Camly - A Responsive Blogger Theme, Lets Take your blog to the next level.

This is an example of a Optin Form, you could edit this to put information about yourself.


This is an example of a Optin Form, you could edit this to put information about yourself or your site so readers know where you are coming from. Find out more...


Following are the some of the Advantages of Opt-in Form :-

  • Easy to Setup and use.
  • It Can Generate more email subscribers.
  • It’s beautiful on every screen size (try resizing your browser!)
Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts
by · No comments:

How Internet Search Engine Works




SEARCH ENGINE OPERATION
There are three major functions for which the search engines are known for: index building and crawling, relevance calculation to provide results and result serving.
Crawling and indexing
The World Wide Web can be determined as a big city subway system with numerous stops. And, these stops are the unique documents ranging from html pages to jpg files to pdf files to mp4 files and others. The search engine’s basic requirement is the availability of the paths through which they can make interconnection between the various documents and these paths are the links.
The automated robots of the search engines better known as the Crawlers or Spiders make an access to the millions of the documents. Once, the search pages are found, the code from these are deciphered by the crawlers following which these codes get stored in the hard drives to be recalled when a search term is entered. Constructed data centers of the search engines are present all over the world, which makes the task of storing billions of pages.
Search engines work hard to provide the search results which are provided in a span of 1-2 secs which is possible because of the thousands of machines which process the large quantities of information.
Providing the results
Search engines are rightly designated as the answer machines. When an online search is made, then two important tasks are performed by these search engines, narrow the search results to show only those pages which are relevant for the search and rank the search results based on their popularity and the traffic.
Here comes the SEO which make the pages both relevant and important. In the initial days search results were only based on the simple word matching which was not very relevant, but nowadays these search engines are much advanced and have hundreds of factors to narrow the searches which make the results very relevant.
Important determination by the search engines
Basically, the important determination nowadays is basically based on the popularity. The more valuable the information contained in a document, the more popular it is. The search engines use metrics to determine popularity which show more satisfying results.
The search engines make use of the carefully crafted mathematical equations, algorithms, and other methods to sort out relevant pages from the billions of pages and rank them accordingly.
Read More
by · No comments:

Hacker VS Programmer



1. A hacker beats the system.
A programmer maintains the system.

2. A hacker is trying to get in.
A programmer is trying to stop things getting in.

3. A hacker does things because he believes in them.
A programmer does what he is supposed to.

4. A hacker changes the way things are.
A programmer tries to keep the status quo.

5. A hacker is agile.
A programmer is a small cog in a big slow machine.

6. A hacker has many points of attack.
A programmer has one job.

7. A hacker has to be fast.
A programmer doesn’t.

8. A hacker is self-reliant.
A programmer relies on others.

9. A hacker finds paths that don’t exist.
A programmer guards the old ones that already do.

10. A hacker is about being interesting.
A programmer is about being perfect.

Read More
by · No comments:

New app allows people to watch transparent videos at work

A new app allows users to watch videos on a translucent browser that they can see in the background as they work.
The transparent browser can be placed behind any variety of other programs — word processing documents, spreadsheets, other browsers — that allow users to do their work, while watching videos of their choosing in the background, the New York Daily News reported.  Greedy Glutton Software's app VideoGhost, which has been offered for free, can also work as a standard video player.  The program can be installed on a computer or run as standalone software and users can control the opacity of the browser.
Read More
by · No comments:

India third largest 'spam spewing nation' in world

India has ranked third on the list of the countries distributing spam across the world, after US and China, a new report has claimed.
While the US was the single highest-ranking country in the study, Asia topped the list of continents with 36.6 per cent of the world's spam accounted for.
In the latter half of 2012, India had been leading the way but has now fallen back to third, with China leapfrogging into second place after a spell in the lower half of the list, statistics from SophosLabs revealed.
US is still firmly on the top, distributing more spam than any other country in the world, clocking in at a "respectable" 18.3 per cent of junk email sent.
The study tracked the amount of spam sent between December 2012 and February 2013. China took the second spot and India the third, with 8.2 per cent and 4.2 per cent of the world's spam, respectively.
Other high-ranking countries included Peru, France, South Korea, and Italy. North America ranked third, with a relatively diminutive 22 per cent, 'TechNewsDaily' reported.
After the top two, the spammers are distributing their activities fairly evenly across the rest of the list.
Stepping back and looking at spam relay from a continental viewpoint shows Asia keeping the top spot that it has held for some time now.
However, there has been a significant redistribution with a shift from India to the US and a 12 per cent swing from Asia to North America.
The list included USA (18.3 per cent) at number one, China (8.2 per cent) at number two. India (4.2 per cent) was placed third while Peru (4.0 per cent) stood fourth in the list.
France (3.4 per cent), S Korea (3.4 per cent) and Italy (3.4 per cent) were placed fifth on the list. Taiwan (2.9 per cent) and Russia (2.9 per cent) were at the eighth position.
Spain (2.8 per cent), Germany (2.7 per cent) and Iran (2.6 per cent) were at tenth, eleventh and twelfth spot respectively.
Compromised user PCs are a huge avenue of spam distribution. In order to stop spammers cold, everyday users can keep their anti-virus software up to date, run regular malware checks, and update their hard-to-guess passwords on a regular basis.
Read More
by · No comments:

