Feeds

NCSA edges away from Google-Yahoo! study

Garbage in, garbage out

Top three mobile application threats

A widely discredited report that cast doubt on claims made for Yahoo!'s search engine is in even more trouble. The study appears to have been disowned by the university that published it, although a history professor originally credited as a co-author is continuing to host the material.

After Yahoo! boasted that it now used a much larger search index than Google, two students at the National Center for Supercomputing Applications at the University of Illinois conducted a study that suggested otherwise. Matthew Cheney and Mike Perry concluded that only in 3 per cent of test cases did Yahoo! return more results.

However the students' methodology came under attack almost immediately. Researchers including Seth Finkelstein and Jean Veronais drew some quite different conclusions. The NCSA researchers had used pairs of words at random picked from a word list, which skewed the results towards web pages consisting of word lists. In other words, Google was simply returning more junk than Yahoo!

(See My spam-filled search index is bigger than yours!).

Now the biohazard signs are being erected around the report, and the students have issued a qualification. Gone from the original are the University's logo, and the name of a Professor listed as a co-author alongside Cheney and Perry has disappeared.

Added is a disclaimer:

"The study was done outside the scope of any NCSA core projects. When first published online, staff at the NCSA noted several issues with the study, and some revisions have been made to the document to reflect several of these concerns."

Incredibly, the students insist they were right first time round, and have only removed one of silliest conclusions. They're re-running the data and say they expect to reach the same results they got the first time round.

Whatever.

The Professor of History and Sociology at the NCSA who hosted the original, Vernon Burton, continues to host the study, alongside an ever-lengthening list of qualifications.®

Application security programs and practises

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Microsoft: We're making ONE TRUE WINDOWS to rule us all
Enterprise, Windows still power firm's shaky money-maker
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.