Tag: search engines

  • ‘Google Suggest’ Results Often Hilarious,Sometimes Misleading.

    An algorithm  can not be a substitute for Human Intelligence.

    By suggesting results, based on your earlier searches and Location, the results get twisted for  Algorithm perceived ‘Results’ provide what is expected with the available data, thereby Human desire for results is blocked( as new/innovative ideas are stopped once you the results).It does not ‘think’  with an ‘open mind’ like the human mind

    You remain satisfied with the Options available without bothering to go deep.

    Google suggest teaches us to be more specific and clear in our ‘search terms’ to be more Creative.

    We must use the results as a frame of reference and nothing more.

    .” Google even helps us complete our searches by suggesting phrases based on the search activities of other users, a feature known asautocomplete. Not surprisingly, the results are often revealing and occasionally entertaining. For this article I have selected a few Google Suggest highlights.

    Note that your results will differ depending on what Google location you are using and whether or not you are logged into Google. Moreover, results will change over time, as they represent the presently most used search queries. The results below were found using Google.ca and Google.se, while not being logged into Google….

    How To vs. How Not To

    interesting google suggest

    This is one of many searches revealing how a single word makes all the difference in the world. While the ‘how not to’ crowd seems to struggle with jealousy, sadness, and laziness (How Not to Live Your Life is a British sitcom), the ‘how to’ folks are ready to take the corporate world by storm, while cooking healthy food (How to Make It in America is an American TV series).

    I’m actually surprised that there aren’t more tech-related suggestions for the ‘how to’ search query.

    Is It Safe vs. Is It Dangerous

    google suggest results

    Is It Right vs. Is It Wrong

    google suggest results

    Interestingly, ‘is it wrong to’ is most popular when searched all by itself, closely followed by concerns around sexual orientation and activities. People searching for ‘is it right’ on the other hand, seem to wonder about less trivial questions.

    Can I vs. Can You

    google suggest results

    What I found interesting about this search is how the results correlate. In case you wonder,Can You Run It is a website that tells you whether or not your computer meets the system requirements of a given game.

    After these fun comparisons, let’s have a closer look at some solo searches.

    America Is…

    google suggest funny

    http://digg.com/newsbar/Technology/12_interesting_google_suggest_results_what_they_reveal

  • Google Chrome Hacked.What about $ I Million Prize?

    While it is nice to know that your product is good and better than your Competitors,some times you invite an opportunity to expose the chinks in your armour.

    Google has found this out to its chagrin.

    Google chrome Logo
    Google Chrome.

    Buoyed by zero-day attack ever hitting Chrome in the wild, and at the previous three years’ contests, Google got bruised badly at annual Pwn2Own hacker contest when Google got hacked .

    It is wise that your friends overestimate  and enemies underestimate you.

    Safari ,Firefox and Internet Explorer are grinning.

    May be the hackers will be offered employment in any of these Companies or worse(better?) Google a la Facebook.

    What about the prize money of One Million Dollars?

    “It was a rare event. To date, there are no known reports of a zero-day attack ever hitting Chrome in the wild, and at the previous three years’ contests, Chrome escaped unscathed, even as Internet Explorer, Firefox, and Safari were brought down by exploits that allowed the attackers to take complete control of the machine running the software. The chief reason: Chrome’s security sandbox—which isolates web content inside a highly restricted perimeter that’s separated from the rest of the operating system—makes it harder to write reliable attacks.

    “We pwned Chrome to make things clear to everyone,” said Chaouki Bekrar, CEO of Vupen Security, which wielded the Chrome zero-day an hour or so after the contest began on Wednesday. “We wanted to show that even Chrome is not unbreakable.”

    A contestant in the second contest, which Google has dubbed “Pwnium,” was also able to bypass the Chrome sandbox so he could execute any code of his choosing on the underlying machine. Sergey Glazunov wasn’t on site to discuss the hack. Google has said only that for him to win the top $60,000 reward, his exploit was required to bypass the sandbox using code native to Chrome.

    Bekrar told Ars that his team’s attack exploited what’s known as a use-after-free bug to bypass DEP, or data execution prevention, and ASLR, or address space layout randomization. Both mitigations are designed to prevent hackers from executing malicious code even when they locate vulnerabilities. He said it exploited a second vulnerability that allows code to break out of the sandbox. He declined to detail the vulnerable component, except to say it was found in the “default” installation of the Google browser.

