Feeds

Bing slips into bed with Twitter

Little one says 'roll over'

Remote control for virtualized desktops

Microsoft has added Twitter messages to some search results in a desperate attempt to snatch some market share from Google following the launch of Bing last month.

Redmond’s revamped search engine has indexed some popular Twitter pages using the all-talk-no-trousers site’s public API.

“We picked a few thousand people to start, based primarily on their follower count and volume of tweets,” wrote MS search general manager Sean Suchter.

Real time results are displayed in a separate box alongside other search queries in Bing, for anyone keen to keep their stalking mojo at full tilt.

It’s hardly surprising to see Microsoft attempt to benefit from some of the traffic flowing into and out of Twitter, whose real time search engine has prompted mild cause for concern over at Mountain View towers in recent months. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.