fbpx

YouTube shares new details about how its recommendation algorithm

New information about how various factors influence YouTube’s video recommendation algorithm is revealed by members of the team responsible for working on it.

Having only been implemented in 2016, we still have a rudimentary of how YouTube’s machine learning algorithm works.

We know video recommendations are influenced by factors such as clicks, watch time, likes/dislikes, comments, freshness, and upload frequency.

We do not know, for example, whether external traffic has any impact on video recommendations.

It’s also not known whether underperforming videos will affect the likelihood of future videos being recommended.

The impact of other potentially negative factors, such as inactive subscribers or too-frequent uploads, is not known either.

Those are the factors YouTube’s team discusses in a new Q&A video about the recommendation algorithm. Here is a summary of all questions and answers.

Underperforming Videos

If one of my videos under-performs, is that going to hurt my channel? Could a few poor videos pull down better videos in the future?

YouTube doesn’t make assessments about a channel as a whole based on the performance of a few videos.

YouTube only cares about how people are responding to a given video when deciding whether to recommend it to others.

The recommendation algorithm is always going to be “following the audience.”

If a video is attracting an audience then it will show up in users’ recommendations regardless of how the channel’s previous videos performed.

Channels shouldn’t be concerned about some kind of algorithmic demotion based on a dip in viewership.

It’s normal for the performance of videos to fluctuate in terms of views and other metrics. So YouTube is careful not to have all of its recommendations driven by those metrics.

Too Many Uploads Per Day

Is there a point at which the number of videos per day/week on each channel is so high that the algorithm is overwhelmed and videos slip through?

There is no limit to how many videos can be recommended to a given viewer from a channel in a single day.

Channels can upload as much as they want. How many views each video receives comes down to viewer preferences.

YouTube’s recommendation system will continue to recommend videos as long as viewers continue to watch them.

If a channel is uploading more videos than usual, and each video is getting progressively fewer views, that may be a sign the audience is getting burned out.

While there is no limit to how many videos YouTube will recommend from a channel in a single day, there is a limit to how many notifications will be sent out.

YouTube only allows 3 notifications per channel in a 24 hour period.

Inactive Subscribers

My channel has been around for quite a few years and I think I may have lots of inactive subscribers. Should I create a new channel and then re-upload the videos in order to appear more acceptable to the algorithm?

 

Inactive subscribers is not a factor impacting YouTube’s recommendation algorithm.

This goes back to the first question where YouTube says its algorithm follows the audience.

A channel with inactive subscribers can still get its next video shown in the recommendations section if it attracts an audience.

Creating a new channel and re-uploading the same videos will not help with getting those videos shown to more people.

YouTube remembers viewer preferences, so there’s little chance of reaching those inactive subscribers with a new channel.

Creators should only start a new channel if they decide to go in a different direction with their content.

External Traffic

How important is external traffic?

External traffic is definitely a factor that influences YouTube’s recommendation algorithm.

However, its influence only extends so far.

External traffic can help get a video shown in the recommendations section. But once it’s there it has to perform well with viewers.

Long term success of a video depends on how people respond after clicking on it in their recommendations.

I’m getting lots of traffic from external websites which is causing my click-through-rates and average view durations to drop, is this going to hurt my video’s performance?

YouTube says it’s not a problem if average view duration drops when a video receives a significant amount of external traffic.

Apparently it’s common for this to happen, and it has no impact on a video’s long-term success.

Again, YouTube’s algorithm cares more about viewers engage with a video after clicking on it in their recommendations.

The algorithm is not concerned with what viewers do after clicking on a video from an external website or app.

[Source: This article was published in searchenginejournal.com By Matt Southern- Uploaded by the Association Member: Jason bourne]

Categorized in Search Engine

Search Acumen, the property data insight and technology provider, has introduced its first artificial intelligence (AI) tools to speed up the legal due diligence involved in UK property transactions.

The tools have been developed to harness the advances in machine learning – a subfield of artificial intelligence that enables machines to learn from data and achieve more than they ever could with human programming. They come at a crucial time when conveyancers and commercial property lawyers are responding to a “mini boom” in the market with Government support helping to bolster demand.

