Web Directories

Bridget Miller

Bridget Miller

Below is a visual history of "search" and search engines; hopefully it's both a trip down memory lane and a useful resource for anyone looking to learn a bit more about the history of Internet search engines. If you like the graphic or find it useful you're welcome to embed the image on your own site, link to it, or give it a Digg/Stumble/Etc. Without further fanfare, we present to you WordStream's search engine history timeline.

The History of Search Engines - An Infographic

The history of Internet search engines

The History of Search Engines

Modern search engines are pretty incredible – complex algorithms enable search engines to take your search query and return results that are usually quite accurate, presenting you with valuable information nuggets amidst a vast information data mine.

Search engines have come a long way since their early prototypes, as our Internet Search Engines History infographic illustrates. From improvements in web crawlers and categorizing and indexing the web, to introducing new protocols such as robots.txt so that webmasters have control what web pages get crawled, the development of search engines has been the culmination of multiple search technologies that developed from different search engines. Alta Vista was the first search engine to process natural language queries; Lycos started strong with a system categorizing relevance signals, matching keywords with prefixes and word proximity; and Ask Jeeves introduced the use of human editors to match actual user search queries,

How Do Search Engines Work?

First of all, let's ask what is a search engine? A search engine is a program that searches the web for sites based on your keyword search terms. The search engine takes your keyword and returns search engine results pages (SERP), with a list of sites it deems relevant or connected to your searched keyword.

The goal for many sites is to appear in the first SERP for the most popular keywords related to their business. A site's keyword ranking is very important because the higher a site ranks in the SERP, the more people will see it.

SEO, or search engine optimization, is the method used to increase the likelihood of obtaining a first page ranking through techniques such as link building, SEO title tags, content optimization, meta description, and keyword research.

Google search engines and other major search engines like Bing and Yahoo use large, numerous computers in order to search through the large quantities of data across the web.

Web search engines catalog the world wide web by using a spider, or web crawler. These web-crawling robots were created for indexing content; they scan and assess the content on site pages and information archives across the web.

Algorithms and Determining the Best Search Engines

Different internet search engines use different algorithms for determining which web pages are the most relevant for a particular search engine keyword, and which web pages should appear at the top of the search engine results page.

Relevancy is the key for online search engines – users naturally prefer a search engine that will give them the best and most relevant results.

Search engines are often quite guarded with their search algorithms, since their unique algorithm is trying to generate the most relevant results. The best search engines, and often the most popular search engines as a result, are the ones that are the most relevant.

Search Engine History

Search engine history all started in 1990 with Archie, an FTP site hosting an index of downloadable directory listings. Search engines continued to be primitive directory listings, until search engines developed to crawling and indexing websites, eventually creating algorithms to optimize relevancy. 

Yahoo started off as just a list of favorite websites, eventually growing large enough to become a searchable index directory. They actually had their search services outsourced until 2002, when they started to really work on their search engine. 

History of Google Search Engine

Google's unique and improving algorithm has made it one of the most popular search engines of all time. Other search engines continue to have a difficult time matching the relevancy algorithm Google has created by examining a number of factors such as social media, inbound links, fresh content, etc.

As evidenced by the above infographic, Google appeared on the search engine scene in 1996. Google was unique because it ranked pages according to citation notation, in which a mention of one site on a different website became a vote in that site's favor. This was something that search engines

Google also began judging sites by authority. A website's authority, or trustworthiness, was determined by how many other websites were linking to it, and how reliable those outside linking sites were.

Google search history can be witnessed by taking a look at Google's homepage progressions over the years. It's remarkable to see how basic and primitive the now most popular search engine once was.

Google Search Engine History: Looking In To the Past

Google Search Engine History

A picture of the original 1997 Google search engine homepage, back when Google was part of stanford.edu.

Google Search Engine Picture

Google search engine homepage in 2005

Search Engine Screenshot

The modern, minimalist Google of 2011.

List of Alternative Search Engines

While Google is widely regarded as the most popular search engine, there are also a number of alternative search engines one can use.

Different search engines exist for unique needs. For example, you may want a search engine to help you search for blogs specifically, or perhaps you want search engines for kids that only return sites appropriate for children.

Here is a list of search engines that cater to particular interests:

These free search engines enable you to easily find information that caters to your unique needs.

Deep Web Search Engines

In addition to standard search engines, there are deep web search engines as well.

The deep web refers to areas of the internet that are not susceptible to normal indexing, and so can't easily be found and indexed by crawlers. These alternative search engines specialize in this not-easy-to-find data.

  • Yippy is a popular deep web search engine, especially useful for niches and obscure interests
  • Scirus is a science specific deep web search engine
  • Deep Dyve is a deep web search engine for scholarly articles and journals

Top 10 Search Engines

Below is our top 10 internet search engines list. While deciding which is the "best" search engine depends on your unique wants and needs, below is a list of popular search engines, some more unique than others.

