Feeds

Reg unleashes turbocharged search engine

Now with added va-va-voom

  • alert
  • submit to reddit

We're delighted to announce today what some you may have already noticed: El Reg now has a new, improved, search engine facility to better help you navigate our burgeoning roster of sites.

You can peruse our handy search help page for details on just how the upgraded facility will enhance your Register experience and help create a better world for your children and your children's children, but here's a summary:

Each of our five sites has its own search:

Doing a search from any site offers a set of results which are, by default, gleaned from that site. Above the results are some added basic options: "Help"; "Advanced Search"; and "Sort by Date". Search results are by default displayed by a combination of date/relevance. To get the latest result at the top, hit "Sort by Date".

Clicking on "Advanced Search" allows you to select further search criteria: "Author"; "Since" (yesterday, last week, three years ago, etc, etc); "From" (specific site or all sites); and "Results per page" (10, 25, 50 or 100).

Simple as that. Future proposed improvements include a "between date range" option, rather than just "Since" and an "Exclude" field which will allow, for example, Linux users to exclude any story which makes reference to Windows XP. Your feedback on the current state of play and how we might further enhance the search experience are welcome. Click on the byline above to send us your comments. ®

Bootnote

We made the bit about "Exclude" up, so there's no point in you open source jockeys lobbying for it.

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.