Feeds

Search usurping email as top internet activity

Searching what, though?

Secure remote control for conventional and virtual desktops

Search is catching up to email as the internet's number-one activity, according to a new poll.

Forty one per cent of US adults who surfed the internet on a "typical day" in September 2005 used a search engine, up from 30 per cent in June 2004, according to the latest Pew Internet & American Life survey of consumer behavior.

Email continues its online reign, though. Fifty two per cent of Americans online sent or received email on a typical day in September 2005 - up from 45 per cent in June 2004.

The results come as IT giants and start-ups spawn in the search market, with dreams of becoming the "next Google" or the "next Yahoo!". Microsoft has set itself on a collision course with Google by trying to fuse search with advertising, while Silicon Valley start-ups rush to provide search services and engines that attract advertisers by serving niche markets.

Search doesn't have it easy, though. Internet users spent more than 24 minutes on email compared to just 3.5 minutes on search engines, according to comScore data, meaning search companies must work hard to ensure they become desireable online destinations for consumers.®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
BIG FAT Lies: Porky Pies about obesity
What really shortens lives? Reading this sort of crap in the papers
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.