Monday, 27 April 2015

Google Changing its Influential Search Engine


mobile friendly
Google is planning to change the way its influential search engine endorses websites on tablets and smartphones which is expected to control where most of the individuals shop, eat and obtain information. The formula to be revised is scheduled to be released soon and would be favouring websites which Google considers as `mobile friendly’.

Websites that do not tend to fit into the description would be demoted in Google’s search results on the tablets and smartphones and those qualifying for the same would be more likely to appear at the top of the rankings which will be a prized position enabling them to translate into more visitors and money.

Though Google’s latest formula would not be affecting searches on the laptop and desktop computers it would be having a large effect on how and where individuals spend their money, now that most of them have been relying on their smartphones while comparing products in stores and in locating restaurants. Hence, Google’s new rating system is being billed by some of the search experts as `mobile-geddon’.

According to CEO of websites building service Duda, ItaiSadan, comments that `some sites will be going to be in for a big surprise when they find a drastic change in the amount of people visiting them from mobile devices’.

A Substantial Change to Its Mobile Search Rankings

As per Matt McGee, editor-in-chief for Search Engine Land, this could be the most substantial change which Google Inc. has made to its mobile search rankings, a trade publication which follows every tweak that the company makes to its secured guarded algorithms. A little more information on why Google is doing it and what is happening –
  • Websites need to be designed in order to load quickly on mobile devices to stay in Google’s good style. The content also needs to be accessible easily on scrolling up and down without the need to swipe left or right. It would also be helpful in making purchases or taking other functions on the website could be seen easily and touched on small screens.
  • Websites, if designed only with PC users in mind, graphics would take long time to load on mobile devices where the columns of text would not accommodate on the small screen making the reading a bit uncomfortable. Google has been advising websites to cater to mobile devices for several years since it is where individuals are progressively navigating for information
  • The strength of mobile searchers in the U.S. has increased by around five percent wherein inquiries on PCs have been decreasing as per research firm comScore Inc. It estimated that around 29 percent of most of U.S. search requests, about 18.5 billion, in the final three months of last year, were made on mobile devices. The bulk of searches was processed by Google with two thirds in the U.S. and more in many other countries
Websites to Comply with Google’s Mobile Standards

Google has revealed its plans almost two months back, to reduce complaints. It also created a detailed guide and a tool to test compliance along with the new standards. The company faced disturbance over the past changes in its search formula.

In 2011 and 2012, two of the bigger revisions done were focused on clearing out misleading websites. Though the attempt sounded reasonable, several websites complained that the company’s changes unfairly demoted them in the ranking and made their content difficult to locate. Though most of the major merchants as well as big companies have websites which tend to meet up with Google’s mobile standards, it is considered that the new formula is likely to hurt millions of small businesses which do not have the money or incentive to familiarise their sites for smartphones. McGee is of the opinion that `a lot of small sites do not really have reason to be mobile friendly till now and that it would not be easy for them for these changes’.

Search Formula – Variety of Factors 

The Search formula comprises of a variety of factors in determining the rankings of its results. One being the most important consideration is that whether a site contains the most relevant information pursued by the search viewer. New striking order in Google’s mobile search could demote some sites to the back pages of the search results inspite of their content being more relevant to a search request than the other sites which tend to be easier to access on smartphones.

White Andrews, Gartner analyst states that this could be a very unfortunate significance though justifiable since the viewer would not be inclined to view other sites which would take a long time to open or difficult to read on mobile devices.

He adds further that `availability is part of relevancy and a lot of people are not going to think something is relevant if they cannot get it to appear on their iPhone’. Neil Shah, research director for devices and ecosystems with Counterpoint, a technology market research firm comments that `in the end, Google is an advertising platform company and its success is based on the success of its digital marketing customers’.

Thursday, 23 April 2015

Twitter Cuts Off DataSift To Step Up Its Own Big Data Business


Twitter
In the recent push to generate the more revenue, leading micro-blogging site Twitter is building up its own business in the areas such as; commerce and advertising however; on last Friday company sets its move in another area which is big data analytics. Whereas; twitter has announced that soon it is going to terminate the agreements with all other third parties to resale the Firehose data, which is complete stream of Tweets which is related to metadata.