Now, new service that delivers your 'snail mail' like email


An Austin-based startup Outbox has no made it easy to digitize all of your physical mails and deliver them to you electronically.

The firm Outbox has turned the traditional mail you receive in your mailbox into a digital format you can read on your phones, tablets and PCs.

According to Mashable, once you sign up for Outbox, the company will visit your mailbox three times a week and collect your mail on your behalf.

Once it gets your mail, it then sorts it, scans it, and sends you digital versions that you can access from a smartphone app or a website on your computer.

According to the report, one can request the physical copy of mail they want.

Outbox will then package it and deliver it back to your mailbox within two days.

One can also opt out of mail he/she never wants to receive, such as coupons or circulars, and Outbox will put that on a "do-not-mail" list of sorts for those things, preventing them from ever seeing the person's digital inbox.
Read More
by · No comments:

Facebook announces partership with telecom operators to provide free messenger service

Facebook has announced partnership with 18 telecom operators in 14 countries to provide free messenger service. The subscribers of these network service providers will get free or discounted data access to Facebook Messenger regardless of the operating system platform.

Facebook announces partership with telecom operators to provide free messenger service




The list includes Airtel and Reliance in India, TMN in Portugal, Three in Ireland, Vivacom in Bulgaria, Backcell in Azerbaydzhan, Indosat, Smartfren, AXIS and XL Axiata in Indonesia, SMART in Philippines, DiGi in Malaysia, DTAC in Thailand, Viva in Bahrain, STC in Saudi Arabia, Oi in Brazil, Etisalat in Egypt, and Tre in Italy.

Facebook is now considered as a serious competitor to mobile-messenger services like WhatsApp, Viber, LINE and so on after launching Facebook messenger last year. This app also lets you subscribe to the messenger service by only using your mobile number without logging into your Facebook account. This move might generate a new trend in mobile-messaging as Facebook already has 1.06 billion monthly active users including 71million in India.

Following the partnership, Reliance Mobile has already launched ‘Facebook Messenger Plan’ which offers unlimited access to Facebook (including Messenger) for Rs. 16 per month. Facebook also has already enabled free voice calling for its users in Canada and the US on iOS platform. This service is not yet enabled in other countries considering it might threaten the profits of telecom operators worldwide.




Read More
by · No comments:

Google extends social Web reach to counter Facebook's rise

Google transformed the Internet by cataloging the Web's countless pages. Now it wants to keep better track of the Web's multitude of users.
The Mountain View, California-based company said on Tuesday it would begin encouraging websites and mobile apps to accept log-in credentials via Google+, its social network.
The integration with third-party sites and apps, which Google hopes will help it track users as they surf across the Internet, represents the search powerhouse's latest effort to establish a foothold in the all-important social Web arena - and beat back competition from Facebook, the sector leader.
Google extends social Web reach to counter Facebook's rise

Sites that have so far agreed to accept Google's social sign-in include The Guardian and USA Today's websites, as well as Fancy, the shopping site, and Fitbit, the personal fitness-tracking service and app, Google said in a blog post Tuesday.
Since 2008, Facebook has been able to gather massive troves of information about its users' activities even if they are not on Facebook because many popular apps - such as Spotify's music streaming service - allow users to log in with their Facebook identity, which results in data funneled back to the social network.
In response to Facebook's rise, Google has made its social Web efforts a top priority in recent years. But results have been mixed under the leadership of Chief Executive Larry Page and Vic Gundotra, the influential senior vice president spearheading Google's social networking efforts.
Launched in 2011, Google+ still lags far behind Facebook: it had 100 million monthly active users in December, according to comScore, compared to well over 1 billion for Facebook. But Google officials have downplayed the lukewarm public reception, saying they view Google+ more as an invisible data "backbone" that tracks individual users across its various properties - and less as a consumer Internet destination.
Over the past year the company has made changes to the log-in process at its YouTube subsidiary, for instance, in order to nudge the video site's 800 million users to sign in and leave comments with their Google+ accounts rather than anonymous handles.