    That detail led several observers to speculate that an Adobe Flash plugin was the means Vupen used to access more sensitive parts of the operating system. While Chrome runs the media player add-on in its own sandbox, the perimeter is considerably more porous than it is with other components, security researchers say. Core functionality in Flash, for instance, requires the app be able to control web cams and microphones, access system state, and connect to display monitors and other connected devices.

    Now in its sixth year at the CanSecWest security conference in Vancouver, the contest rules this time around have been significantly reworked. In the past, organizer Tipping Point paid as much as $15,000 to the first person who exploited a fully patched version of each targeted software. Competitors on Wednesday scored 32 points for zero-day vulnerabilities, and they received 10 points each for exploiting already patched security flaws.

    http://digg.com/newsbar/Technology/google_s_chrome_hacked_within_a_few_minutes_in_the_contest_pwn2own

    Google has pledged cash prizes totaling $1 million to people who successfully hack its Chrome browser at next week’s CanSecWest security conference.

    Google will reward winning contestants with prizes of $60,000, $40,000, and $20,000 depending on the severity of the exploits they demonstrate on Windows 7 machines running the browser. Members of the company’s security team announced the Pwnium contest on their blog on Monday. There is no splitting of winnings, and prizes will be awarded on a first-come-first-served basis until the $1 million threshold is reached.

    Now in its sixth year, the Pwn2Own contest at the same CanSecWest conference awards valuable prizes to those who remotely commandeer computers by exploiting vulnerabilities in fully patched browsers and other Internet software. At last year’s competition, Internet Explorer and Safari were both toppled but no one even attempted an exploit against Chrome (despite Google offering an additional $20,000 beyond the $15,000 provided by contest organizer Tipping Point).

    Chrome is currently the only browser eligible for Pwn2Own never to be brought down. One reason repeatedly cited by contestants for its lack of attention is the difficulty of bypassing Google’s security sandbox.

    “While we’re proud of Chrome’s leading track record in past competitions, the fact is that not receiving exploits means that it’s harder to learn and improve,” wrote Chris Evans and Justin Schuh, members of the Google Chrome security team. “To maximize our chances of receiving exploits this year, we’ve upped the ante. We will directly sponsor up to $1 million worth of rewards.”

    In the same blog post, the researchers said Google was withdrawing as a sponsor of the Pwn2Own contest after discovering rule changes allowing hackers to collect prizes without always revealing the full details of the vulnerabilities to browser makers.

    http://arstechnica.com/business/news/2012/02/google-pledges-1-million-in-cash-to-hackers-who-exploit-chrome.ars

  • Google’s New Privacy Policy Information is A Bikini.

    Google‘s privacy Policy Information is like a Bikini,it coceals more than it reveals.

    Google wants to store your personal information for the Samaritan service of helping the Society such as identifying disease, correlating data and helping the Society run smoothly.

    Your Data  becomes anonymous after 9 months and IP address cookies are deleted after this period.

    You have the solemn assurances of Google on this.

    The Google also will not(?) share your information with any one including advertisers or market Researchers.

    Your information is stored only to serve you.

    Making our search algorithm better

    You’re about to go out for dinner and have to choose between two identical-looking restaurants on the same street. One is full, the other empty. You’ll probably choose the bustling restaurant, and when it comes to Google Search, we often use the same principle when selecting which results to give you. To bring you the most relevant results for each search query, we look at the usage patterns of millions of people using Google every day.

    It is by analyzing these search patterns via our logs data that our engineers are able to improve the search algorithms that determine the order in which our search results appear. If our engineers can see that people are consistently clicking on the top result for any given query, they know they are doing something right. If people are hitting “next page” or typing in another query, they know they’re not delivering the results that people are looking for, and can then take action to try and improve the search algorithms.

    Have you ever wondered what happens when you type your query into the Google search box and what data we store about that search?

    Let’s take a simple search like “cars.” When someone types the word “cars” into the Google search engine, the request gets sent from that user’s computer over the internet to our computers, which look for the right search results. Once our computers have found the results, they send these back to the user’s computer, all in a fraction of a second.