Not onwards Twitter, will use its own in-house based team for big data analytics, which is developed after the acquisition of Gnip in the year 2004, and now seek to develop the direct and most effective relationship with big brands, data companies and others to measure the latest market trends and the analysis of consumer sentiment with other trends which can be better understood by tracking the online behavior of users.

DataSift is one of the biggest companies which will be affected by the latest move of Twitter services, unfortunately this move is quick and DataSift was unable to post their own reaction on the issue of termination.

However; NTT Data, which is one of the company which deals in the Tweets of Japanese language is still listed as the Firehorse partner of Twitter at the time of announcement, but after few days the sources of Twitter has confirmed that NTT Data will be also affected by Friday’s announcement.

As per the statement of Nick Halstead, who is CEO of and founder of DataSift, My company was blindsided by Twitter’s announcement and this announcement was without any warning to DataSift. The more he added that we are discussing the renewal of the deal however; after being the Firehorse partner of Facebook and Twitter’s, it will not impact the business discussions.

However discussion is still I the middle of negotiations as Twitter wants them to be the partner of an open ecosystem. The all you can analyze by the last year move of Twitter when it has acquired the Gnip, which is one of the Firehose reseller and now competed against the DataSift.

The main reason behind the acquisition of Gnip was that Twitter believes that the best way to support the distribution of data of Twitter is to have its data customers with direct data relationships as most of the big data analysis is using the Twitter’s data and its analysis for developing the analytic solutions. Acquisition of Gnip was the first step of Twitter to develop he direct relationships with its data customers.

It’s clear that now social networking platforms are looking for more clear ways to use the data for analytics that seems an obvious process to do that. Still DataSift can work with Twitter. If any of the third party will buy data of Tweets from Twitter and they can supply it to DataSift to develop the new algorithms. Currently, company is in the process to raise a series of new funding as till now they have raised about $ 78 million.

Facebook Blames 'Bug' for Tracking Non-Users

Facebook
Recently, Facebook made it clear that they could have tracked the non-Facebook users who are visiting the third party websites and links through the “Like” button of Facebook as it can embed without the permission or knowledge of those web users who are not using Facebook, but it was just due to “Bug” which is now being fixed.

The issue comes in existence when an academic report of Belgian Privacy Commission was commissioned by calming that Facebook, is violating the law of European Union as they are using the tracking methods and other contract terms.

According to blog post of Richard Allan, Vice President of at Facebook for Eurpian policies, At Facebook we are totally dedicated to dispute the recent findings of Belgian report that claims the Facebook is not providing a legitimate way for its users to opt out of being shown different advertisements to them on the platform of Facebook’s personal behavior techniques.

A team of privacy engineers and experts that analyze the recent findings of Belgian researchers stated that, we have find that report has get wrong on multiple points in analyzing and asserting that how Facebook is collecting and using the user’s personal information to provide better and relevant advertisements to more than billions of users in all over the world.

However; in response to claim that Facebook want to use the Social Plugins to add the files of cookies on the browser of people who are not using the Facebook website in any form, Allan stated that after a research Belgian researchers identified “datr” and thought that it is cookie, which we are using to track the non-Facebook users whereas; later they identified it as Bug.

He said we are not interested to track the non-Faccebook users as it’s not our practice, but researchers found that these bugs may have sent the files of cookies to some of the users who are not on Facebook.

As per the Facebook officials, this is not our practice to attach the cookies on the browsers of those people who are not using the Facebook and neither visited Facebook.com for sign-up purpose, but they has visited the Facebook site with Social Plugins.

However; Allan claimed that Belgian report has a number of misstatements such as; We provides an opportunity to opt out for behavioral and social advertising, while report is claiming that its misleadingly and tracking and violating the standard Web impressions.

However; most of the social networks use the cookies in three main ways, which is to personalize the Facebook platform for real time experience for existing users, to enhance the user security and for the purpose of advertising practice. Facebook is transparent about its cookie polices and they have long disclosed the use of cookies which meant to improve the real experience of users.

Facebook, Google and other major internet platforms has come under more scrutiny that how it tracks users to serve the ads for online products and services as they have got the more refined techniques with the help of purchasing and browsing behavior of any internet user.