While the market has spoken about the benefits of AI and machine learning, Search Acumen is one of the first to integrate this technology into the due diligence process. The tools mark a key milestone in the company’s overall vision of a more efficient and productive property market in the UK, with technology being a core driver in the UK economy’s ongoing recovery.

As with any new recruit, the machine learning tools have undergone rigorous training and are now being used to progress transactions of property portfolios by interrogating and cleansing address data submitted by legal firms. The address cleansing tool reduces hours or even days of administrative time spent error-checking and correcting property addresses and creates a more accurate and efficient due diligence process. Lawyers can then spend more time analysing the data and consulting with clients on any potential risks to progress transactions more efficiently.

Incorrect address data can be a major issue, in particular for complex transactions with hundreds or thousands of addresses, as an isolated error can hold back the entire process until it is resolved. In just a few seconds, the machine learning tool reconstructs address data – cross-referencing it against over 30 million official UK addresses – to produce a consistently accurate result. This can then be matched against external records from HM Land Registry, Local Authorities and other important data sources. As with all machine learning, the tool is continually being fed data, trained and updated.

Search Acumen’s introduction of machine learning is already helping law firms and their clients avoid delays and respond more efficiently to the latest surge in demand. The address cleansing tool is now available to all users of Search Acumen’s Portfolio Cloud service – the first technology platform underpinned by AI which allows law firms to create and manage search requirements for entire property portfolios in a single interface.

Search Acumen has simultaneously deployed machine learning to bolster its Customer Support team in delivering the best possible service to its commercial and residential clients at a particularly busy time.

The tool cuts the current processing time of search requests down significantly by categorising emails and attachments and forwarding data to the correct location. The technology is capable of filtering and combining the contents of unlimited emails and attachments received from Local Authorities and other external sources in one place in seconds. It is being constantly fed information so that in future, it can manage the Customer Service’s mailbox without intervention and at great speed without error, freeing up the Customer Support team to focus on delivering the best service to clients.

Andrew Lloyd, Managing Director at Search Acumen said: “We are at a tipping point in the property industry and now is the moment for us all to come together and support the shift towards digital once and for all. We have seen several innovations arise to facilitate property transactions under Covid-19 and collaboration will be key in harnessing these, giving consumers and businesses a faster, simpler and more reliable service.

“We have long been advocates of AI, machine learning and other transformative technologies to streamline and accelerate vital legal real estate processes. While there has been a lot of talk and hype around AI, very few are walking the walk and putting words into actions for the benefit of conveyancers and commercial real estate lawyers. The development of our first machine learning tools is an industry first, which shows how applying technology in daily workflows can radically improve tasks that are often frustrating, frequently mundane and absolutely essential to get right without delay.

“We are already seeing significant cost and time saving benefits for our clients. Rather than replacing jobs, the introduction of AI and machine learning to property transactions enables lawyers and support staff to get back to their role as expert consultants and provide first-class service to their clients.

“This is the first stage in our transition to becoming a business with AI and machine learning at its core.  Having also been part of the world’s first blockchain trial for property transactions, we are committed to equipping real estate lawyers with the tools and techniques to embrace the digital age and make the due diligence process fit-for-purpose for the 21st Century.”

 

[Source: This article was published in showhouse.co.uk By Isla MacFarlane - Uploaded by the Association Member: Dorothy Allen]

Categorized in Search Techniques

Google has been trying to make the search results that people could end up using far more organized for a long time now, and part of this has involved creating headers. This header can help search results into different categories sorted into a wide range of tabs including overview and history, and this can help user get the specific type of information that they might actually have been looking for at that current point in time.

This might also help make these headers seem a bit more prominent rather than just being components of a search card that is shown to you after you have made a particular kind of search all in all. Each header does have a distinct aspect to it when it comes to the specific type of information that it would end up using which means that separating them into unique bubbles might just make it easier for people to realize what these categories are for in the first place. Google is trying to increase engagement in some way, shape or form, and while some may argue that the search engine might be better off pursuing other options other would acknowledge that this is a reasonably effective way to go about things.

[Source: This article was published in digitalinformationworld.com By Zia Muhammad - Uploaded by the Association Member: Jason bourne]

Categorized in Search Engine

Google has admitted to regulators in other jurisdictions that the average share that accrues to the company from ad revenues is roughly 30 percent

A little after the US Department of Justice issued an antitrust action against Search Engine Google's alleged monopolistic behaviour in the web search, there are indications that its advertising practices might also be looked at closely. This would have deep implications in India.