    We then store some data about this exchange: the search query (“cars”), the time and date it was typed, the IP address and cookie of the computer it was entered from, and its browser type and operating system. We refer to these records as our search logs, and most websites store records of visits to their site in a similar way.

    Here’s what a typical log entry at Google looks like:

    123.45.67.89 - 25/Aug/2011 10:15:32 - http://www.google.com/search?q=cars - Chrome 2.0.0.7; Windows NT 5.1 - 740674ce2123e969

    But what does this all mean?

    IP address:
    123.45.67.89 is the IP address assigned to the user’s computer by his or her service provider. Just like other websites, when you ask Google for a page (a search results page, for example), we use your computer’s IP address to ensure that we get the right results back to the right computer.It’s important to remember that IP addresses don’t say exactly where an individual user is, or who they are. In fact, some Internet Service Providers (ISPs) give users a different IP address every time they log onto the web. The most Google can tell about a user from his computer’s IP address is that user’s general location (for example, Boston) and possibly the ISP they use to connect to the Internet. Only the ISP (who actually controls the user’s account) can match an individual with an IP address.
    Time and date:
    25/Aug/2011 10:15:32 is the date and time the user typed the query into Google.
    Search query:
    http://www.google.com/search?q=cars is the search query, in this case “cars.”
    Browsers and operating systems:
    Chrome 2.0.0.7; Windows NT 5.1 is the browser and operating system being used.
    Cookie:
    740674ce2123a969 is the unique cookie ID assigned to a browser the first time a user visits Google. Like an IP address, a cookie doesn’t tell Google who a user actually is or where they live – it only identifies a computer. You can delete these cookies at any time in your computer’s browser.

    Time limits on data retention

    We anonymize IP addresses after 9 months and alter the cookie numbers in our logs permanently after 18 months. This breaks the link between the search query and the computer it was entered from and is similar to the way in which credit card receipts replace digits with hash marks to improve customer security.

    Here is what an IP address could look like in our logs after 9 months: 123.45.67.XXX. After 18 months, the cookie will be replaced by a newly-generated cookie number.

    Google was the first major search engine to announce time limits on the retention of logs data, and we’re pleased that others in the industry have followed our lead.

    Just like cookies in the offline world, online cookies don’t last forever. Google cookies expire after two years. Additionally, Google has always allowed people to use its services without cookies (though this may mean losing the use of some features or functions of particular products).

    Why we store search logs

    We use search logs for many purposes, for example, to keep our services secure, develop new features that make search faster and more relevant, and even to predict outbreaks of disease.Learn more

    It’s good to know what’s stored in a search log when you search on Google. Read the next topic: How ads are targeted by Google.

    https://www.google.com/goodtoknow/data-on-google/search-logs/

    Some of the things we learn from how people search can be useful for communities all over the world.

    Disease

    Imagine that somewhere in a remote place a man goes to Google and types in [fever]. Seconds later somebody nearby searches for [muscle ache]. And when more and more people from the same region start doing a similar search, it’s likely that something’s up.

    Sometimes general patterns of search behavior match up closely to things happening in the offline world. When those correlations are strong, it can be possible to use spikes in a particular search to understand real-world behavior more quickly than traditional methods can notice a change. Using the aggregated searches of millions of people, we can help spot flu outbreaks or changes in economic conditions, giving professionals more time—and better information—to make decisions.

    In 2008, we found that some search terms are good indicators of actual flu activity. It turns out that traditional flu surveillance systems take between one and two weeks to collect and release surveillance data. But Google search queries can be counted automatically very quickly. By making our flu estimates available each day, Google Flu Trends can provide an early-warning system for outbreaks of influenza. We have used the same insight to look at patterns of other diseases and have created an early warning system for dengue fever.

    It’s important to remember that Google Flu Trends can never be used to identify individual users because we rely on anonymized, aggregated counts of how often certain search queries occur each week. We rely on millions of search queries over time, and the patterns we observe in the data are only meaningful across large populations of Google search users.

    Economics

    By studying the way people search, we can also pick up on other important trends, like changes in the economic climate. For example, the Bank of England tracks search trends related to consumer behavior in the United Kingdom. By watching out for changes in demand for goods, mortgages and concerns about inflation, the Bank hopes to improve the speed of economic reporting and the responsiveness of fiscal decision making.

