Methods for retrieving content Sample Clauses

Methods for retrieving content. ‌ The available methods to retrieve content from Blogger were described in the previous section. In this section we summarise the methods that are useful for the purposes of the project. Given a set of keywords extracted from policies or defined by policy makers and a list of blog URLs one can first search the Posts in Blogger, through the search method. After gathering the related content and obtaining the ID of each returned Post, the method list can be used to retrieve the comments on this post. Searching the posts and listing the available comments also returns the id of the authors both of the post and the comments. Given these userIds information about the users can also be obtained through the get method for the user resource. An overview of methods that will be used to obtain appropriate data is presented in Table 3: Blogger API methods for retrieving content getByUrl Blog url string NO The url of the blog to retrieve. The method retrieves the blog that corresponds to the given url. Id, name, description, published, updated,url, posts, locale search Post blogId string NO The ID of the blog whose posts will be searched. The method searches the Blogger posts of a particular Blog for a certain query string and returns up to a maximum number of results. If the number of results is more than that then a pageToken is also returned that can be used to go through the next page of results in the next search request. id, published, datetime, title, content, author, location q string NO Full-text search query string. pageToken string YES The continuation token, used to page through large result sets. list Comments blogId string NO The ID of the blog. Given a blog and a post ID the method lists all the comments up to a number of results specified by maxResults, that have been posted regarding this blog post. If the number of comments is more than 20 Id, published, updated, content, author postId string NO The ID of the blog post to get comments for. maxResults unsigned integer YES The maximum number of activities to include in the response, used for paging. Acceptable values are 1 to 20, inclusive. (Default: 10) (the maximum value for maxResults) then a pageToken is also returned that can be used to go through the next page of results in the next list request. The erliest and latest dates of the comments to be fetch can also be specified. pageToken string YES The continuation token, used to page through large result sets. endDate datetime YES The latest date o...
AutoNDA by SimpleDocs
Methods for retrieving content. ‌ In this section we summarise the methods for retrieving content from Facebook that are useful for the purposes of the project. Thus, comments on the various Facebook resources (Status messages, Photos, Videos, etc.) can be extracted with the get comments methods analysed below. As shown in the Table 7: Facebook API Methods for retrieving content, these methods can as well return the id of user created this comment (form parameter). Given this id, information about the people who have created the relevant content can be accessed through the get methods on user resource. 1. So, to get insights from these or other pages devoted to a policy topic the homonymous method is going to be used. Finally, through the search method and given a set of keywords, one can search over the social graph on a set of keywords from policy models or domain models authored by policy makers. Get comments comments id String YES The Facebook ID of the access_token Id, from, comment All these fields are returned by default from an API call. If someone wants only some of them, he can use the parameters to restrict the result. message, created_time, likes, user_likes, type from String YES The user that created the comment access_token message String YES The comment text access_token xxxx://xxxxxxxxxx.xxxxxxxx.xxx/docs/ref erence/api/status/ created_time String YES The datetime the comment was created access_token likes String YES The number of times this comment was liked access_token user_likes String YES This field is returned only if the authenticated user likes this comment access_token type String YES The type of this object; always returns comment access_token Get likes likes id String YES The Facebook ID of the access_token All these fields are returned by default Id, name person who made the like from an API call. If someone wants only some of them, he can use the parameters to restrict the result. xxxx://xxxxxxxxxx.xxxxxxxx.xxx/docs/ref name String YES The Facebook name of the person who made the like access_token erence/api/status/
Methods for retrieving content. ‌ As already mentioned, among the available YouTube resources, only comments can be processed by NOMAD. However what is needed to trigger this process is to find out all videos that are in a particular category or that are associated with a particular keyword related with the policy under examination. This is evitable throuth the method Browsing with Categories and Keywords. After listing these videos, the associated comments are accessible through the method Retrieve comments. Then NOMAD can use Retrieve user profiles to gather data about users who have contributed to content. 9 xxxxx://xxxxxxxxxx.xxxxxx.xxx/youtube/2.0/developers_guide_protocol_audience ge 50 of 87 Browsing with Videos Category String YES The category of videos Developer key, retrieve a feed of all of the videos that are videos Categories and the user is interested in. Either category or tag must be specified. access token in a particular category or that are associated with a particular keyword. (YouTube uses the term "tag" to identify a keyword relevant to a video.) xxxxx://xxxxxxxxxx.xxxxxx.xxx/youtube/2 .0/developers_guide_protocol_category_k eyword_browsing Tag String YES The tag of videos. Either category or tag must be specified. Developer key, access token Retrieving data for single Videos videoid String NO P The video ID for a video is identified in feed entries by the <yt:videoid> tag. This tag appears in video feed entries – including standard feeds, search results, user-uploaded video feeds, etc. – as well as in favorite video feed entries, playlist feed entries, inbox feed entries and several types a of activity feed entries. Developer key, access token retrieve information about a single video xxxxx://xxxxxxxxxx.xxxxxx.xxx/youtube/2 .0/developers_guide_protocol_video_entr ies Id, Uploader_Id, viewCount, favourite_cou nt, numDislikes, numLikes Retrieve user profiles User userId String NO User’s unique id Developer key, access token allows you to retrieve user profiles xxxxx://xxxxxxxxxx.xxxxxx.xxx/youtube/2 .0/developers_guide_protocol_profiles About me, age, gender, hometown, location, hobbies, occupation, relationship Retrieve comments Comments Video id String NO Video’s unique id Developer key, access token xxxxx://xxxxxxxxxx.xxxxxx.xxx/youtube/2 .0/developers_guide_protocol_comments ?hl=en#Retrieve_comments Author, Content, published