According to a LiveMint report, about 65 to 70 percent of India's digital ad market is controlled by two companies - Google and Facebook.

Google has admitted to regulators in other jurisdictions that the average share that accrues to the company from ad revenues is roughly 30 percent, this is about the percentage that the search engine was to charge as a Play Store fee that found several startups protesting the move.

“Almost every ad that appears on every free app (on the Android ecosystem) has to essentially pass via Google," said Anupam Manur, who studies platform economics at Takshashila Institution, a think tank.

“Google has a near-monopoly on apps that run on Android," Manur said to the paper.

Reports hint that DoJ investigators have been in talks with third-party ad marketers in the US at least since the beginning of this year. The UK and Australia are also looking at Google’s dominance in digital advertising.

As ads become the central driver for the internet economy, the search engine has also seen this reflected in their revenues as it remains the main source of Google's profitability.

From ads, Google has reported $116.3 billion in advertising revenue (85 percent of overall sales) last year, the report said.

According to Smriti Parsheera, a tech policy researcher with the National Institute of Public Finance and Policy (NIPFP), it is clear that Google is a dominant player in both (web) search and search advertising.

"This is an issue that has already been decided by a case before the Competition Commission of India, in which Google was fined (in 2018)," said Parasheera, adding that the question is whether it is using this dominance in anti-competitive ways.

[Source: This article was published in moneycontrol.com - Uploaded by the Association Member: Anthony Frank]

Categorized in Search Engine

 These days everyone is spending more time online. Whether working from home or spending nearly every working hour in front of a computer screen, the internet has become an indispensable part of our social and professional lives.

Hackers, scammers, and cybercriminals lurk everywhere. They are the dark web denizens, who spy, pose, steal identities through a variety of tech-savvy and old fashioned flim-flam subterfuge, and endanger everyone’s online safety.

So, staying safe online is a three-pronged approach: 1) threat awareness, 2) shoring up defenses, and 3) staying off the threat radar by using a VPN from this page https://surfshark.com/servers/uk

Threat Awareness

Today’s online threats range from simple social engineering—email phishing, etc.-- to sophisticated backdoor attacks—Zero-day attacks, bots, Trojans, etc. In the leapfrog battle between cyber criminals and the professional defenders who provide online security that users need, the average user can become part of that defense.

Shoring up you online defenses

Here are 10 steps you can take to stay safe online:

1. Beware of browser-based social engineering

In browser social engineering, the victim clicks on a legitimate appearing web link. The link triggers a download through vulnerabilities in browser plug-in weaknesses inherent in programs like Java and Flash.

So, surfing the web can be hazardous to your privacy and security. Malicious websites can contain so-called drive-by downloads requiring absolutely no interaction other than visiting the infected page. The page will contain an exploit kit, which is prewritten code designed to search for software vulnerabilities and inject malware into the victim's computer.

2. Only visit HTTPS secured websites

Look for the little padlock icon in the top left corner next to the URL on the web browser address line. It signifies that the connection between the user and the website is encrypted. While it does not guarantee absolute safety, the HTTPS is the best option to maximize online privacy.

The best advice is to limit browsing as much as possible on unsecured sites, and never do online transactions on those unsecured pages.

3. Always log out of websites after use.

Log out of social media accounts, email clients, and online banking accounts when finished. Closing the browser window without logging off keeps the user signed in until the connection times out, which provides a window of opportunity to a potential hacker.

4. Keep social media accounts private

A public Instagram account allows anyone with an internet connection and knowledge of the user’s handle to find that user for online stalking. Loading a Facebook account with detailed personal information with stories, photos, and information on friends and families is the bait that phishing scammers and spam ad targeters rely on to invade the user’s privacy.

5. Don’t become a socially engineered “phish.”

Social Engineering is an especially popular way to deliver malware. It relies on human curiosity and emotions and tries to trick the user into downloading intrusive malware or visiting a compromised website that hosts drive-by attacks.

 

A socially engineered email message, for example, can contain scare tactics like "Your bank account has been compromised! Please change your password immediately" Clicking on the email link takes the user to a fake sign-in page. The user is tricked into entering authentic user and password information.