  1. Google - Offering everything from image searches, map searches, news searches, etc. With impressive keyword relevancy and a continuously improving search algorithm, it's easy to see why Google is still the reigning champ.
  2. Mahalo - Mahalo is a unique 'human-powered' search engine that employs a group of editors to manually sift and organize thousands of pieces of content. Poor guys. 
  3. Yahoo - While Yahoo has been suffering as of late, it's still a classic and a popular search engine.
  4. Bing - The Microsoft powered search engine prides itself on being a "decision engine" by offering search suggestions on the side column and providing extra search options.
  5. Ask - Clean layout and handy results grouping.
  6. AOL Search - AOL continues to be used, primarily by people who still use AOL. They're out there somewhere.
  7. Blekko - Blekko's clean, minimalist layout is easy to navigate, and /tags allow for grouping searches.
  8. DogPile - the once alternative to Google is getting a comeback and is a great alternative to bigger search engines.
  9. Duck Duck Go - Doesn't track your search history and is avoids spammy sites.
  10. The Internet Archive - This search engine lets users travel back in time to see how web pages looked in years gone by. A very fun search engine to play around with.

WordStream is a provider of PPC management software and SEO tools for continuously optimizing and expanding Internet marketing efforts, involving large numbers of keywords, such as long tail keywords and search engine keywords. WordStream provides a scalable, private, online keyword workbench—which includes a keyword analyzer and a keyword suggestion tool—to better find keywords, group keywords, conduct keyword analysis and for and turning your research into action. WordStream also provides a FREE keyword tool, which is faster, more accurate and gives you thousands more keyword suggestions than the Google AdWords Keyword Tool for both SEO and  PPC marketing.

Source: This article was published wordstream

Monday, 17 July 2017 06:20

The Dark Side of the Internet

The term Dark Web is evocative. It conjures up images of hitmen, illegal drugs, and pedophilia. One imagines a place where the dark side of human nature flourishes away from the eyes – and laws – of society at large.

Today’s infographic, from Cartwright King Solicitors, cuts through the mystique and provides an entertaining and practical overview of the Deep Web and the Dark Web.

Dark Web


Much like the ocean, the internet is divided into defined layers.

The internet most people are familiar with is called the Surface Web. Websites in this layer tend to be indexed by search engines and can be easily accessed using standard browsers. Believe it or not, this familiar part of the web only comprises less than 10% of the total data on the internet.

The next layer down, we encounter the largest portion on the internet – the Deep Web. Basically, this is the layer of the internet that is quasi-accessible and not indexed by search engines. It contains medical records, government documents, and other, mostly innocuous information that is password protected, encrypted, or simply not hyperlinked. To reach beyond this layer of the internet, users need to use Tor or a similar technology.


Tor, which stands for “The Onion Router”, is how the majority of people anonymously access the Dark Web. Tor directs internet traffic through complex layers of relays to conceal a user’s location and identity (hence the onion analogy).

How Tor Browser Works

In 2004, Tor was released as an open source software. This allowed the Dark Web to grow as people could anonymously access websites.

Since anonymity is sacrosanct in the deep reaches of the Internet, transactions are typically conducted using cryptocurrencies like Bitcoin or Ethereum. People making purchases in Dark Web markets are (understandably) concerned with privacy, so they often use a series of methods to transfer funds. Below is a common transaction flow on the Dark Web.

typical darknet transaction bitcoin

Tumblers are used as an extra step to ensure privacy. A conventional equivalent would be moving funds through banks located in countries with strict bank-secrecy laws (e.g. Cayman Islands, Panama).


The concept of the Dark Web isn’t vastly different from the Surface Web. There are message boards (e.g. 8chan, nntpchan), places you can buy things (e.g. Alphabay, Hansa), and blogs (e.g. OnionNews, Deep Web Radio). The rules, or rather a lack thereof, is what makes the Dark Web unique.

Anything that is illegal to sell (or discuss) on the Surface Web is available in the Dark Web. Personal information, drugs, weapons, malware, DDoS attackshacking services, fake accounts for social media, and contract killing services are all available for sale.

The Dark Web is full of criminal activity, but it’s also place where dissidents and whistle-blowers can anonymously share information. In countries with restrictive internet surveillance, the Dark Web may be the only place to safely voice criticisms against government and other powerful entities.


Many .onion sites are only up temporarily, so determining the true size of the Dark Web is nearly impossible. That said, Intelliagg and Darksum recently attempted to map out the Tor-based Dark Web by using a script to crawl reachable sites. They found 29,532 websites; however, 54% of them disappeared during the course of their research. Another recent study found that 87% of Dark Web sites don’t link to any other sites.

It is more accurate to view the darkweb as a set of largely isolated dark silos.

– Graph Theoretic Properties of the Dark-web

Recent changes to Tor, such as 50-character hidden service URLs, have made the Dark Web an even more untraceable place, so we may never fully know what lies beneath the surface of the internet. Based on the parts we have seen, perhaps that’s for the best.

Source: This article was published visual capitalist By NICK ROUTLEY

You can use the SIM in your Android phone to get nearby devices online when out and about, including your laptop and tablet. Our helpful guide explains how to share your mobile internet connection.

