Connect with us


Wanda To Build Over 100 4D Cinemas In China



– Wanda Cinema Line is expanding cooperation with MediaMation and CJ4D Plex to build over 100 new “4D” cinemas in China.
– 4D cinema technology goes one step beyond 3D cinemas by featuring shaking seats, water spray, and scents.
– MediaMation and CJ4D will provide MX4D and 4DX technology and equipment to Wanda, including special seats, and light, smoke, and wind machines.

Wanda Cinema Line, China’s biggest movie-theater operator, is expanding cooperation with U.S. company MediaMation and South Korea’s CJ4D Plex to build over 100 new “4D” cinemas in China.

4D cinema technology goes one step beyond 3D cinemas by featuring shaking seats, water spray, and scents to provide a multiple sensory cinematic experience.

MediaMation and CJ4D will provide MX4D and 4DX technology and equipment to Wanda, including special seats, and light, smoke, and wind machines, according to the Wanda Cinema website (link in Chinese).

“Wanda Cinema is China’s 4D viewing trendsetter.” Liu Xiaobin, executive chairman of Wanda Cinema Line Cooperation said in the statement. “I believe Wanda Cinema will be able to provide more diverse viewing options and disrupt the cinema-going experience for audiences through this deal.”

China is now the world’s second-largest film market, and the country is expected to surpass North America as the biggest box office territory in the next few years.

Theaters are being built in China at a rapid clip. Wanda Cinema Line CEO Zeng Maojun said in June that the number of theaters could go from around 40,000 screens to 120,000, based on the United States’ example.

Wanda and MediaMation opened in China in the early 2000s, followed by another in Wanda’s hometown of Dalian. The two companies are also working together in Changchun, Fuzhou, Wuhu, Harbin, Guangzhou, and Changsha, among others.

In August, Wanda announced it will build 4,000 3D screens in its theaters across the country in collaboration with Beverly Hills company RealD. This is the largest 3D screen installation in history.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


Social Media Marketing




“Social media has become a primary tool for higher levels of fan engagement, directly driving lead generation through interaction and content sharing that is especially relevant to media companies. Social Media Marketing: The Next Generation of Business Engagement deconstructs the tools and techniques, showing you how to apply social technology to your business.”

The Next Generation of Business Engagement

Social technologies, on a mass scale, connect people in ways that facilitate sharing information, thereby reducing the opportunities for marketplace exploitation—whether by charging more than a competing supplier for otherwise identical goods and services or charging anything at all for products that simply don’t work. Sunlight is a powerful disinfectant, and the collective knowledge that powers the Social Web is the sunlight that shines in these new connected marketplaces. The Social Web dramatically levels the playing field by making information plentiful, just as it also levels businesses and organizations that operate on the principles of making information scarce. The Social Web exposes the good, the bad, and the ugly, simultaneously raising up what works and putting down what doesn’t without regard for the interests of any specific party. Web 2.0 technologies—expressed through social CRM, vendor relationship management, collective ideation, customer-driven support forums, and communities where participants engage in all forms of social discourse—act together to equalize the market positions of suppliers, manufacturers, business and organizational leaders, customers and stakeholders. To again quote Sir Tim Berners-Lee, “If misunderstandings are the cause of many of the world’s woes, then (we can) work them out in cyberspace. And, having worked them out, we leave for those who follow a trail of our reasoning and assumptions for them to adopt, or correct.”

So whether supporting Unilever, P&G, and Nestlé, all working with Greenpeace to ensure supplier compliance in the use of sustainable palm oil and thereby reducing environmental damage in no-longer “far away” places like Malaysia, or just making someone’s day run a little more smoothly by preventing a coffee stain through a simple innovation like Starbucks’ “no splash” stirring stick, the businesses and organizations embracing social technologies are delivering better solutions—developed through direct collaboration with customers and stakeholders—to the world’s woes however large or small they may be. Contemporary businesses, cause-based organizations, and governing authorities are increasingly meeting the challenge of “opening up” and operating with their customers and stakeholders—often through a similarly empowered and connected workforce—to deliver self-evident value that gets talked about. For these entities, their customers, suppliers, and stakeholders are the new source of future innovations and “marketing,” and therefore also the drivers of long-term growth and success. This is what social business is all about.

Social Business (Feedback)

For a lot of organizations—including business, nonprofits, and governmental agencies—use of social media very often begins in Marketing, public communications, or a similar office or department with a direct connection to customers and stakeholders. This makes sense given that a typical driver for getting involved with social media is a slew of negative comments, a need for “virality,” or a boost to overall awareness in the marketplace and especially in the minds and hearts of those customers increasingly out of reach of interruptive (aka “traditional”) media. In a word, many organizations are looking for “engagement,” and they see social media as the way to get it. The advent of Web 2.0 and the Social Web is clearly a game-changer, on numerous fronts. Given the rush to implement, and the opening focus on marketing specifically versus the business more holistically, many “social media projects” end up being treated more like traditional marketing campaigns than the truly revolutionary ways in which a savvy business can now connect with and prosper through collaborative association with its customers. As a result, the very objective—engagement, redefined in a larger social context—is missed as too many “social media campaigns” run their course and then fizzle out.

everyone. The collaborative technologies that now define contemporary marketplaces—technologies commonly called “social media,” the “Social Web,” or “Web 2.0”—offer a viable approach to driving changes in deeper business processes across a wide range of applications. There is something here for most organizations, something that extends very much beyond marketing and communications. This chapter, beginning with the Social Feedback Cycle, provides the link between the basics of social media marketing and the larger idea of social technologies applied at a “whole-business” level. As a sort of simple, early definition, you can think of this deeper, customer-driven connection between operations and marketing as “social business.”