There are variations on the phishing theme, which include:

  • Spear phishing based on the hacker's knowledge of the victim or organization. The attacks are focused on knowledge gained about the victim from public or social media. They have an air of authenticity because fraud perpetrators customize their attack emails with the person's name, position, organization, and other information.
  • Whaling, which is a type of spear phishing that targets CEOs (i.e., “big fish”). The top official compromises login credentials, which begins phase 2 of the scam. In phase 2 the attacker impersonates the boss and uses the CEO’s email to authorize fraudulent financial transactions, for example.
  • Pharming, which is the targeting of an authentic web site and changing its IP address to redirect users to a malicious website. This can occur even if the victim enters the authentic alphabetical name of the website.

6. Install the latest antivirus software and antispyware technology.

 

Commercial grade antivirus software is the first line of defense against hidden malware. State-of-the-art antivirus software performs on-demand malware scans, and immediately scans a file or website when the user opens or enters it. Also, reputable antivirus software will block malicious web links, provide basic phishing protection and perform periodic system vulnerability scans.

7. Use the computer operating system’s built-in protection.

Both Windows 10 and MacOSX have file encryption and automatic firewall features. Some features are installed by default; others must be activated. Encrypting the computer’s hard drive will protect everything stored on a computer. If a laptop is lost or stolen, the files cannot be read. Also, a firewall is an essential connection protector and monitors all traffic entering the network.

 

8. Avoid public Wi-Fi networks, the major source of Man-in-the-Middle (MITM) attacks.

During an MITM attack a hacker gets between or eavesdrops on two parties. Each party believes they are talking only to each other. So, the MITM attacker could take over a conversation and trick the victim into disclosing personal identification or security credentials.

MITM attackers employ a variety of strategies which allow them to:

  • detect and access unsecured networks
  • send victims to fake websites through spoofing a DNS address
  • hijack session cookies which have unsecured login information to help them steal a victim’s email account.
  • detect online activity through “sniffing” software and quickly launch a MITM attack
  • employ a cleverly spoofed web application to fool the user into disclosing login credentials.

 

The best protection against MITM attacks is to never connect to a public Wi-Fi server. However using a VPN will protect the user’s privacy when using a public Wi-Fi is the only option.

9. Use strong passwords.

Passwords are the padlocks that can slow or even defeat unauthorized entry to online accounts. As a general rule, the longer a password is, the harder it is to crack. Longer passwords are more resistant to brute-force password cracking. That is where hackers use software to guess every possible combination of letters and numbers to hack a user's password.

While complexity--a variety of characters--in passwords might seem to provide more security than simple but longer ones, the opposite is true. Take the seemingly complex password "kqwbc932," for example. A brute-force attack would be able to crack it in about 11 minutes. However, a simple pass phrase like "i own 2 CATS and 1 dog" would be secure virtually forever.

The best password advice, then, is to compose an easy to remember, but unusual sentence. Use the first letters of the words in the sentence with punctuation as the password. For example, "My dad's favorite program in 1970 was “All in the Family" would become "Mydadsfpw1970wAitF."

Also, when available, use both a traditional password accompanied by some other follow-up authentication that an intruder cannot access or use. This could be anything from receiving a secure smartphone or email text with a single-use additional access code, or by answering a personal question.

As an additional safeguard, use a ridiculous answer to a personal authentication question. Example: "Q: What is the name of the city in which you were married? A: Lower Slobovia."

Then there are some common sense password hygiene practices, which include:

  • Never write the password and tape it in plain sight or other obvious places, like beneath the computer keyboard.
  • Use a different password for access to every site and every device.
  • Use the browser password manager or password management software to store multiple passwords. Password management software can generate random, impossible-to-hack passwords for quick and convenient access.

10. Back up everything.

No one is completely immune from downloading a virus or falling for a clever ransomware ruse. Hackers exploit weak points, and those weak points are usually people, who want to be helpful and cooperative. So, when the breach occurs, the best insurance for restoring everything to normal and quickly is a reliable system backup.

The backup can either be offsite or local. The key is to isolate the backup method and storage from the main system, because malware will frequently look for backup devices and go after them as well.

Use a VPN as the third element of online security

A virtual private network directs all internet connectivity through a secure and encrypted tunnel. Internet service providers and other snoopers wanting to detect the user’s online activity see only meaningless, encrypted garble when VPN is in use.