Related to Methods for retrieving content

  • Customer Content As part of the Services provided under this Agreement, Customer Data will be stored and processed in the data center region specified in the applicable Ordering Document. Axway shall not access Customer Content except in response to support or technical issues where Customer provides Axway with prior Customer’s written authorization required to access such Customer Content. Axway is not responsible for unauthorized access, alteration, theft or destruction of Customer Content arising from Customer’s own or its authorized users’ actions or omissions in contravention of the Documentation. Customer’s ability to recover any lost data resulting from Axway’s misconduct is limited to restoration by Axway from the most recent back-up.

  • THIRD PARTY WEBSITES AND CONTENT The Website contains (or you may be sent through the Website or the Company Services) links to other websites ("Third Party Websites") as well as articles, photographs, text, graphics, pictures, designs, music, sound, video, information, applications, software and other content or items belonging to or originating from third parties (the "Third Party Content"). Such Third Party Websites and Third Party Content are not investigated, monitored or checked for accuracy, appropriateness, or completeness by us, and we are not responsible for any Third Party Websites accessed through the Website or any Third Party Content posted on, available through or installed from the Website, including the content, accuracy, offensiveness, opinions, reliability, privacy practices or other policies of or contained in the Third Party Websites or the Third Party Content. Inclusion of, linking to or permitting the use or installation of any Third Party Website or any Third Party Content does not imply approval or endorsement thereof by us. If you decide to leave the Website and access the Third Party Websites or to use or install any Third Party Content, you do so at your own risk and you should be aware that our terms and policies no longer govern. You should review the applicable terms and policies, including privacy and data gathering practices, of any website to which you navigate from the Website or relating to any applications you use or install from the Website. Any purchases you make through Third Party Websites will be through other websites and from other companies, and Company takes no responsibility whatsoever in relation to such purchases which are exclusively between you and the applicable third party. Company reserves the right but does not have the obligation to:

  • Customer Data 8.1 You, not bookinglab or JRNI, have sole responsibility for the entry, deletion, correction, accuracy, quality, integrity, legality, reliability, appropriateness, and right to use the Customer Data. bookinglab and JRNI is not responsible for any of the foregoing or for any destruction, damage, loss, or failure to store any Customer Data beyond its reasonable control or resulting from any failure in data transmission or operation of the Booking Service by you. 8.2 As of the MSA Start Date, JRNI is certified under ISO 27001 and shall maintain an information security program for the Services that complies with the ISO 27001 standards or such other standards as are substantially equivalent to ISO 27001. 8.3 If JRNI and/or bookinglab processes any Personal Data on your behalf when performing its obligations under this Agreement, the Parties acknowledge that you shall be the Data Controller and JRNI and/or bookinglab shall be a Data Processor and in any such case: (a) you shall ensure that you are entitled to transfer the relevant Customer Personal Data to JRNI and/or bookinglab so that they may lawfully use, process and transfer the Customer Personal Data in accordance with this Agreement on your behalf; (b) you shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable Data Protection Laws; (c) each Party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage; and (d) notwithstanding any other provision of this Agreement, but subject always to Appendix B(1) Data Protection and B(2) Data Processing Activities, nothing shall prevent JRNI or bookinglab from disclosing Customer Personal Data or Customer Data to their Group Companies, Affiliates and third party service providers as necessary to provide the Services in accordance with clause 3, and otherwise in order to comply with Applicable Law or at the request of a governmental, regulatory or supervisory authority. 8.4 From the MSA Start Date the Parties shall comply with Appendix B(1) Data Protection and Appendix B(2) Data Processing Activities 8.5 ensure that Customer Data and Personal Data deemed as a special category of Data under GDPR is not given to us in any form unless pre-agreed by us in writing 8.6 You are solely responsible and liable for any transfer of Customer Data made by you (or made by JRNI or bookinglab at your request) from the Booking Service to a third party and for ensuring that such transfer is in compliance with the Parties' obligations under the Data Protection Laws.