Beginning with the emergence of Web 2.0 technologies—the set of tools that make it easy for people to create and publish content, to share ideas, to vote on them, and to recommend things to others—the well-established norms of business marketing have been undergoing a forced change. No longer satisfied with advertising and promotional information as a sole source for learning about new products and services, consumers have taken to the Social Web in an effort to share among themselves their own direct experiences with brands, products, and services to provide a more “real” view of their research experience. At the same time, consumers are leveraging the experiences of others, before they actually make a purchase themselves. The impact on marketing has been significant, to say the least.

Continue Reading


Machine learning to re-identify anonymized data




Researchers from Imperial College London and the Catholic University of Louvain (UCLouvain) in Belgium explain in an article that it is possible to re-identify individuals by reverse-engineering a sample of anonymous data to the using machine learning techniques.

The main solution for sharing data while preserving the privacy of individuals is to remove from the dataset the registration of direct identifiers such as name and email address, and to share only a portion of these. data. For example, consider the case of several women in their thirties living in Brisbane, Australia. Looking for these demographics in a sample of anonymized data should, therefore, theoretically find any number of people. “But the problem is that it does not work,” the researchers said. With only a few more attributes, a record is quickly becoming more exceptional.

The statistical model of researchers quantifies the probability that an attempt at re-identification will succeed, even with a “very incomplete” dataset. For example, according to an online tool that supports their demonstration, with only gender, marital status, date of birth, and postal code, there is a 86% chance of correctly identifying an individual in any set of anonymized data. “This is information quite commonly requested by companies,” said Dr. Yves-Alexandre de Montjoye, lead author of the article “Estimating the success of re-identifications in incomplete datasets using generative models” published in Nature Communications. According to this publication, 99.98% of Americans were correctly re-identified in any anonymized data set available using only 15 characteristics, including age, gender, and marital status.

Any facts, grouped together

Validated on 210 datasets from demographics and surveys, researchers say their technique – which uses Gaussian copulas to model uniqueness – shows that “even very small sample sizes are not enough to prevent re-identification and protect the data “. In fact, “contrary to popular belief, the sampling of a dataset does not offer plausible deniability and does not effectively protect the privacy of individuals,” added Yves-Alexandre de Montjoye.

Shared and exchanged datasets often contain many attributes. For example, the Experian data broker sold Alteryx access to an anonymized dataset containing 248 attributes per household for 120 million Americans. “Even though there are a lot of people in their thirties, male, living in New York, there are fewer people who were born on January 5, drive a red sports car and live with two children, two girls, and a dog. There is probably only one individual meeting these criteria, “said Dr. Luc Rocher, co-author of the article. There are few protections against such attempts to re-identify – although the Australian federal government has already considered criminalizing the re-identification of Commonwealth datasets disclosed as part of its open data program.

A risk of re-identification downplayed by governments

The sale of a sample of anonymous data means that they are no longer subject to data protection regulations – such as the EU General Data Protection Regulation (GDPR) and the Consumer Privacy Act (CCPA). of the State of California – and therefore they can be freely used and sold to third parties such as advertising agencies and data brokers. In its “Disidentification” Guide published last year, the Office of the Privacy Commissioner of Australia states that sampling creates “the uncertainty that a particular person is included in the data set”. But, according to Mr. de Montjoye, “businesses and governments minimize the risk of re-identification by arguing that the datasets they sell are still incomplete. Our findings show that this might not be helpful. “

There are many examples of supposedly anonymous data sets that were later disclosed and reidentified. In 2016, journalists re-identified public figures in a set of anonymized data corresponding to the browsing history of 3 million German citizens they acquired for free from a data broker. They were able to rediscover a judge’s pornography preferences and the drugs used by a member of Parliament. In the same year, researchers at the University of Melbourne were able to decrypt identification numbers used by service providers in a 10% sample of medical billing records published by the Australian Department of Health. This sample could allow Medicare service providers to re-identify data in the dataset.

Stricter rules for anonymous sharing of requested data

A year later, the same researchers showed how patients could also be re-identified by linking unencrypted portions of their records to known information about the person. “A few banal facts taken together are often enough to isolate an individual,” remark Culnane et al. Imperial College and UCLouvain researchers have called for stricter rules on anonymous sharing of data. “The purpose of anonymisation is to facilitate the use of data for the benefit of society. This is extremely important, but it should not and should not be at the expense of the privacy of individuals, “said Professor Julien Hendrickx, another co-author of the article. “It is essential to apply robust anonymization standards and to take into account new threats such as those shown in this document,” he added.

Continue Reading