Benefits of the VPNs encrypted connection include:

Masking of the user’s IP address and login location

Defeating man-in-the-middle attacks (see Step 8 above) on public Wi-Fi locations

Accessing blocked content and net censorship in certain countries through logging into remote VPN servers

Summary and Takeaways

Staying safe online requires a knowledge of the threat, employing the proper defenses, and using the encrypted browsing of a VPN. Today’s threats involve social engineering and traps online through poisoned websites.

Shoring up online defense means safe browsing using only HTTPS secured websites, logging off sites when finished, and keeping media accounts private. Also, be aware of the types of phishing traps that rely on inside information as well as social engineering that relies on a person’s natural desire to cooperate and be helpful.

Then there are measures that can protect the user’s equipment from online hazards. Install the best anti-virus software and use the computer operating system’s built-in safeguards.

Avoid unprotected public Wi-Fi networks and use strong password strategies. Finally, remember to back up everything, and do it off site or isolated from the main system.

[Source: This article was published in greenocktelegraph.co.uk  - Uploaded by the Association Member: Joshua Simon]

Categorized in Internet Privacy

Bing is rolling out several updates to improve key search features including autosuggest, people also ask, and intelligent answers.

Bing is improving several key search features with updates designed to provide users with a wider range of results.

Now, when users search using Bing, they can expect to see:

  • Better autosuggest predictions
  • More ‘people also ask’ recommendations
  • Intelligent answers in more regions
  • Semantic highlighting in search snippets

Each of these updates are made possible due to advancements Microsoft has made in the areas of Natural Language Representation and Natural Language Generation.

Here’s how these updates will enhance the Bing search experience going forward.

Better Autosuggest Predictions

A new technology called Next Phrase Prediction is being integrated into Bing’s autosuggest feature.

 

What that means for users is Bing can now provide full phrase suggestions in real time for long queries.

Previously, Bing’s approach to handling autosuggestions for longer queries was limited to completing the current word being typed by the user.

Now, Bing can generate phrase suggestions for long queries before a user starts typing the next word.

Here are some examples of suggestions that Bing wouldn’t have been able to show previously.

a.jpeg

In addition, since phrase suggestions are being generated in real-time, autosuggest results are no longer limited to previously entered queries.

As a result of this update, coverage of autosuggest completions increases considerably, which improves the overall search experience.

More Questions in ‘People Also Ask’

Bing can now generate question-answer pairs in the People Also Ask (PAA) block for queries that haven’t been entered before.

“We use a high-quality generative model on billions of documents to generate question-answer pairs that are present within those documents.

Later, when the same documents appear on the Search Engine Result Page (SERP), we use the previously generated question-answer pairs to help populate the PAA block, in addition to existing similar questions that have previously been asked.”

This update allows for greater exploration of search results by asking more questions instead of just browsing documents.

Grow your agency with the Adzooma Marketplace
Now offering 4 months, for the price of 3.

Expanding Intelligent Answers

Bing is expanding intelligent answers to 100 languages and 200+ regions, which covers almost every area Bing is available in.

Previously, Bing’s intelligent answers were only available in 13 markets.

Bing’s intelligent answers are similar Google’s quick answers. The key difference is Bing’s intelligent answers are only displayed when the same answer is backed up by multiple trusted sources.

Google’s quick answers, on the other hand, are pulled from a single source.

Semantic Highlighting in Search Snippets

Bing is improving search snippets in all markets with a feature called semantic highlighting.

This feature allows Bing to highlight words in snippets beyond simple keyword matching.

Semantic highlighting is designed to help users find information faster without having to read through the entire snippet.

Previously, Bing’s ability to highlight snippets was limited to matching the exact keywords a user typed in the query.

“Highlighting the answer in a caption is similar to Stanford’s Machine Reading Comprehension test in which Microsoft was the first to reach human parity on the benchmark.

With Universal Semantic Highlighting, we can identify and highlight answers within captions, and do it not just for English but for all languages.”

Here is an example for the query “what temperature is a fever for coronavirus.”

ac.png

Notice how Bing doesn’t highlight the words used in the query.

Rather, Bing highlights the answer the user is looking for (100.4 degrees Fahrenheit).