These days public Wi-Fi hotspots are becoming more common, but from time to time we all still find ourselves needing to get online when we're out of range. Fortunately, it's very easy to use the mobile data connection on your Android smartphone to share your internet connection with other devices.

This is a good alternative to using a mobile Wi-Fi router, which can be pricey and the times you need to call on it may be rather few and far between.

You might want to share your phone's data with your laptop or tablet, or perhaps you're feeling generous and want to help a friend get online. There are benefits here when you're visiting abroad, too, since only one of you will need to pay the roaming charges.

When sharing your phone's internet connection (which is also known as internet tethering) you should pay extra attention to how much data you are using. With mutliple devices connected to one SIM you'll find you gobble through your allowance significantly quicker. (Also see: How to minimise data usage on Android.)

This is possible in the phone's Settings menu. Tap on 'Data usage' to see what you've used between a given period; it makes sense to set this period to match that of your monthly contact.

Share Android's internet connection as a Wi-Fi hotspot

  • Open the Settings menu and tap on 'More' under Wireless Networks
  • Choose 'Tethering and portable hotspot', then 'Wi-Fi hotspot'
  • You'll need to set up the Wi-Fi hotspot for first time use, so select that option

Set up Android Wi-Fi hotspot

  • Input (or rename if necessary) the name you want to give the Wi-Fi network, and give it a password you will remember. This must be at least eight characters. Then hit Save
  • The Wi-Fi hotspot is now turned on, but in order for others to use it you'll need to toggle on the slider at the top of this page and ensure they know the password. They can then connect to your Wi-Fi hotspot as they would any other wireless network

  • Using your phone as a Wi-Fi hotspot doesn't only increase its data usage, it also places a hefty burden on the battery (see best power banks). To improve energy efficiency you can set the Wi-Fi hotspot to turn off when idle - just tap on the 'Keep Wi-Fi hotspot on' menu to view your options.

Source: This article was published on pcadvisor.co.uk

Monday, 22 May 2017 16:10

10 Must-Have Android Apps for 2016

In the show Cosmos, Neil deGrasse Tyson says that there were more atoms in the tip of your pinkie finger than all the stars in the sky. The number of apps in Google Play hasn't risen quite that high, but it's still an awful lot. More than one mind, let alone one phone, could comprehend. I've spent many hours refining that unmanageable mass of apps to come up with the 100 Best Android apps, but for some that's still too many, so I've whittled the list to the just the most essential.

What's Here

Simply put, this list doesn't have everything. It doesn't even begin to touch the swirling, cosmic majesty and near infinite variety of the Google Play store. What it does cover are the apps that you should install on your Android phone or tablet as soon as it comes out of the box. With these ten apps installed, you should be able to tackle just about anything.

But these ten are just the beginning. Evernote is an enormously versatile tool, but maybe you find that it's not meeting your needs for to-do lists and you want to move to a refined organizational app like Any.do. Or maybe after reading tons of comics in Comixology, you're curious to read the massive backlog of Marvel available with Marvel Unlimited.

This list of apps is a starting point, or a baseline, that I think any Android user should consider. From there, you'll want to customize and fine-tune the list to your own most-essentials apps, of course.

How I Choose Apps

When I'm not divining the 10 best Android apps, I'm usually testing Android security apps. When I'm finished, I typically wipe the phone in preparation for the next review. That means I spend more time with fresh, empty phones than the average Android user. It also means that I have to fill that phone back up with essential apps.

My first thought goes to what apps are necessary to get work done—so I turn to Google Drive and LastPass. I also need to write quick notes and manage my email, and I need a keyboard app that helps me do that, which leads me to SwiftKey.

Next I think about what kinds of apps are popular, and how I can fill those categories. Instagram, for example, is a great app for creating miniature masterpieces out of your cell phone pictures. But there are lots of other apps that provide far more options and opportunities for expression, such as PicsArt Photo Studio. There are also innumerable apps to entertain your ears, but only a few that offer powerful management tools and clever playlists, and that's where Slacker Radio comes in.

What's Missing

First, there are no games. I hear you moan, but 10 slots is simply not enough to even scratch the surface of Android games. There are simply too many of too great a variety. If you want games (and I know you do), you should read our slightly longer guide to the 15 Best Android Games. That'll take care of all your thumb-twiddling, screen-swiping needs.

Second, there are only a few Google apps on here. It's really easy to just default to them since many are, well, default on Android devices. Regarding the Google apps that did make the list, I've carefully balanced their utility against that of competitors in the space to make sure they really are the best. For example, Google Drive doubles as an excellent mobile office suite.

Finally, even though I don't eat or drink anymore, I'm only human, and that means I am weak and fallible. If I've left out a critical tool that you use every day, let me know in the comments below.

This is just the tip of the Android iceberg here at PCMag. You'll find many, many more excellent apps in our 100 Best Android Apps, and we have many more roundups where that came from. Consider the best apps to replace text messaging or everything you need to know about digital comics. We're all about apps, you see. This list will get you started, but our other reviews and roundups can take you much deeper into the galaxy of Android apps.


