Feeds

The world may well be a great big onion, but the Internet is a big bow tie

So what happens to it on dress-down days?

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Those wacky funsters at AltaVista, Compaq and IBM reckon that the Web is like a bow tie.

Attempting to explain the mysteries of life, the universe and everything, researchers discovered that the Web is Not as Connected as Previously Thought – in fact almost a quarter of web pages can't be accessed by links from other pages.

The boffins claim that the World Wide Web is fundamentally divided into four large regions, each containing approximately the same number of pages and resembling a bow tie. The four distinct regions make up approximately 90 per cent of the Web (the bow tie), with approximately ten per cent of the Web completely isolated from the entire bow tie.

The "strongly-connected core" (the knot of the bow tie) contains almost one-third of all Web sites. Web surfers can easily travel between these sites via hyperlinks, this large "connected core" is at the heart of the Web. One side of the bow contains "origination" pages, constituting almost a quarter of the Web.

"Origination" pages are pages that allow users to eventually reach the connected core, but cannot be reached from it. The other side of the bow contains "termination" pages, constituting approximately almost one-quarter of the Web. "Termination" pages can be accessed from the connected core, but do not link back to it.

The fourth and final region contains "disconnected" pages, making up approximately 22 per cent of the Web. Disconnected pages can be connected to origination and/or termination pages but are not accessible to or from the connected core.

So now you know. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.