Expect updates similar to these in the future as Microsoft continues to make advancements in natural language processing.

[Source: This article was published in searchenginejournal.com By Matt Southern - Uploaded by the Association Member: Daniel K. Henry]

Categorized in Search Engine

Ever Google search for your own name? Even if you haven’t, there’s a good chance that a friend, family member or potential employer will at some point. And when they do, do you know everything that they’ll find?

Google is chock full of personal information you may not always want public. Whether it’s gathered by the search engine itself or scummy people-search websites, you have a right to know what kind of data other people can access when they look up your name. Tap or click here to see how to remove yourself from people search sites.

What others see about you online can mean the difference in landing a job or spending more time looking for one. If you want to take control of your reputation online, here’s why you need to start searching for yourself before others beat you to it.

Use exact phrases to find more than mentions

To get started with searching yourself on Google, it’s important to know how to search for exact phrases. This means telling Google you want to look up the words you typed exactly as you typed them — with no splitting terms or looking up one word while ignoring others.

To do this, simply search for your name (or any term) in quotation marks. As an example, look up “Kim Komando” and include quotation marks. Now, Google won’t show results for Kim Kardashian along with Komando.com.

Using exact phrases will weed out results for other people with similar names to yours. If you have a more common name, you may have to go through several pages before finding yourself.

If you aren’t finding anything or your name is very common, use your name plus modifiers like the city or state you live in, the names of your school(s), the name of the company you work for or other details. Make note of anything that you don’t feel comfortable with others finding and either write down the web addresses or bookmark them.

A picture says a thousand words

After you’ve saved the websites you want to go over, switch over to Google’s Image Search and scan through any pictures of you. It’s much easier to look through hundreds of images quickly versus hundreds of links, and you might be surprised at the images and websites you find.

If you find an image that concerns you, you can run a reverse image search to see where it’s hosted. To do this, follow these steps:

  • Open Google Image Search and click the Camera icon in the search bar
  • Paste a link to the image or upload the image you want to search for.
  • Your results will be shown as a combination of images and relevant websites. If an exact match is found, it will populate at the top of your results.

If the image has no text on it or any identifying information, don’t worry. Your image can turn up even if it only has your face.

Where you are and where you’ve been

Next, you’ll want to run a search for your past and current email addresses and phone numbers. This helps you see which sites have access to this personal data and will also show you what others can find if they look this information up.

 

If you’ve ever signed up for a discussion board or forum with your personal email address, your post history could easily show up if someone Googles you. The same can be said for social media pages and blogs. Find and make note of any posts or content that you’d prefer to make private.

Finally, run a search for your social media account usernames. Try to remember any usernames you may have used online and look those up. For example, if you search for the username “kimkomando,” you’ll turn up Kim’s Facebook, Twitter, Pinterest and Instagram accounts.

If you can’t remember, try searching for your name (as an exact phrase in quotation marks) plus the social network you want to look up. This might reveal accounts that you forgot about or that are less private than you think. If your real name is visible anywhere, it probably falls into this category.

Keep track going forward

If you want to stay on top of information that pops up about you on social media (or the rest of the web), you can set up a free Google Alert for your name. It’s an easy way to keep tabs on your online reputation.

Here’s how to set up a Google Alert for your name:

  • Visit Google.com/alerts and type what you want Google to alert you about in the search bar.
  • Click Show options to change settings for frequency, sources, language and region. You can also specify how many results you want and where you want them delivered.
  • Click Create Alert to start receiving alerts on yourself or other search topics you’re interested in.

Bonus: What does Google know about me?

And last but not least, let’s take a moment to address data that Google itself keeps on you. By default, Google records every search you enter, your location (if you use Google Maps), video-watching history and searches from YouTube, and much more.

Anyone who knows your Google Account email and digs deep enough can learn plenty about your online activities. If you haven’t visited your Google Account and privacy settings in a while, now’s the time to do it.

Now that you’ve searched for yourself and taken note of content that people can see if they look you up, it’s time to take things a step further and actually remove any data that you don’t want public. Want to know how? Just follow along for part two of our guide to Google-searching yourself.

[Source: This article was published in komando.com By KOMANDO STAFF - Uploaded by the Association Member: David J. Redcliff]

Categorized in Search Engine

Bug causes search UI to display random Bing results

We’ve known for a while that integrating the web search in the default Windows 10 search experience isn’t necessarily the best way to go, but here’s more evidence in this regard if you still needed it.