Are you tired of schlepping all the way to the comic book store? Heck, is there even a comic book store in your town anymore? Comics, the excellent app from digital comics groundbreakers Comixology, is both storefront and long box. You can browse the seemingly endless lists of titles, and then buy new books with a tap. It's wonderfully easy! Depending on the state of your wallet, it may even be a bit too easy.


Free with premium plans billed monthly
Evernote is your digital multi-tool. It's a great list keeper, note taker, voice recorder, to-do manager, and Web clipper. It's so open and powerful that it can be overwhelming at first, but you'll quickly find smart ways to use it. My favorite feature is optical character recognition (OCR), which makes text in photos searchable. Next time you get handed a business card, just snap a picture.

Be sure to read our organization expert Jill Duffy's advice on how to use Evernote better.


Google Reader was the best thing to happen to the Internet since sliced blogs, but it has passed on to the big Google graveyard in the sky. If reading news and blog posts on your Android is your jam, you need Feedly. It's a versatile platform, but what I like about it is that you can do all your reading in a single app. If you're looking for something a bit more stylish, try the magazine-style Flipboard. And if you're still mourning the end of RSS as we know it, we may be able to help you find a replacement for Google Reader.

Google Drive

Google Drive
Free with additional costs for increased storage
Google Drive is a great cloud storage service, but it does double duty as an excellent mobile office suite. With Drive, you can access your important files from anywhere; create new spreadsheet, text, and presentation documents; and collaborate with other people, all from your Android device. It might not replace your desktop office utilities, but it comes darn close.

Inbox by Gmail

Inbox by Gmail

I long ago realized that email is the worst thing on the planet, and have waited patiently for everyone else to get the memo. Thankfully, there's been a renaissance of email and Google Inbox is among the best options for Android. Instead of ignoring messages (as I used to do), Inbox lets you quickly manage your inbox. Its best feature are groups called bundles, which put all your finance, shopping, and low priority mail in their proper places.

Please note that our review is of the iPhone version, which is nearly identical to the Android app.


Free; $12 annually for the Premium version
Everyone knows they should be using a complex, unique password for each and every website and application. Oh, you didn't? Thankfully, there are password managers like LastPass. With a password manager, you let the app generate unique, complex passwords for each site or app that requires one. When you need to log in, LastPass can fill in the correct information, even into other apps. A new feature lets you safely bequeath your passwords to a trusted person in the event of your demise.

Though the app and service are free, using it on more than one type of device costs $12 per year, or $1 per month. Trust me, it's well worth the price of admission.

PicsArt Photo Studio

PicsArt Photo Studio
When you think of mobile image editing, you probably think of a certain Facebook-owned property modeled after old timey cameras. I'm talking about Instagram, in case you couldn't tell. But where Instagram ends, PicsArt Photo Studio begins, bringing not just filters but many more powerful tools. And if you're already a fan of Insta, you can share your PicsArt creations there to the envy of all your followers.

Pocket Casts

Pocket Casts
$3.99 Podcast fans, rejoice. Your frustrations have been heard and your prayers have been answered. "I bring you good tidings for an, excellent podcast app has been created: Pocket Casts. With this app, you can manage all your favorite podcasts and even sync them between devices. And it was good.

Slacker Radio

Slacker Radio
Free with paid, ad-free plans
There are many, many ways to get music onto your phone, but we like Slacker Radio best. This service has a huge library of songs, but it also stands out for its excellent curated playlists and wide variety of streaming content. There's a little bit of something for everyone in here, but check out Spotify if you must have on-demand Led Zeppelin.

SwiftKey Keyboard

SwiftKey Keyboard
Are you still tapping your thumbs against the screen like some kind of rube? Get with the times, grandpa, and let the words flow. With SwiftKey, you can drag you thumb or finger from letter to letter on the screen to create words, and predictive text makes shooting off short messages even faster. Since the rise of Google Keyboard and competition from the original gesture keyboard app Swype, SwiftKey has stayed ahead by packing in lots of excellent extras. You'll wonder how you ever got by without it.

Source: This article was published on me.pcmag.com

I’m always trying to find out how the world’s wealthiest are making their money. Some are born in rich families who have built a vast empire, and others made money through business ventures. By understanding the way some people have become wealthy, you can start to incorporate their mindset into your work.

For example, you’ve probably noticed how the wealthy have a certain way of doing things like conduct business, deal with people, and negotiate the price on products. You can also learn a lot from their lifestyle which will be great for your business, for example, the books they read, the way they exercise, and how they spend money.

After doing research, I learned some “success” habits of the world’s wealthiest which I’ll like to share with all of you.

Wake Up Early

The majority of successful people are early risers because it helps them get more done. In business, you’ll also get a jump start on your competition being able to network, build connections, and close the deal first thing in the morning. Waking up early also gives successful people time to exercise, meditate, and take some personal time. Once businesses have opened around 9 am, it’s harder for successful people to take off because they are busy at work.

