己的国籍,年龄,教育程度,或其他因素,通常段的社会(Hargittai,这个问题)即使那是在没有设计师的意图。字的口碑策略有吸引力,因为他们结合消费者克服阻力显着降低成本和快速的交付,尤其是通过技术,如互联网的前景。不幸的是,目前scantregarding经验证据的相对有效性口碑营销提高企业绩效随着时间的推移。这就提出了一个需要研究企业如何测量WOM通信和口碑如何与其他形式的营销传播效果。
字的口碑营销是互联网上的一个特别突出的特点。互联网为消费者提供了大量的场地,分享自己的观点,喜好,或与别人的经验,以及公司利用口碑营销的机会。正如一位评论家指出,―折腾了数百万美元的超级碗广告,而不是初出茅庐的dot-com公司正试图通过吸引注意力的营销策略,如博客和[口碑]运动‖(2006年,惠特曼B3A页)便宜得多。因此,重要的是要了解是否口碑才是真正有效的,如果是这样,如何与传统营销活动的影响比较。
万维网发展最快的舞台之一是所谓的社交网站的空间。社交网站通常由一小群发送了邀请函,以自己的个人网络的成员加入该网站的创始人发起的。反过来,新的
成员发送邀请到他们的网络,等等。
因此,邀请函(即口碑推荐)网站获得新的成员一直是最重要的推动力。随着社交网站的成熟,他们可能会开始增加他们的传统营销工具的使用。因此,在这个阶段,管理层可能会开始质疑口碑的相对有效性。
本研究的目的是开发和估计一个模型,捕捉新成员收购,口碑转介,与传统营销活动之间的动态关系。在这样做,我们提供一些贡献。
首先,我们之间的第一次直接观察到的口碑链接
吸纳新客户。其次,我们将展示如何配装有口碑与传统营销的措施(例如,增加口碑营销行动的活动,这反过来又增加了新的成员收购)的直接影响和间接影响。我们经验证明,我们的数据集,新加入的会员UPS,这些营销变量之间的内生性。这突出表明,需要考虑到这些间接影响口碑与传统营销的效果,以避免偏估计。第三,我们量化和对比口碑和传统的营销行动,立即和长期弹性。特别是,我们结转效果强的口碑在我们的数据文件。最后,我们估计货币价值附加到每个口碑推荐,提供一个上限的财政奖励管理可能会考虑提供口碑推荐。事实上,这种做法的播种或刺激口碑已迅速增长,但这一活动的有效性仍然很难量化(例如,戈德斯和Mayzlin 2004的)。
我们本文的其余部分组织如下:首先,我们总结前人的研究,以帮助的角度,把我们的贡献。然后,我们描述我们的建模方法。接下来,我们提出了我们的实证分析的数据合作的互联网社交网站,并提供理论和管理者的影响。特别是,我们发现,口碑推荐强烈影响收购新客户,并具有比传统的营销形式由该公司与3至7天(21天)显着较长的结转。我们估计口碑的长期弹性为0.53-约20-30倍,高于传统营销的弹性。
Social Network Sites: Definition, History, and Scholarship
danah m.boyd, Nicole B.Ellison
Journal of Computer-Mediated Communication, Volume 13, Issue 1, pages 210–230, October 2007
Social Network Sites: Definition We define social network sites as web-based services that allow individuals to(1)construct a public or semi-public profile within a bounded system,(2)articulate a list of other users with whom they share a connection, and(3)view and traverse their list of connections and those made by others within the system.The nature and nomenclature of these connections may vary from site to site.While we use the term ―social network site‖ to describe this phenomenon, the term ―social networking sites‖ also appears in public discourse, and the two terms are often used interchangeably.We chose not to employ the term ―networking‖ for two reasons: emphasis and scope.―Networking‖ emphasizes relationship initiation, often between strangers.While networking is possible on these sites, it is not the primary practice on many of them, nor is it what differentiates them from other forms of computer-mediated communication(CMC).What makes social network sites unique is not that they allow individuals to meet strangers, but rather that they enable users to articulate and make visible their social networks.This can result in connections between individuals that would not otherwise be made, but that is often not the goal, and these meetings are frequently between ―latent ties‖(Haythornthwaite, 2005)who share some offline connection.On many of the large SNSs, participants are not necessarily ―networking‖ or looking to meet new people;instead, they are primarily communicating with people who are already a part of their extended social network.To emphasize this articulated social network as a critical organizing feature of these sites, we label them ―social network sites.‖
While SNSs have implemented a wide variety of technical features, their backbone consists of visible profiles that display an articulated list of Friends1 who are also users of the system.Profiles are unique pages where one can ―type oneself into being‖(Sundén, 2003, p.3).After joining an SNS, an individual is asked to fill out forms containing a series of questions.The profile is generated using the answers to these questions, which typically include descriptors such as age, location, interests, and an ―about me‖ section.Most sites also encourage users to upload a profile photo.Some sites allow users to enhance their profiles by adding multimedia content or modifying their profile’s look and feel.Others, such as Facebook, allow users to add modules(―Applications‖)that enhance their profile.The visibility of a profile varies by site and according to user discretion.By default, profiles on Friendster and Tribe.net are crawled by search engines, making them visible to anyone, regardless of whether or not the viewer has an account.Alternatively, LinkedIn controls what a viewer may see based on whether she or he has a paid account.Sites like MySpace allow users to choose whether they want their profile to be public or ―Friends only.‖ Facebook takes a different approach—by default, users who are part of the same ―network‖ can view each other’s profiles, unless a profile owner has decided to deny permission to those in their network.Structural variations around visibility and access are one of the primary ways that SNSs differentiate themselves from each other.After joining a social network site, users are prompted to identify others in the system with whom they have a relationship.The label for these relationships differs depending on the site—popular terms include ―Friends,‖―Contacts,‖ and ―Fans.