Some users are now seeing random web results in the search box whenever they search for a specific keyword. By the looks of things, the displayed Bing results have nothing to do with the keyword that was provided in the search box.

Several Windows 10 users have confirmed in this reddit thread that the bug happens on their devices too, and some say that a simple reboot of the computer fixes the whole thing.

In one case, simply searching for “S” in the Windows 10 search UI indeed provides a link to the Settings app, but the web search returns results that have nothing to with such a term. One of the results is a Wikipedia link for the “W” keyword.

Just disable Bing results

At this point, it’s not exactly clear what’s happening, but if a system reboot doesn’t bring things to normal, you can just disable Bing results from the Windows 10 search experience completely.

To do this, just launch the Registry Editor and look for the following path:

Computer\HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\Explorer

Just create a new DWORD (if it’s not there already) that is called DisableSearchBoxSuggestions and then set its value to 1. Reboot your computer and the web search results should no longer be offered in the Windows 10 search experience.

The aforementioned bug seems to be happening on all Windows 10 versions, including the May 2020 Update whose rollout is still under way. There’s a chance that the bug is caused by a server problem, as the recent cumulative updates are unlikely to be the ones to blame for the whole thing.

 

[Source: This article was published in news.softpedia.com By Bogdan Popa - Uploaded by the Association Member: Dorothy Allen]

Categorized in Internet Search

Google accounts for nearly 96% of the market share of serps globally, in line with Statista. They’re adopted by far, Bing (2.7%) and Yahoo! (1.14%). Though they’re complicated serps, a few of their strategies are related to people who Archie started utilizing 30 years in the past, which is taken into account the primary search engine on the Web. It was developed even earlier than the World Broad Internet existed and was supposed to find information saved on FTP (file switch protocol) servers.

“Archie’s principal distinction with different serps like Google or Yahoo! is that it was not an online search engine. It was a search engine for FTP servers, that’s, servers the place there have been information ”, explains Fernando Suárez, president of the Council of Official Colleges of Computer Engineering (CCII). Its creation was some of the excellent advances within the subject of computing in 2020. That is the way it considers it the School of Computer Engineering of the University of Oviedo, which explains that earlier than 1990 customers may solely entry the net utilizing the FTP protocols: “This made searching extraordinarily difficult as we perceive it at the moment, since to entry a website you needed to know the server on which it was positioned ”.

 

Due to this fact, in line with Suárez recollects, till then it was “virtually unimaginable” to find a file if one didn’t know precisely the place it was. Archie, which allowed information to be discovered by identify, was used primarily “in universities and academia.” The fundamental operation was just like that of the various search engines which might be used at the moment, however not an identical: “It’s not in regards to the titles of FTP information, however in regards to the world Broad Internet. Now the various search engines undergo all of the webs in quest of content material, not solely in search of the identify of the web page ”.

Behind this search engine, was Alan Emtage. He’s a founding member of the Web Society, is a part of the Internet Hall of Fame and is a associate in a New York-based internet improvement firm known as Mediapolis. Again then, about 30 years in the past, I used to be a younger man from Barbados finding out Laptop Science on the McGill University in Montreal (Canada). Whereas finding out, he created Archie, whose identify derives from the phrase archive. It consisted of a set of packages that searched the repositories of software program of the Web and created a sort of index of the obtainable software program. That’s, a database through which the identify of a file might be positioned.

Emtage wasn’t the one particular person engaged on an Web search engine within the late Eighties, however Archie was the primary to be publicly distributed, in line with McGill College. And it laid the inspiration for future seekers. “Archie developed the rules on which these serps work, that are principally going out, retrieving data, indexing it and permitting folks to go looking,” explains Emtage within the Web of the College.

Suárez says that entry to the Web at the moment was very restricted. However, amongst those that may entry, it signifies that it was widespread to make use of Archie. He himself used it when he was finding out Laptop Engineering at college to seek out information with data on the right way to apply for internships or work. “It was attainable to do international searches however all you discovered was textual content, there weren’t the graphical environments that we’ve got at the moment and lots of instances you downloaded paperwork that weren’t what you needed,” he provides.