They Network

To be successful in a very competitive world, you’ll have to network with others who have knowledge in your niche. Some people have been in business longer than you so have developed the right connections and networks that can help you too. It’s important to network with these people so you get a competitive edge over your competition. However, this must be mutually beneficial so you should always try to help in return.

The good news is locating and networking is so much easier because of the internet since you can communicate through email and find people in your industry using platforms like LinkedIn. Read this awesome article on how to network properly.

Always Learning

Successful people are always learning something new so they can stay ahead of the changing trends. They are reading the newspaper to understand the markets, and new changes coming within their industry. This will allow them to tweak and make changes to better serve their customers to continue to grow. If you stay stagnant, then your competition will find creative ways to outshine your products taking your customers away.

Keep it in The Family

The top successful people keep trusted people close to them which are why they’ll get their family involved. While researching, you’ll notice how some of the top companies are operated by family members after the founder passes away. It makes complete sense to leave the day-to-day operations to family members because these are trusted people and from a young age have been learning the business.

It’s important to also understand how families tend to leave everything behind for their children from generation to generation. Here’s a great example of the riches families in the world, and you’ll read how several companies are now operated by the children of the founder.

Money Management

Successful people know where to invest their money for the highest return. If they can’t manage on their own, then they’ll hire the best to do it for them.

However, the important thing all successful business people do is divide personal and company cash. It’s important to not pull money out the of the company because this is kept aside for growth, marketing, and if tough times are expected ahead. Companies have failed in the past because money was being pulled out of company assets for personal use. Enron is a great example of CEO’s taking large bonuses while the company was declining in customers and overall profits.

Successful businessmen know how to hire the best money managers. They want those which know how to save you money by investing it in the right place. They know how to ensure the highest tax credits are received, and the company always benefits within the lowest tax bracket.

Source: This article was published on lifehack.org by 

Is your system safe from WannaCry ransomware attack? Head over to find out how you can safeguard your Windows PC/Mac from this ransomware attack and avoid falling prey to it.

WannaCry Ransomware Attack has been making international headlines across the world recently. Specifically targeting Microsoft Windows, the virus has once again made it crystal clear why it always paid to be extra cautious and add an additional layer of protection to your system.

To ensure you have the right information about this shocking ransomware that infects computers with a malicious intention of financial extortion in return for access to the confidential information or contents of the PCs, we have made a complete guide to help remain on the safer side of the stream. Let's get across the line!

WannaCry Ransomware Attack: All You Need to Know About It

When the WannaCry ransomware attack Started?

Ransomware attack started on Friday, 12 May 2017. So far it has infected 230,000 computers in more than 150 countries.

It demands ransom payments in the cryptocurrency Bitcoin in 28 languages.

The infected systems were encrypted, and users have been fully locked out of their files. The only way they could unlock the systems was to pay $300 in Bitcoin.

It has been described as unprecedented regarding scale and massive impact.

Most Affected Companies

This ransomware attack has affected some of the well-known companies in the world. According to reports, Telefónica and many other large corporations in Spain have been hit by it.

Parts of Britain's National Health Service (NHS), FedEx, Deutsche Bahn, and LATAM Airlines have also, unfortunately, fallen prey to this attack.

How Does the WannaCry Ransomware Attack Spread?

Just like many other ransomware attacks, it primarily spreads through phishing emails. However, it's also using the EternalBlue exploit and DoublePulsar backdoor which have been created by the U.S. National Security Agency (NSA). It is reportedly spreading through a network that hasn't installed recent security updates.

Affects Only Windows Systems…

The virus has, so far, affected only Windows systems. Older versions of Windows such as Windows XP, Windows 2003 Server are under threat. It is said to utilize an exploit in Windows that directly infects the exposed systems.

The exploits had reportedly been stolen from the U.S. National Security Agency (NSA). Microsoft has added security to the latest versions of the Windows to fight out the attack. The tech giant has released updates for the affected versions of the OS as well.

It is reported that Microsoft had released a significant patch to get rid of the vulnerability for supported systems on 14 March 2017. Unfortunately, not many companies had implemented it.

Can WannaCry Infect your Mac As Well?

Though WannaCry has mainly affected the older versions of Windows, I would recommend you to be always cautious; ensuring your system is safe.

Make sure to have the up-to-date backup of your computer. It's better to keep both local and online backups of your device.

How to Safeguard Yourself from Ransomware?

Make sure to not click on links in emails or on web pages about which you don't have any idea. If you find something fake, give it a damn– completely ignore it.

If, at all, you want to visit that suspicious site, type the site name in your web browser and then head over from there.

Wrapping Up

Have any feedback? Feel free to let us know your views about WannaCry?

In the wake of such a rampant cyber attack, I would recommend you to

Source: This article was published on igeeksblog.com

Apple will hold its 28th annual Worldwide Developers Conference in California at the M CC on June 5. when the world will get to see the next operating system from the company, then the iOS 11 which will carry the next iPhones and iPads. 

