SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
How Craigslist Works

     s1170048

     Susumu Ito
Introduction to How Craigslist
             Works



Craigslist.org is now one of the most visited
English language Web sites. The site's main
function is to host classified ads that cover
practically every category you can think of,
including housing, job postings, items for sale,
services and personals.
The Community and Gigs
          Categories
The Community category on craigslist
functions like a community center's
bulletin board. It includes subsections for
local news, politics, announcements,
volunteer opportunities, rideshare
programs and other local events and
activities. The Gigs category is for short-
term work assignments rather than
permanent jobs.
Video Gallery: Online Shopping


Craigslist is just one Web site to consult
when you're looking for unique items. In
this video from Medialink, learn about the
growing popularity of online shopping
and some sites where you can find some
truly one-of-a-kind merchandise.
The Craigslist Network




Craigslist communities appeal to a broad range of
users. The simple, organized layout and helpful
search engine makes navigation easy. Craigslist
members range from teenagers to senior citizens.
They post on the forums, shop online, trade tips
and make new friends.
Craigslist Financials



Newmark and Buckmaster strive to keep craigslist
a service-based company focused on online
communities. They have refused offers to sell the
company for a huge profit. Many of their decisions
fly in the face of traditional business strategies, but
Newmark has said that keeping the communal
culture of craigslist intact is more important than
making enormous profits [source: craigslist.org].
Craigslist Controversy
One of the biggest challenges for the craigslist
community is weeding out scam artists. The site
has a section describing common scam tactics and
what users should do if they come across them.
Scams might involve fake money orders or checks,
bait-and-switch schemes (in which you think you're
getting one thing but end up with another), phishing
schemes designed to obtain personal information,
identity theft schemes and other unethical and
illegal activities.

Contenu connexe

En vedette (20)

Espolon Oeste
Espolon OesteEspolon Oeste
Espolon Oeste
 
Green2
Green2Green2
Green2
 
B
BB
B
 
Espolon Oeste
Espolon OesteEspolon Oeste
Espolon Oeste
 
Week10 b
Week10 bWeek10 b
Week10 b
 
Week4 a2
Week4 a2Week4 a2
Week4 a2
 
Sp W13
Sp W13Sp W13
Sp W13
 
Energy Efficiency In The Office
Energy Efficiency In The OfficeEnergy Efficiency In The Office
Energy Efficiency In The Office
 
TDD of HTTP Clients With WebMock
TDD of HTTP Clients With WebMockTDD of HTTP Clients With WebMock
TDD of HTTP Clients With WebMock
 
Soil
SoilSoil
Soil
 
Presentation w6
Presentation w6Presentation w6
Presentation w6
 
Sp W12
Sp W12Sp W12
Sp W12
 
Week4 a2
Week4 a2Week4 a2
Week4 a2
 
C w3
C w3C w3
C w3
 
C w3
C w3C w3
C w3
 
C w6
C w6C w6
C w6
 
W11 b
W11 bW11 b
W11 b
 
Week9 b
Week9 bWeek9 b
Week9 b
 
B w6
B w6B w6
B w6
 
Sp W11
Sp W11Sp W11
Sp W11
 

Similaire à S P W13

Sw2week13sectionb
Sw2week13sectionbSw2week13sectionb
Sw2week13sectionbs1180051
 
Sw2week14sectionb
Sw2week14sectionbSw2week14sectionb
Sw2week14sectionbs1180051
 
Sw2week14sectionb
Sw2week14sectionbSw2week14sectionb
Sw2week14sectionbs1180051
 
How Craigslist Work
How Craigslist WorkHow Craigslist Work
How Craigslist Works1170194
 
How Craigslist Work
How Craigslist WorkHow Craigslist Work
How Craigslist Works1170194
 
How craigslist works
How craigslist worksHow craigslist works
How craigslist workss1160125
 
Week 13 Slide
Week 13 SlideWeek 13 Slide
Week 13 Slides1170005
 
Week 13 Slide
Week 13 SlideWeek 13 Slide
Week 13 Slides1170005
 
s1180014 wek5
s1180014 wek5s1180014 wek5
s1180014 wek5s1180014
 
How Craigslist Works
How Craigslist WorksHow Craigslist Works
How Craigslist Worksguest5bce5d2e
 
How craigslist works
How craigslist worksHow craigslist works
How craigslist worksTaisukeHonda
 
