Feeds

Mozilla ponders blinkers for your browser

Plans to mine browser history so publishers can serve you what you want

High performance access to file storage

Mozilla Labs has outlined an experiment it's conducting in improving the personalisation web publishers can offer readers who browse their sites using Firefox.

The outfit says it's been working on the idea since last year, when it “conducted a series of experiments in which a user’s browsing history could be matched with interests in categories like technology, sports and cooking.”

In return for opting in to the trial, lab rats were offered “insight into how they spend time online.”

Mozilla Labs is now wondering “what if these interests were also available for the user to share with the websites they visit to get a better, more personalized browsing experience” so that “content creators and consumers could benefit from Web-based interests”?

Here's one scenario the outfit has imagined as resulting from this line of thinking:

“For example, let’s say Firefox recognizes within the browser client, without any browsing history leaving my computer, that I’m interested in gadgets, comedy films, hockey and cooking. As I browse around the Web, I could choose when to share those interests with specific websites for a personalized experience. Those websites could then prioritize articles on the latest gadgets and make hockey scores more visible.”

Some publishers have already pressed the API for this kind of thing into service, according to the Mozilla Blog, but the code is not in the wild and is being tested – technically and conceptually – as Mozilla figures out how people will react to websites that dynamically change content based on readers' past behaviours.

One example of successful personalisation mentioned in the posts announcing the initiative is The Guardian's offer to ensure its readers see no news about the birth of George Alexander Louis Windsor. That's a service many will doubtless enjoy. Whether such personalisation can result in readers choosing only to encounter lines of inquiry and opinions they already agree with, and therefore deciding to consume media that re-enforces their feelings rather than offering broader perspectives, is a wider debate for another day. Or the comments. ®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.