According to Digital Trends, in a typical fashion, Apple will launch its next, iOS 11 operating system in beta version in June with the full version releasing early in the fall. Some of the much-hyped features among the rumored ones could actually feature in the upcoming iOS 11. Among them is the much discussed "group FaceTime calling"; this feature was discussed by some tech journo and subsequently got removed, but not before being picked by others.

The source "Cyanhat" who discussed the "group FaceTime calling", also discussed the fact that Apple is well set to make the FaceTime Audio the default method of calling between iPhone users in its next iOS 11. This move from Apple is becoming a trend after the company replaced the SMS with iMessage some years ago. FaceTime Audio will operate on LTE and will provide clearer audio quality.

Apple will definitely like to give tough competitions to online payment giants PayPal's Venmo and Square Cash by launching its own peer-to-peer money transfers to its digital wallet service. In iOS 11, Apple will change "wallet" into "Pay" and will bring important changes in money transfer. The company is looking to bring substantial changes in the "Low Power Mode" of its next iOS 11. This will make power management even better when the user is low on battery by turning on itself according to the needs.

According to Imore, there are furthermore circulating stories about some of the changes that could take place in the iOS 11. Some new features like the 'Dark Theme' which has been long due in Apple devices. Taking a note from the Apple Watch, the next iPhone 8 could use the OLED display with the "Dark Theme" to make it more power efficient.

Also, the next iOS 11 is poised to get an even more enhanced "Siri". Along with a better bunch of Siri apps, the next operating system from Apple could well see the "handoff for media" being introduced.

Source: This article was published on droidreport.com by Debapriya Dutta

Emotion regulation can be yours with this new, research-based approach.

Every time you “lose it,” whether by becoming overwhelmed by angerlaughter, or anxiety, your happiness and your relationships stand to suffer. It’s okay for toddlers to become instantly enraged when a sibling takes a toy away from them, or for teenagers to get a case of the giggles at a friend's faux pas. As adults, we’re expected to hold our emotions in check, or at least cover them up, so they don’t make us look foolish, immature, or unreliable.

A considerable amount of research on emotion regulation attempts to identify the factors that determine who is able to do so and who is not, but much of it is based on the rather untrustworthy use of self-report instruments. As we know, people are unable to determine their strengths and weaknesses when no one is there to verify their responses. It's also not clear from a questionnaire whether people are all that good at doing what they say they can. A new interview-based measure of emotion regulation addresses the limitations of self-report and also provides practical ways to apply this important concept to your own life.

Based on the premise that individuals' self-reports aren't the best way to test their emotion regulation, Auburn University’s Daniel Lee and colleagues (2017) developed an alternate approach, which they call the "Semi-Structured Emotion Regulation Interview" (SERI). Intended for use by clinicians, the SERI contains a set of questions for which respondents provide their own ratings about themselves. The advantage of this interview-based approach is that people aren't always able to label their own emotions accurately, They also may not experience each of the emotions covered in an all-purpose questionnaire. For example, if they’ve not felt extreme anger recently, then it wouldn't be appropriate to have questions that focus on anger control. If anxiety is their target emotion, the interviewer can switch instead to this area of questioning. A questionnaire would not have this flexibility. Additionally, the semi-structured nature of the interview measure means that reasonably standard questions are asked of different people, an important criterion for a psychologically useful measure. Interviewers are trained to employ follow-up questions that use approximately the same wording for each individual, rather than just playing it by ear.

For the SERI, then, once participants identify the target emotion, the interviewer proceeds to ask them about these 9 possible emotional-regulation strategies. See which ones you tend to use:

  1. Social support seeking: Turning to others for reassurance and ideas.

  2. Self-medication: Using substances or alcohol to assuage one’s emotions.

  3. Deliberate self-harm: Inducing harm onto oneself.

  4. Acceptance: Taking a situation in stride.

  5. Positive reappraisal: Looking at the bright side of a troubling situation.

  6. Expressive suppression: Trying to contain one’s emotions.

  7. Rumination: Going over and over in one’s mind the situation that provoked the emotion.

  8. Behavioral avoidance: Staying away from the emotion-laden situation.

  9. Cognitive avoidance: Staying away from thoughts about the emotion-laden situation.

For each strategy regarding one of your target emotions, indicate whether you've used it while experiencing the emotion, how often, and whether the strategy seemed to work for that situation.


A key feature of interest in these emotion-regulation strategies is whether they actually work. By definition, some strategies are less effective than others at reducing the emotion you’re trying to control. Rumination will only make anger, sadness, and anxiety increase. Self-medication and self-harm are clearly damaging to the your mental and physical well-being. Avoidance isn’t very effective when there’s a problem you need to deal with, rather than shove under the surface.