Roy assignment
Roy assignmentRoy assignment
Roy assignments1190130
 
Craigslist works
Craigslist worksCraigslist works
Craigslist workss1180043
 

Similaire à S P W13 (20)

Slidedasu
SlidedasuSlidedasu
Slidedasu
 
Sw2week13sectionb
Sw2week13sectionbSw2week13sectionb
Sw2week13sectionb
 
How craiglist works
How craiglist worksHow craiglist works
How craiglist works
 
Sw2week14sectionb
Sw2week14sectionbSw2week14sectionb
Sw2week14sectionb
 
Sw2week14sectionb
Sw2week14sectionbSw2week14sectionb
Sw2week14sectionb
 
How Craigslist Work
How Craigslist WorkHow Craigslist Work
How Craigslist Work
 
How Craigslist Work
How Craigslist WorkHow Craigslist Work
How Craigslist Work
 
How Craigslist Works
How Craigslist WorksHow Craigslist Works
How Craigslist Works
 
How craigslist works
How craigslist worksHow craigslist works
How craigslist works
 
Week 13 Slide
Week 13 SlideWeek 13 Slide
Week 13 Slide
 
Week 13 Slide
Week 13 SlideWeek 13 Slide
Week 13 Slide
 
s1180014 wek5
s1180014 wek5s1180014 wek5
s1180014 wek5
 
How Craigslist Works
How Craigslist WorksHow Craigslist Works
How Craigslist Works
 
How craigslist works
How craigslist worksHow craigslist works
How craigslist works
 
SW2 Slide
SW2 SlideSW2 Slide
SW2 Slide
 
Roy assignment
Roy assignmentRoy assignment
Roy assignment
 
English5
English5English5
English5
 
Week5
Week5Week5
Week5
 
Week5
Week5Week5
Week5
 
Craigslist works
Craigslist worksCraigslist works
Craigslist works
 

Plus de Susumu Ito (16)

Week12 b
Week12 bWeek12 b
Week12 b
 
Week7 b
Week7 bWeek7 b
Week7 b
 
C w7
C w7C w7
C w7
 
C w5
C w5C w5
C w5
 
C w4
C w4C w4
C w4
 
C w3
C w3C w3
C w3
 
C w3
C w3C w3
C w3
 
C w3
C w3C w3
C w3
 
Peer5
Peer5Peer5
Peer5
 
Peer4
Peer4Peer4
Peer4
 
Peer2
Peer2Peer2
Peer2
 
Peer1
Peer1Peer1
Peer1
 
Slide
SlideSlide
Slide
 
Slide w12
Slide w12Slide w12
Slide w12
 
w4_B
w4_Bw4_B
w4_B
 
w4_A
w4_Aw4_A
w4_A
 

Dernier

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Dernier (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

S P W13

  • 1. How Craigslist Works s1170048 Susumu Ito
  • 2. Introduction to How Craigslist Works Craigslist.org is now one of the most visited English language Web sites. The site's main function is to host classified ads that cover practically every category you can think of, including housing, job postings, items for sale, services and personals.
  • 3. The Community and Gigs Categories The Community category on craigslist functions like a community center's bulletin board. It includes subsections for local news, politics, announcements, volunteer opportunities, rideshare programs and other local events and activities. The Gigs category is for short- term work assignments rather than permanent jobs.
  • 4. Video Gallery: Online Shopping Craigslist is just one Web site to consult when you're looking for unique items. In this video from Medialink, learn about the growing popularity of online shopping and some sites where you can find some truly one-of-a-kind merchandise.
  • 5. The Craigslist Network Craigslist communities appeal to a broad range of users. The simple, organized layout and helpful search engine makes navigation easy. Craigslist members range from teenagers to senior citizens. They post on the forums, shop online, trade tips and make new friends.
  • 6. Craigslist Financials Newmark and Buckmaster strive to keep craigslist a service-based company focused on online communities. They have refused offers to sell the company for a huge profit. Many of their decisions fly in the face of traditional business strategies, but Newmark has said that keeping the communal culture of craigslist intact is more important than making enormous profits [source: craigslist.org].
  • 7. Craigslist Controversy One of the biggest challenges for the craigslist community is weeding out scam artists. The site has a section describing common scam tactics and what users should do if they come across them. Scams might involve fake money orders or checks, bait-and-switch schemes (in which you think you're getting one thing but end up with another), phishing schemes designed to obtain personal information, identity theft schemes and other unethical and illegal activities.