‖ Most SNSs require bi-directional confirmation for Friendship, but some do not.These one-directional ties are sometimes labeled as ―Fans‖ or ―Followers,‖ but many sites call these Friends as well.The term ―Friends‖ can be misleading, because the connection does not necessarily mean friendship in the everyday vernacular sense, and the reasons people connect are varied(boyd, 2006a).The public display of connections is a crucial component of SNSs.The Friends list contains links to each Friend’s profile, enabling viewers to traverse the network graph by clicking through the Friends lists.On most sites, the list of Friends is visible to anyone who is permitted to view the profile, although there are exceptions.For instance, some MySpace users have hacked their profiles to hide the Friends display, and LinkedIn allows users to opt out of displaying their network.Most SNSs also provide a mechanism for users to leave messages on their Friends’ profiles.This feature typically involves leaving ―comments,‖ although sites employ various labels for this feature.In addition, SNSs often have a private messaging feature similar to webmail.While both private messages and comments are popular on most of the major SNSs, they are not universally available.Not all social network sites began as such.QQ started as a Chinese instant messaging service, LunarStorm as a community site, Cyworld as a Korean discussion forum tool, and Skyrock(formerly Skyblog)was a French blogging service before adding SNS features.Classmates.com, a directory of school affiliates launched in 1995, began supporting articulated lists of Friends after SNSs became popular.AsianAvenue, MiGente, and BlackPlanet were early popular ethnic community sites with limited Friends functionality before re-launching in 2005–2006 with SNS features and structure.While SNSs are often designed to be widely accessible, many attract homogeneous populations initially, so it is not uncommon to find groups using sites to segregate themselves by nationality, age, educational level, or other factors that typically segment society(Hargittai, this issue), even if that was not the intention of the designers.Word-of-mouth communication strategies are appealing because they combine the prospect of overcoming consumer resistance with significantly lower costs and fast delivery—especially through technology, such as the Internet.Unfortunately, empirical evidence is currently scantregarding the relative effectiveness of WOM marketing in increasing firm performance over time.This raises the need to study how firms can measure the effects of WOM communications and how WOM compares with other forms of marketing communication.Word-of-mouth marketing is a particularly prominent feature on the Internet.The Internet provides numerous venues for consumers to share their views, preferences, or experiences with others, as well as opportunities for firms to take advantage of WOM marketing.As one commentator stated, ―Instead of tossing away millions of dollars on Superbowl advertisements, fledgling dot-com companies are trying to catch attention through much cheaper marketing strategies such as blogging and [WOM] campaigns‖(Whitman 2006, p.B3A).Thus, it is important to understand whether WOM is truly effective and, if so, how its impact compares with traditional marketing activities.One of the fastest-growing arenas of the World Wide Web is the space of so-called social networking sites.A social networking site is typically initiated by a small group of founders who send out invitations to join the site to the members of their own personal networks.In turn, new members send invitations to their networks, and so on.Thus, invitations(i.e., WOM referrals)have been the foremost driving force for sites to acquire new members.As social networking sites mature, they may begin to increase their use of traditional marketing tools.Therefore, management may begin to question the relative effectiveness of WOM at this stage.The objective of this research is to develop and estimate a model that captures the dynamic relationships among new member acquisition, WOM referrals, and traditional marketing activities.In doing so, we offer several contributions.First, we are among the first to link observed WOM directly to new customer acquisition.Second, we show how toincorporate both the direct effects and the indirect effects of WOM and traditional marketing actions(e.g., a marketing action increases WOM activity, which in turn increases new member acquisition).We empirically demonstrate, for our data set, the endogeneity among new member sign-ups and these marketing variables.This highlights the need to account for these indirect effects to avoid biased estimates for both WOM and traditional marketing effects.Third, we quantify and contrast the immediate and long-term elasticities of WOM and traditional marketing actions.In particular, we document strong carryover effects for WOM in our data.Finally, we attach an estimated monetary value to each WOM referral, providing an upper bound to the financial incentive management might consider offering for WOM referrals.Indeed, the practice of seeding or stimulating WOM has grown rapidly, but quantifying the effectiveness of this activity remains difficult(e.g., Godes and Mayzlin 2004).We organize the remainder of this article as follows: We begin by summarizing previous research to help put our contributions in perspective.We then describe our modeling approach.Next, we present our empirical analysis of the data from a collaborating Internet social networking site and offer implications for theory and managers.In particular, we find that WOM referrals strongly affect new customer acquisitions and have significantly longer carryover than traditional forms of marketing used by the firm(21 days versus 3 to 7 days).We estimate a long-term elasticity for WOM of.53—approximately 20–30 times higher than the elasticities for traditional marketing.