  • Return of Customer Data Okta shall return Customer Data to Customer and, to the extent allowed by applicable law, delete Customer Data in accordance with the procedures and time periods specified in the Trust & Compliance Documentation, unless the retention of the data is requested from Okta according to mandatory statutory laws.

  • Contract Database Metadata Elements Title: Xxxxxxx-Xxx Xxxxx Central School District and Xxxxxxx-Xxx Xxxxx Teachers Association (2007)

  • User Content You retain your rights in Your Content, subject to the rights granted below and our rights in Our Property (as defined below). You hereby grant and agree to grant us a worldwide, non-exclusive, perpetual, irrevocable, royalty-free, fully-paid, transferable license, with the right to sublicense through multiple tiers, to copy, edit, modify, adapt, publish, transmit, distribute, prepare derivative works, perform, display and to otherwise use in any manner, Your Content in connection with operation and promotion of the Service and any other purposes reasonably related to the Service or our business. To the extent reasonably necessary or appropriate to effect or support the license granted by you above, you hereby waive and agree to waive (or if not waivable, agree not to assert) any rights of privacy or publicity, or any moral rights or other similar rights, with respect to Your Content. You agree that we are not responsible for any use or disclosure of Your Content by other Users or any third party who gains access to it through the Service (which may include unintended activities by third parties, such as by hackers). You represent and warrant that you own all proprietary rights in Your Content or, with respect to any of Your Content you do not own, that you have the full authority and right to create, upload, store and/or transmit Your Content, and to grant the licenses and rights you have granted in this Agreement, and that your creation, uploading, storage and/or transmission of Your Content, and the exercise by us and other Users of the licenses and rights granted by you herein, shall not infringe any third party intellectual property or proprietary rights, nor violate any rights of privacy or publicity. We do not control User Content, and we are not responsible for its content, accuracy or reliability. We are under no obligation to edit or control User Content, although we reserve the right to review, and take certain actions with respect to, User Content in accordance with this Agreement, including the Privacy Policy (as defined below). In the event that we deem, in our sole discretion, any User Content to be inconsistent with the terms of this Agreement, the Privacy Policy, or any other rules or policies we may publish from time to time, we may remove such User Content from the Service, including incomplete posts, duplicate posts, or any other User Content we deem, in our sole discretion, to be misleading or otherwise inappropriate. On termination of your account, or this Agreement, we have no obligation to return any User Content to you, so you should retain copies of all of Your Content. In addition to and without limiting any other rights herein (including in the Privacy Policy), you also grant us the rights to (i) de-identify Your Content (i.e., to remove your name and other identifying characteristics, consistent with applicable laws and regulations), (ii) use or disclose de-identified data for any purpose, and (iii) share de- identified data with third parties.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • PARTY WEBSITES AND CONTENT The Site may contain (or you may be sent via the Site) links to other websites ("Third- Party Websites") as well as articles, photographs, text, graphics, pictures, designs, music, sound, video, information, applications, software, and other content or items belonging to or originating from third parties ("Third-Party Content"). Such Third-Party Websites and Third-Party Content are not investigated, monitored, or checked for accuracy, appropriateness, or completeness by us, and we are not responsible for any Third-Party Websites accessed through the Site or any Third-Party Content posted on, available through, or installed from the Site, including the content, accuracy, offensiveness, opinions, reliability, privacy practices, or other policies of or contained in the Third-Party Websites or the Third-Party Content. Inclusion of, linking to, or permitting the use or installation of any Third-Party Websites or any Third-Party Content does not imply approval or endorsement thereof by us. If you decide to leave the Site and access the Third-Party Websites or to use or install any Third-Party Content, you do so at your own risk, and you should be aware these Terms and Conditions no longer govern. You should review the applicable terms and policies, including privacy and data gathering practices, of any website to which you navigate from the Site or relating to any applications you use or install from the Site. Any purchases you make through Third- Party Websites will be through other websites and from other companies, and we take no responsibility whatsoever in relation to such purchases which are exclusively between you and the applicable third party. You agree and acknowledge that we do not endorse the products or services offered on Third-Party Websites and you shall hold us harmless from any harm caused by your purchase of such products or services. Additionally, you shall hold us harmless from any losses sustained by you or harm caused to you relating to or resulting in any way from any Third-Party Content or any contact with Third-Party Websites.

  • User Data We will maintain certain data that you transmit to the Services for the purpose of managing the performance of the Services, as well as data relating to your use of the Services. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Services. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data.

  • Solicitations for Subcontracts, Including Procurements of Materials and Equipment In all solicitations either by competitive bidding or negotiation made by the Engineer for work to be performed under a subcontract, including procurements of materials or leases of equipment, each potential subcontractor or supplier shall be notified by the Engineer of the Engineer's obligations under this contract and the Regulations relative to nondiscrimination on the grounds of race, color, or national origin.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!