Read More
by · No comments:

Twitter begins integrating advertising software




Twitter Inc said on Wednesday it is opening up its platform to third-party advertising management software, taking another step to establish its ad-based business model ahead of an initial public offering.
The ads application programming interface, or API, would allow advertisers to connect their existing ad management software to their Twitter account to automate ads on the micro-messaging platform.
Twitter said that it would begin by integrating with ad software by Adobe Systems Inc, Salesforce Inc, Hootsuite, SHIFT and TBG Global.
"With the Ads API, marketers now have more tools in their arsenal to help them deliver the right message, to the right audience, on the desktop and on mobile devices — all at scale," Twitter product manager April Underwood wrote in a blog post.
Under pressure to show growing revenues, Twitter in recent years has ramped up its ad-serving capabilities while building a sales staff to woo corporate marketers. The firm said last year it would allow marketers to target Twitter users based on a profile of their perceived interests and by location.
Twitter makes money every time a user clicks or retweets a "promoted" message paid for by an advertiser. The new API would allow great automation for advertisers, who previously had to manually write every promoted tweet.
In 2013, Twitter's ad revenues are expected to grow nearly 90 percent to $545 million, according to eMarketer which noted that Facebook Inc experienced similarly rapid growth after opening its API to advertisers in 2011.
Read More
by · No comments:

Facebook blocks access to NBC.com over security scare



 
US media company NBC Universal said late on Thursday that its NBC.com website was safe to visit following a security scare prompted by reports that it was infected with malicious software designed for banking fraud and cyberespionage.

"A problem was identified and it has been fixed," an NBC Universal spokeswoman told Reuters. She declined to elaborate on the nature of the problem.

Earlier on Thursday, several security experts had advised internet users to avoid the site altogether, saying it had been compromised by malicious software.

The Dutch computer security firm SurfRight said on its HitmanPro blog that the site of its NBC television network was tainted with viruses known as the Citadel and ZeroAccess that are used for banking fraud, cyberespionage and other computer crimes.

The NBC spokeswoman said she could not confirm whether any users had been infected. But she said that no account information about users of the site had been compromised.

Earlier in the day, Facebook blocked users from accessing the NBC.com website following reports that the site was infected with a computer virus.

Facebook users were told "This link has been reported as abusive" on Thursday when they attempted to access the NBC.com website.

NBC is controlled by Comcast, which is buying out minority owner General Electric.
Read More
by · No comments:

Facebook adds free calling to iPhone, iPad apps



Facebook on Friday allowed users to make free calls to friends using the social network's application tailored for iPhones or iPads.
An updated Facebook app for the popular Apple mobile devices shows when friends are online and then gives the option of ringing them up by tapping an icon on the screen.

Calls are routed over the internet using telecom service data plans or connections to Wi-Fi hotspots. Facebook introduced a version of the feature earlier this year in its messenger programme.

Upgrades in the Facebook 5.5 app included a button designed to make it easier to Like online content and post comments at the social network.
Read More
by · No comments:

Tweet with the LivesOn app even after you die

 Tweet with the LivesOn app even after you die



If you were wondering what would happen to your social networking account once you passed away, fear not. An app called LivesOn is expected to launch in March. The tagline of the app is, “When your heart stops beating, you’ll keep tweeting.”
LivesOn uses a special algorithm that tracks the user's trends and Twitter feed. The data is then used to determine content that the user would write himself or retweet and the app then tweets or retweets the link. Anyone who signs up for the service is asked to nominate an executor who will have control of the account, just like a will.
Dave Bedwood, creative partner of Lean Mean Fighting Machine, the London-based ad agency that is developing the app told the Guardian, “It divides people on a gut level, before you even get to the philosophical and ethical arguments. It offends some, and delights others. Imagine if people started to see it as a legitimate but small way to live on. Cryogenics costs a fortune; this is free and I'd bet it will work better than a frozen head.”
Dead Social is one more app that gives users the ability to send messages after their death through social networking services such as Facebook, Twitter, or LinkedIn. Whatever happened to leaving an old fashioned letter? P.S. I Love you anyone?
Some may think of the service as keeping their memory alive where as others may think of it as down right creepy that they see updates and tweets from a person whose funeral they attended recently.
What do you think? Does it make sense to keep your social networking account live even after your death?
Read More
by · No comments:

Microsoft switches Hotmail accounts to Outlook.com

Outlook.com is also "designed to make it easy to send hundreds of photos and videos in a single message," it said. 

