Feeds

Blog calls for Google boycott

More than 50 people obey

High performance access to file storage

Yesterday, Michael VandeMar tried to go eighteen hours without visiting the big five search engines. Taking up a challenge from search engine guru Charles Knight, he’d resolved to avoid Google, Yahoo!, MSN, Ask.com, and AOL from 6am to midnight. By 9:53, he’d given up. “Bah!” he wrote to Knight’s Alt Search Engines blog. “I blew it.”

“I immediately thought of the Seinfeld master-of-your-domain thing,” Knight told The Register.

From his two-week-old blog, Knight dubbed Tuesday, June 12 “A Day Without Google,” urging users across the web to boycott Google search and its four largest competitors. He provided a list of 100 alternatives – yes, 100 - but for some users, the task proved difficult. Reader David Berkowitz didn’t even try it.

"I might as well take it as a vacation day," he said. "The top 5 are the top 5 for a reason."

Most web users are pre-programmed to use nothing but the big five. Or at least the big four. Mr. Knight was kind to include AOL. According to the latest figures from Hitwise.com, Google accounts for 65 percent of Web searches, Yahoo! 21 percent, MSN 8.4, Ask.com 3.92, and AOL 0.35. That leaves less than 2 percent for Knight’s list of 100 others.

But in the end, several users proved that a day without the familiar names is entirely possible. Reader "Catherine" made it through the day using nothing but Quintura, a new "visual” search engine.

"It gave me useful results up front. [The first result] was often exactly what I was after," she wrote. "Beforehand, I would have sworn that Google was ‘the only one,’ but I’m glad to report I have to eat my words."

Judging from comments posted to Knight’s site, more than 50 people participated in his search engine boycott, and of those who successfully avoided the big names, most used either Quintura or KartOO.

Of course, accuracy of search results isn’t the only issue here. "What will happen with my AdSense ads?" Mickey Maze wrote on Tuesday. "I will not get a dime this day."®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.