    Google Correlate

    Because we believe there are so many things that can be learned from aggregated search activities, we’ve introduced Google Correlate. This allows researchers to upload their own data series and see a list of search terms whose popularity best corresponds with real-world trends.

    It’s good to know how search data can enable us to help society. Read the next theme: How you can manage your data online

    https://www.google.com/goodtoknow/data-on-google/helping-society/

     

    If the above video is unavaiable her  please follow Link below.

    http://www.youtube.com/watch?v=KGghlPmebCY

  • Keywords and Blogging.

    Graphviz Keywords
    Image by Aldon via Flickr

    Keywords in the context of Blogging, refers to the set of words that indicate the subject dealt with in the Blog.

    Keywords follow a logical sequence in the structure of the blog.

    If one were to write on Cancer of the Lungs , the natural sequence will be  about what cancer is,general symptoms,causes if any, various types of cancer,Lung Cancer and so on.

    Here you will find a logical sequence and the Searches follow a uniform pattern based on Reasoning.

    So key words must relate to the subject on hand that flows automatically as you write along.

    There must be no artificial loading of keywords as suggested by some SEO sites as the Search Engines are programmed to detect such artificiality.

    There are two aspects in Keywords in respect of websites.

    One is the writing aspect and another is the technical aspect of the website in relation to structure of the blog in the web site.

    The later one will take care of it if your subject is naturally dealt with and not every one of us can control the technical aspect of the web site as all of us are not technical people.

    The General principle is to write to inform and to share but never with the sole intention of increasing traffic.

    Quality key words are those which have strong relevance and as such will automatically bring in traffic.

    Though I am not a blogger who has very high traffic,I found that natural writings brings in quality readers who are really interested and urge you to write.

    ‘Keywords are the words that are used to reveal the internal structure of an author’s reasoning. While they are used primarily for rhetoric, they are also used in a strictly grammatical sense for structural composition, reasoning, and comprehension. Indeed, they are an essential part of any language.

    There are many different types of keyword categories including: Conclusion, Continuation, Contrast, Emphasis, Evidence, Illustration and Sequence. Each category serves its own function, as do the keywords inside of a given category.’

    http://en.wikipedia.org/wiki/Keywords

    Enhanced by Zemanta
  • Your Search Tells you what you are.

    Shows how our thinking is controlled.

    Search terms can be parsed in a similar fashion. Every searcher can be defined by the words they use when searching. Search engines and marketers alike know this and do their best to deliver you relevant results based on who they think you are and your intent at that exact moment.

    As an extension of the targeting by intent strategy, a sophisticated and growing segment of brands are turning to searcher demographics to conduct detailed analyses of their online audience. There are already lots of opportunities for marketers to customize their messaging, placement, landing pages, and the like, for every consumer segment, but the brand managers out there have been using search terms to actually identify the attributes of a “Coke” vs. a “Pepsi” searcher. Considering the money that is spent on brand advertising, knowing how your branded search audience differs from that of the competition should be a valuable nugget of information.

    To illustrate the point, below are some fun and interesting universal brand identities with dichotomous stances. Each example analyzes the demographics of searchers that used the branded terms for the month of July, and are based on head of household. The index baselines are the searcher demographics for the entire US search population. Available measures are Age, Income, Location (home/work), Region of the US, Household Size, and Presence of Children in the Household….

    Google+ or Facebook?

    The most striking differences between Google+ searchers and Facebook searchers are in Age and Income level. Google+ searchers overwhelmingly skew towards 18-34 year olds. Clearly Google+ is a popular brand with the younger segments, and good knowledge for Google to have as they develop their acquisition strategy and evolve their user base. Since Facebook is a much more mature brand in the social networking space, their search audience falls closely in line with the search population at large.

    The income skews are even more distinct, essentially polar opposites of each other. More than 32% of Google+ searchers have a household income of $100K or greater, compared to 23% of Facebook searchers. Google+ is definitely off to a fast start in reaching the most desirable income segments, which may make it more attractive to advertisers.

    http://blog.comscore.com/2011/08/searcher_demographics.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+comscoreblog+%28comScore+Voices%29