Microsoft said on Tuesday that it had begun switching Hotmail accounts to Outlook.com as it officially launches its revamped email service.

"Starting today, Microsoft will begin to upgrade every Hotmail user to Outlook.com.," the company said in a statement. "The upgrade is seamless and instant for Hotmail customers; everything including their @hotmail.com email address, password, contacts, etc., will stay the same."

Microsoft said last year it was overhauling its email service as it adapts for mobile users and social media.

The number of active accounts on Outlook.com grew to 60 million in just six months during its preview period, Microsoft said, adding it lets users connect to Facebook, LinkedIn and Twitter.

Outlook.com is also "designed to make it easy to send hundreds of photos and videos in a single message," it said.

Launched in 1996, Hotmail was among the first Web-based email services. 



Read More
by · No comments:

Internet rates may go up



Industry body ISPAI said that rates of internet and broadband services may go up under new licenses framework due to high entry fee proposed by Department of Telecommunications (DoT).

DoT has proposed to charge one-time entry of Rs 15 crore for a national level Unified Licence compared to Rs 30 lakh which companies pay for internet services at present.

"DoT has not done anything new as per the proposed format for Unified Licence regime. They are going ahead with option to continue the old licence format along with a new national level Unified Licence (UL) that will cost Rs 15 crore.

"If internet service providers opt for UL, then cost of internet and broadband services will go up," Internet Service Provider Association of India's (ISPAI) President Rajesh Charia told PTI.

In the new licencing regime, DoT should allow internet telephony which would lead to low cost call service that would benefit even rural area the country where illiteracy is very high.

"VoIP is widely accepted application. Foreign companies who are not registered with DoT are providing voice calling service both between Computer to Computer and Computer to landlines.

"They don't even have licences. We pay annual charges to DoT and should be allowed to provide voice services across networks," he said.

A DoT internal committee has recommended to allow ISPs with wireless broadband spectrum (BWA) to provide voice telephony service using these airwaves. In 2010, six private players including Reliance Jio Infocom, formerly Infotel Broadband, Tikona Digital and Augere had won BWA spectrum.

The committee has left it for higher authorities to decide if players who won BWA spectrum in 2010 should be asked to make additional payment of Rs 1,658 crore which was charged from telecom players till 2008 for providing mobile telephony.

The licence issued to mobile telephony operators for Rs 1,658 crore had 4.4 Mhz spectrum bundled with it but government has announced to provide no spectrum with UL.
Read More
by · No comments:

How Email Really Works



In this diagram, the sender is a human being using their company account to send an email to someone at a different company.

Step A: Sender creates and sends an email

The originating sender creates an email in their Mail User Agent (MUA) and clicks 'Send'. The MUA is the application the originating sender uses to compose and read email, such as Eudora, Outlook, etc.

Step B: Sender's MDA/MTA routes the email

The sender's MUA transfers the email to a Mail Delivery Agent (MDA). Frequently, the sender's MTA also handles the responsibilities of an MDA. Several of the most common MTAs do this, including sendmail and qmail (which Kavi uses).
The MDA/MTA accepts the email, then routes it to local mailboxes or forwards it if it isn't locally addressed.
In our diagram, an MDA forwards the email to an MTA and it enters the first of a series of "network clouds," labeled as a "Company Network" cloud.

Step C: Network Cloud

An email can encounter a network cloud within a large company or ISP, or the largest network cloud in existence: the Internet. The network cloud may encompass a multitude of mail servers, DNS servers, routers, lions, tigers, bears (wolves!) and other devices and services too numerous to mention. These are prone to be slow when processing an unusually heavy load, temporarily unable to receive an email when taken down for maintenance, and sometimes may not have identified themselves properly to the Internet through the Domain Name System (DNS) so that other MTAs in the network cloud are unable to deliver mail as addressed. These devices may be protected by firewalls, spam filters and malware detection software that may bounce or even delete an email. When an email is deleted by this kind of software, it tends to fail silently, so the sender is given no information about where or when the delivery failure occurred.
Email service providers and other companies that process a large volume of email often have their own, private network clouds. These organizations commonly have multiple mail servers, and route all email through a central gateway server (i.e., mail hub) that redistributes mail to whichever MTA is available. Email on these secondary MTAs must usually wait for the primary MTA (i.e., the designated host for that domain) to become available, at which time the secondary mail server will transfer its messages to the primary MTA.

