Feeds

Google abandons Search

Swaps Hive Mind for nevermind

High performance access to file storage

How noise defeated the cleverest engineers on Earth

Since 2005 Google has relied heavily on Wikipedia to mask the flaws introduced by its inability to deal with noise. The thinking behind this is that the typical punter just wants to know something quickly, and Wikipedia will give them a rough and ready answer, and links for further reading. It may as well have hardwired Wikipedia to the "I'm Feeling Lucky" button.

But the onslaught of Web2.0rhea - the relentless real-time noise exemplified by Twitter - appears to be the straw that finally broke the camel's back. This is really quite something. Twitter remains a fairly minor social network, with only half as many active users as the most popular Facebook application, and it wouldn't get into a Facebook App Top 10 - yet it was enough to prompt Google to inject a live self-updating feed of real-time garbage into its once-hallowed SERPS.

(The No.1 Facebook App is Farmville, if you're interested, with 69 million active users a month. No, I didn't know that either.)

T-shirt alert

It's no coincidence, and you couldn't really get a clearer expression of "We've Given Up".

Years ago we mused that it was the lack of specificity that would ultimately doom Google. It had set itself a mission to collect and organise the world's information. But most of this wasn't worth collecting - and Google just wasn't clever enough to differentiate between good and bad, and so was unable to organise it. This was not an original thought - it just seems like it today.

So Google is dead. It has no more magic at its disposal than a Balfour Beatty or a Saatchi and Saatchi, and no more moral authority. Could someone please inform President Obama, and the Conservative Party?

Competition

To mark this historic occasion, a Reg T-shirt goes to the best spoof of a Google-style cartoon logo which we can use to commemorate December 7th, the day Google gave up on search. A bit like this, but funnier:

Artwork and chest size here, please. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.