No emotion-regulation strategy is very effective, by definition, if it doesn’t reduce the strength of the emotion you’re experiencing and help you feel better. But despite the inherent disadvantages to some of these strategies, the individuals in the Lee et al. study reported using them anyhow. In part, this might be because people don't realize that the strategies themselves are problematic (such as self-medication), or they just aren't able to identify or practice more effective approaches. People responding to these questions may not have anyone they can share their problems with, or may not know how to engage in the process of reappraisal. It may seem easier just to avoid things — either behaviorally or cognitively — than to confront a potentially anxiety or anger-provoking situation.

The Auburn University-led team made several interesting observations in testing the ability of the SERI to correspond to other previously-established measures of emotion control. One was that respondents weren’t always able to recognize when they actually had experienced a negative emotion. After indicating that they probably were using one of the avoidance strategies at the beginning of the interview, as the examiner continued to query, these individuals gained some insight into their own emotional experiences. Second, respondents weren’t always able to distinguish among related emotion-regulation strategies, requiring that the interviewers provide greater elaboration.

Because it provides a more “nuanced” assessment of emotion regulation than self-reporting, the authors maintain that the SERI is a better way to get at the strategies people actually use when they try to deal with painful emotions than the standard self-report. This suggests that when we read studies based on self-report, we take them with a fairly large grain of salt. Being able to acknowledge your emotions and then detect the way you handle them is a big step toward regulating them. If you know enough to answer a self-report scale, then you probably have enough insight to go about managing the way you handle these painful feelings.

To sum up, the Lee et al. study suggests that you can benefit from taking stock for yourself of which of the 9 strategies you use for your problematic emotions. The rule of thumb in the coping literature is that there’s no one “best” way to cope with stress. However, when it comes to emotion regulation, your strategy needs to work by at least allowing you to get your emotions under control. 

Your emotional fulfillment depends on the positive generally outweighing the negative in the grand scheme of your daily life. Finding the strategies that work for you from those listed in the SERI can help you move toward that more positive and fulfilling route of self-expression.

Copyright Susan Krauss Whitbourne 2017

This article was published on psychologytoday.com

Apple has downplayed reports that millions of leaked iCloud logins are in the hands of hackers who could use the information to steal personal information or wipe devices.

But sample data seen by ZDNet shows that at least some of the data is valid login information.

The blackmail story began on Tuesdaywhen Motherboard reported that a group calling itself "Turkish Crime Family" demanded $75,000 (£59,000) in either Bitcoin or Ethereum from Apple, or $100,000 (£79,000) in iTunes gift cards in return for deleting the iCloud user data it claimed to possess.

Apple, however, released a statement denying that its servers had been hacked. Instead, it seems that the login information comes from the 2012 LinkedIn hack.

Game over, right? Apple wasn't breached, so everything is fine? Well, not so much. Turkish Crime Family handed over sample data to ZDNet, which the publication verified as actual login information. The publication spoke to 10 people who verified their data.

Despite the advice of security experts, many people re-use passwords over and over, meaning that if one of their accounts (apparently LinkedIn, in this case) is compromised, their others all become vulnerable too. So clearly people are at risk, even if it's not necessarily the millions of people that Turkish Crime Family claimed are affected.

Apple, however, has only released one statement on the story, in which it denied it had been hacked, and said it is "actively monitoring to prevent unauthorized access to user accounts and are working with law enforcement to identify the criminals involved."

Contrast Apple's statement with the actions of Redditand Twitter, which forced password resets on certain accounts after learning that login information for users had been posted online — even though the sites themselves hadn't been breached.

Apple increased iCloud security in 2014 after celebrities had their private photos stolen and posted online using a weakness in iCloud accounts. It prompted users to use two-factor authentication, which requires a phone number to get into accounts.

Encouraging users to change their passwords or to enable two-factor authentication now, in light of Turkish Crime Family's claims, could stop users having their accounts taken over or deleted. Apple said in its statement on the attempted blackmail that users should enable two-factor authentication for their accounts, but it has yet to email users or send notifications to their devices that their accounts could be at risk.

This article was originally published on Business Insider. Copyright 2017.

Top 11 Hidden Android Tips & Tricks for your Smartphones

Today I am going to show you all about Hidden Android Tips and Tricks for your Smartphones. In this Post, I will Cover you all about the Top Secret Tips and Tricks for Android Smartphone Devices. Here we are going to discuss the Top Hidden Secret Features from which you can use your Android Smartphones Devices even more Smartly and also Improve your Experience of use.

11. Say “OK GOOGLE” to Start a Search from your Screen on your Android Device

Say ok Google to text to speech

Say “OK GOOGLE” to Start a Search from your Screen. This is the Feature which is Created by the Google, From this Android Feature you can Use your Voice on your Google application to do a search from your Voice.

For Ex. if you Say ‘Helpful Apps for Android’ then it will give you all Brief Searches for the Helpful Apps for the Android Smartphones.

You can even do more by this Feature like you can get the Directions, make & Create a Reminders, Search for a Term and many more things.

10. Disable App. Notifications on your Android Smartphone

From this awesome Android features you can disable the Applications notifications on your Android Smartphone. From this feature you can also more concentrate on our work by disabling the app notifications. So that it will not distract you anymore by the notifications & also can increase your work time and less attention on your phone.