Step D: Email Queue

The email in the diagram is addressed to someone at another company, so it enters an email queue with other outgoing email messages. If there is a high volume of mail in the queue—either because there are many messages or the messages are unusually large, or both—the message will be delayed in the queue until the MTA processes the messages ahead of it.

Step E: MTA to MTA Transfer

When transferring an email, the sending MTA handles all aspects of mail delivery until the message has been either accepted or rejected by the receiving MTA.
As the email clears the queue, it enters the Internet network cloud, where it is routed along a host-to-host chain of servers. Each MTA in the Internet network cloud needs to "stop and ask directions" from the Domain Name System (DNS) in order to identify the next MTA in the delivery chain. The exact route depends partly on server availability and mostly on which MTA can be found to accept email for the domain specified in the address. Most email takes a path that is dependent on server availability, so a pair of messages originating from the same host and addressed to the same receiving host could take different paths. These days, it's mostly spammers that specify any part of the path, deliberately routing their message through a series of relay servers in an attempt to obscure the true origin of the message.
To find the recipient's IP address and mailbox, the MTA must drill down through the Domain Name System (DNS), which consists of a set of servers distributed across the Internet. Beginning with the root nameservers at the top-level domain (.tld), then domain nameservers that handle requests for domains within that .tld, and eventually to nameservers that know about the local domain.
DNS resolution and transfer process
  • There are 13 root servers serving the top-level domains (e.g., .org, .com, .edu, .gov, .net, etc.). These root servers refer requests for a given domain to the root name servers that handle requests for that tld. In practice, this step is seldom necessary.
  • The MTA can bypass this step because it has already knows which domain name servers handle requests for these .tlds. It asks the appropriate DNS server which Mail Exchange (MX) servers have knowledge of the subdomain or local host in the email address. The DNS server responds with an MX record: a prioritized list of MX servers for this domain.
    An MX server is really an MTA wearing a different hat, just like a person who holds two jobs with different job titles (or three, if the MTA also handles the responsibilities of an MDA). To the DNS server, the server that accepts messages is an MX server. When is transferring messages, it is called an MTA.
  • The MTA contacts the MX servers on the MX record in order of priority until it finds the designated host for that address domain.
  • The sending MTA asks if the host accepts messages for the recipient's username at that domain (i.e., username@domain.tld) and transfers the message.

Step F: Firewalls, Spam and Virus Filters

The transfer process described in the last step is somewhat simplified. An email may be transferred to more than one MTA within a network cloud and is likely to be passed to at least one firewall before it reaches it's destination.
An email encountering a firewall may be tested by spam and virus filters before it is allowed to pass inside the firewall. These filters test to see if the message qualifies as spam or malware. If the message contains malware, the file is usually quarantined and the sender is notified. If the message is identified as spam, it will probably be deleted without notifying the sender.
Spam is difficult to detect because it can assume so many different forms, so spam filters test on a broad set of criteria and tend to misclassify a significant number of messages as spam, particularly messages from mailing lists. When an email from a list or other automated source seems to have vanished somewhere in the network cloud, the culprit is usually a spam filter at the receiver's ISP or company. This explained in greater detail in Virus Scanning and Spam Blocking.

Delivery

In the diagram, the email makes it past the hazards of the spam trap...er...filter, and is accepted for delivery by the receiver's MTA. The MTA calls a local MDA to deliver the mail to the correct mailbox, where it will sit until it is retrieved by the recipient's MUA.

RFCs

Documents that define email standards are called "Request For Comments (RFCs)", and are available on the Internet through the Internet Engineering Task Force (IETF) website. There are many RFCs and they form a somewhat complex, interlocking set of standards, but they are a font of information for anyone interested in gaining a deeper understanding of email.
Read More
by · No comments:

Hackers Targeted Twitter User Data

Twitter Inc. on Friday said it had detected "sophisticated" unauthorized attempts to access information from the short-messaging service used by more than 200 million people.
In a blog post, the San Francisco company said it identified this week computerized attacks that may have accessed ...

Anonymous hackers attacked Twitter this week and may have gained access to passwords and other information for as many as 250,000 user accounts, the microblog revealed late on Friday.
Twitter said in a blog post that the passwords were encrypted and that it had already reset them as a “precautionary measure,” and that it was in the process of notifying affected users.
The blog post noted recent revelations of large-scale cyber attacks against the New York Times and the Wall Street Journal, but unlike the two news organizations, Twitter did not provide any detail on the origin or methodology of the attacks.