Reusing Technology


macbook_pro_antenna
There have been numerous companies that have provided consumers with particular pieces of technology that have been refurbished. While this may not be a new idea, it is one that is important to consider. There are many benefits to reusing technology.

Connecting People and Items

It seems as though technology is not made to last. Dishwashers and laundry machines may have an effectiveness expectancy of only a few years. When a new Motorola or an Apple iPhone is released, people tend to get rid of their old phones in order to get a new one. While there can be understanding to new technology being popular, many older models can still be effective. Not everyone needs a phone to connect to the Internet. Not everyone needs a computer to play a DVD.

It can be quite helpful for electronic devices to be connected with people who have a need. An older phone may be ideal for a senior citizen who is living alone or would like a phone to keep in the car in case of emergencies. An older computer may be ideal for a college student or a new family to America who simply wants a computer that connects to the Internet and can create documents. Whatever the situation is, there is a need for older pieces of electronics.

Reusing Older Models

From time to time, older models and devices may stop working. While it can be easy to fault a manufacturer, the reality is that wear and tear is prominent factors that cannot be overlooked. Fortunately, there are a number of retailers and businesses that provide the parts or replacement parts that are needed. Suppose an individual has a need for some Macbook Pro replacement parts.

There are plenty of places that can be contacted by phone or email that can get the parts. Technology has certainly made it easy in terms of putting in a number, such as 661-4426, that a database will recognize as to whether a part is in stock. Finally, there are techies and other professionals who are able to use the replacement parts in order for a particular device to work once again.

Reusing technology can have a powerful impact on the world. It can decrease the amount of waste in the world. Furthermore, it helps people get information or work done that is necessary. Older technology can still function well today.

Tuesday, 21 April 2015

Hackers Who Breached White House Network Allegedly Accessed Sensitive Data


Whitehouse
Hackers Breached White House Network


According to recent story published by CNN, Russian government hackers have breached the White House’s computer systems late last year and have gained access to sensitive details though the US officials disagree with it. The officials had stated earlier, that in October, the White House breach had only affected an unclassified network, though sources informed CNN that the hackers had gained access to real time non-public details of the president’s schedule.

 The sources also informed CNN that the hackers were the same ones who were behind a damaging cyber-attack on the US Department of State at the same time last year, which forced the department to close down its email system for an extended period of time. The connected cyber-attack on the State Department recently has been characterized as the worst hack on a federal agency. The White House is not unfamiliar to attacks from foreign spies.

 The Chinese have been associated in many high profile attacks of White House unclassified systems together with employee emails. Reports of the breach came in as government official have become more concerned with regards to cyber threats from Russia. James Clapper, FBI director informed Senate committee in February that `the Russian cyber threat is more severe than they had earlier assessed’.

Immediate Measures to Evaluate/Mitigate Activity

Ben Rhodes, White House deputy national security adviser stated that the breached White House system had no sensitive data. He informed CNN that they had an unclassified system and a classified system, a top secret system. And that they do not believe that their classified systems were compromised.

A White House spokesperson who tried to restrain the report informed that it was based on a security breach which was already revealed to the public. Spokesperson, Mark Stroh, informed the media, that this report was not referred to a new incident and any such activity was something which was taken seriously and in this case, they had made it clear at that time and had taken immediate measures to evaluate and mitigate the activity.

He also informed that as officials did last year, the US would not comment on who could have been behind the attacks. Investigating the security breaches are the Secret Service, FBI and US Intelligent agencies which according to CNN sources say were the outcome of one of the most sophisticated cyber-attacks that was ever directed at US government agencies.

Theft of Private Data – Government/Corporation/Individuals 

The recent report comes amid hacker thefts of private data related to governments, corporations as well as individuals, from sensitive emails to medical reports to financial information and possession of these data could tend to be of great importance to either enable criminal acts or assistance in government spying.

As per a senior department official, none of the department’s classified email system in the State Department breach was affected at that time though hackers used that breach to break into the White House’s network as reported by CNN.

The security researchers were under suspicion after the White House security breach was revealed in October, that hackers working for the Russian government were the cause of both the attacks according to the story of Washington Post and inspite of efforts beingmade by the State Department to safeguard its security, hackers were capable of accessing the system with the result that the network was owned for months by Russian hackers.