9. Set Mobile Data Limit on your Android Smartphone

Set Mobile Data Limit on your Android Smartphone

From this feature you can keep track your usage from your monthly mobile data limit set. From this feature you will be get alerted once you completed the limit you set. You can set your data usage cycle based on your ‘Month’ and that’s it (It will automatically do our Work Smartly). Now from that you can get alerted when its reach data limit.

8. Add Multiple Google Accounts on one Android Device

You can add your multiple Google accounts on your one Android Smartphone Device. You can run more than 1 Google account on your one Android Device.

From this feature you can use more than 1 Google Accounts for the many Google Services.

7. Turn Off Auto Correct on your Android Device

Turn Off Auto Correct on your Android Device

If you are annoying with the Auto Correction Suggestion Feature when Typing on your Android Smartphone Device, your Words are automatically Checked and Replacement Words are Suggested then you can also Turn Off this Auto Correction from your Android Smartphone Device. You can Turn Off the Auto Correction while you are Texting on your Device.

You can also Enable and Disable the Spell Checking Features in your Android Smartphone Device.

6. Install Custom Icon Sets for your Android Apps.

Install Custom Icon Sets for your Android Apps

One of the Cool things you can do on your Android Smartphone Device is that you can Install Custom Icons or can Customize the Icons on your Android Device. In this Feature you can Install and Customize the Custom Icon Sets of your Android Smartphones. You can do it by the third Party Launchers, you can Install and also Customize the Custom Icon Sets for your Android Devices.

You can also Create and Upload your Custom Icons too on your Android Device.

5. Restrict the Calls and Texts of Useless People on your Android

If you want to Restrict the Unwanted Calls and the Texts you want to get rid of on your Android Device. then you can do Restrict the Calls and the Texts to the only very Important People by the Apps and the Blockers.

Android Introduced a Priority Mode a New Feature from that you can Restrict the Calls and the Texts to only the very Important Persons or the Contacts you Want. You can Turn ON this Feature by simply just Pressing any Volume Button from Android Device Smartphones. From this Feature Tap the Setting Gear to Customize which Texts and the Calls will go through.

4. Identify which Apps is Slowing your Android Smartphone Device

Identify which Apps is Slowing your Android Smartphone Device

This is the one of the Good Feature to Identify which Apps is Slowing your Android Smartphone Devices. Although you cannot find that which Apps are Slowing your Android Device but you can Figure out that which Apps are Using your Android Battery the most.

Generally if your Android Smartphone Device Apps are using a lot of your Device Battery, then it will surely make slow down your Android Phone. Battery is also the Main Necessary things from which the Whole Device is Running.

You can find the Lists of the Android Device Apps vs the Battery Usage in the Settings.

You can Look at them and make always sure that what Compulsory Applications you keep and want. You can also Use some of the Live Monitoring Apps to Check that which Apps. are Running and using the most Battery when they are Running.

3. Guest Mode to Hide you most Things from your Android Devices

This is also the one of the Good Hidden Secret Features from that you can Hide your Most important Personal things from your Android Device Smartphones. This is a Mode in your Android Smartphone which is called as the Guest Mode, from this Mode you can Hide your most things like Pictures, Personal Information and many more things.

This is one of my Personally Recommend Mode for your Android Smartphones Device.

2. Get the Quick Settings Feature by two Fingers on your Android Device

Here are the another most important and the Helpful Feature for your Android Smartphone Device from that you can go to the Quick Settings by instantly the 2 Fingers.

by the way you already know that swiping down with 1 Finger on your Android Device will open the Notification Tray on your Android Device. but did you know that Swiping Down with the 2 Finger will mix Brings and go to the Quick Setting Feature.

If you really don’t know .. Try now and Check it !! (it’s very Really Helpful Hidden Tricks)

1. Dial a Contact Number, by the Easy Way on your Android

This is also a one of the Good Feature from which you can Use the most out of your Android Smartphone.

If you are not Remembering your Contacts or your Phone Number than it is the Best Hidden Way to find out your Contact Number instantly. For that , first you have to go the Keypad Section of your Android Smartphone. Then just Search with a Number to Start Finding the Desired Contact Name.

So, for an Example.. to find a Contact of Name ‘Mike’, simply just type the 6,4,5,3 so that you will get the Mike Name Contact Search. ” like [ M-6 , I-4 , K-4 , E-3 , ] ”

from, this you can save much more time for finding your Contacts through your Android Phone.

These are some amazing tips and tricks for Android devices. These Android tips and tricks will help you to use your device fast. There are a lot of hidden features of Android, that you find new in this post. Try all these Android tips and tricks and be cool.

Source : technofizi.net


World's leading professional association of Internet Research Specialists - We deliver Knowledge, Education, Training, and Certification in the field of Professional Online Research. The AOFIRS is considered a major contributor in improving Web Search Skills and recognizes Online Research work as a full-time occupation for those that use the Internet as their primary source of information.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.