The altruistic web

On the time, in line with the engineer, Archie was “an ideal revolution.” “One thing nearly science fiction. Looking for documentation virtually on a common stage was like magic, “he says. However later “it stopped making sense when the net appeared and there started to be different kinds of serps.” Each the Web and serps have modified since then. Emtage is anxious about privateness points and the rise in customized searches with which corporations try to interpret what a person may need. “Google can take away complete elements of the search area that it might suppose you do not need to see, however [esas partes] They may comprise beneficial data that you just won’t be able to acquire now. And they’ll do it with out your data ”, explains the creator of Archie.

However there are some points of the Web and serps that you just do like, and a few of them nonetheless stay. Emtage, in a speech he gave in 2017 Upon becoming a member of the Web Corridor of Fame, he underscored that a part of the spirit of altruism that was outstanding 30 years in the past nonetheless exists. “The Web as we all know it at the moment wouldn’t exist if it weren’t for the truth that most of the organizations and individuals who labored on it at the moment freely allowed the fruit of their work to be distributed without spending a dime,” he mentioned. And he careworn that at the moment there may be nonetheless a lot of the Web that runs on open supply software program to which programmers and engineers from everywhere in the world freely contribute.

As well as, he recalled a dialog about 30 years in the past with engineer Vinton Cerf, thought of one of many fathers of the Web: “He jokingly mentioned to me: Why do not you patent the strategies you might be utilizing in Archie for the search engine? We thought of it fastidiously and got here to the conclusion that if we did, we’d prohibit folks’s capability to make use of what we had created and increase it. “

[Source: This article was published in pledgetimes.com By Bhavi Mandalia - Uploaded by the Association Member: David J. Redcliff]

Categorized in Search Engine
Although both the deep web and dark web are the hidden sections of the internet, they are not synonymous and should not be confused with each other

The terms ‘dark web’ and ‘deep web’ are often interchangeably used to describe the section of the internet that is home to criminal activities. To understand the difference between the dark web and the deep web, we must understand the different layers of the internet, as detailed below.

Surface web: The first layer of the World Wide Web is the surface web, which is also known as the visible web or the clear web. It comprises websites that are indexed by common search engines such as Google, Yahoo, Bing, and so on. These websites are available for public access without requiring permissions. It is believed that the surface web constitutes only 3-4% of the entire World Wide Web; however, according to Wikipedia, the figure stands at 10%. This means the millions of search results conducted every second are but a minuscule percentage of the overall internet!

Deep web: A step further below the surface web is the deep web. The deep web is estimated to be nearly 500 times the size of the surface web or 90% of the entire internet. This section of the internet comprises websites and data that are not indexed. They are protected from search engines and crawlers by way of encryption.

Any data behind a firewall, be it data servers, organizational intranets, or archives, belong to the deep web. A website in the deep web would require you to enter your unique username and password combination to access. Probably, the simplest examples of a website in the deep web can be web-based email, social media platform, online banking, or web-based subscription service. That brings us to the question – whether the deep web is illegal to foray into? The answer is No.

Dark web: The deepest layer of the World Wide Web is called the dark web. Although a part of the deep web, dark web goes further deep. It is a subset of the deep web and the key difference between the two is that the deep web can be home to both good and bad data, whereas the dark web is mostly illicit.

As per some estimates, the dark web probably constitutes only 0.1% of the entire internet but is the hotbed for many illegal activities. The dark web can be termed the underbelly of the internet, as it facilitates crimes such as sale/purchase of stolen data, fake identity proofs, porn, drug trafficking, contract killers, sale of arms and ammunition, and so forth.

It is the infamous part of the internet where data is intentionally hidden and criminal activities are rampant. It requires special software – such as The Onion Browser (Tor), Freenet, or I2P (Invisible Internet Project) – to access the dark web. This is because the dark web can be accessed only by anonymous users, which common browsers do not allow. Common browsers track the IP address of the users and hence enable identification of the user – something which is undesirable in the dark web.

Access to the dark web is not illegal but is fraught with numerous risks. Therefore, it is recommended to stay away from the dark web, as it can be highly dangerous.

[Source: This article was published in dqindia.com By Neetu Katyal - Uploaded by the Association Member: Deborah Tannen]

Categorized in Deep Web

AOFIRS

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media