Anonymous hackers attacked Twitter this week and may have gained access to passwords and other information for as many as 250,000 user accounts, the microblog revealed late on Friday.
Twitter said in a blog post that the passwords were encrypted and that it had already reset them as a “precautionary measure,” and that it was in the process of notifying affected users.
The blog post noted recent revelations of large-scale cyber attacks against the New York Times and the Wall Street Journal, but unlike the two news organizations, Twitter did not provide any detail on the origin or methodology of the attacks.



Read More
by · No comments:

Twitter launches video-sharing app for iPhones, iPod


 Micro blogging platform Twitter has launched a new service which will allow people to share video snippets from iPhones or iPods.



Perpetually looping videos clips up to six seconds each can be shared using Vine or easily embedded in tweets fired off at Twitter.According to Vine co-founder and general manager Dom Hofmann, a free Vine application became available worldwide at Apple's App Store on Thursday, News24 reports.

Click here to download Vine

Twitter bought the small team at Vine, a start-up based in New York, in October, prompting talk the messaging service intended to do for smart phone video what Instagram did for pictures.

Twitter, in December added Instagram-style smart phone photo sharing features after the Facebook-owned service made it impossible for Internet users to integrate its images into tweets.
Read More
by · No comments:

Twitter offers users a digital scrapbook of past tweets


The tool, announced this week, is designed to make it easier for people to review all their activity on Twitter's trend-setting messaging service.


 Twitter is offering its more than 200 million users a chance to keep a digital scrapbook of all their tweets.

The tool, announced this week, is designed to make it easier for people to review all their activity on Twitter's trend-setting messaging service.

When it's available, the downloading option will appear at the bottom of each user's settings menu.

Twitter, which is based in San Francisco, said it may take a several weeks, or even months, before everyone gets the feature.

After a records request is made, users will receive an email on how to download their personal archive. For Twitter's earliest users, the records date back to 2006 when Twitter started.

Twitter users already have been able to peruse their past tweets by navigating to their personal profile page. But going that route is more cumbersome because it requires scrolling down a page that can sometimes be slow to display additional tweets.

The company said that users who download their entire histories should find it easier to search for particular tweets and organize the messages _ by month, for example.

The new tool also should serve as a reminder that a copy of everything people have tweeted still resides on Twitter's computers.

Other widely used services, such as Facebook's popular social network, also have been creating digital portraits of people's lives as more content gets posted on their sites. Facebook gives its more than 1 billon users the option to download everything they have shared on the service. It has become easier this year for Facebook users to look at their past musings and photos as the service converted people's profiles into a timeline that sorts content by the month it was shared.

Path, another social network founded by former Facebook executive Dave Morin, is also trying to position itself as a treasure chest of memories. A new feature released Thursday in an update to Path's' mobile app allows users to search their past posts on devices running on Apple and Android software. The content can be quickly retrieved by typing in their names' friends, a specific event or time of year, or just a phrase encapsulating a vacation highlight, such as ``hiking in Kauai.''
Read More
by · No comments:

Twitter will now let you download your tweet archive

Twitter’s 200 million active users can soon savour or cringe over every single statement they’ve tweeted when the social media company begins sending users their entire archive of 140-character messages.
Only English-language users have this service for now, but Twitter will eventually send a download link containing the full personal archives in one file to any user who asks, the company said on Wednesday.
“Maybe you wanted to recall your reaction to the 2008 election, reminisce on what you said to your partner on your 10th anniversary, or just see your first few Tweets. We know lots of you would like to explore your Twitter past,” Mollie Vandor, a Twitter engineer, wrote in an official blog post Wednesday.
Since Twitter launched the service in 2006, tweets have evolved from a tool for youngsters to chat about frivolous things into a force for social change.
Representational Image. Reuters
It has served as an alternative to government-controlled media, for example, in the Middle East. And during Superstorm Sandy this year, news organizations and emergency response officials turned to Twitter as an essential source of real-time information.
In 2010, the Library of Congress pledged to preserve every public tweet as a matter of record – a significant undertaking, given that some 400 million tweets are dispatched worldwide everyday.
Bookending that archive will be one noted dispatch by Twitter Executive Chairman Jack Dorsey, who is widely recognized as its inventor. Dorsey, ignoring punctuation, brought the service to life shortly after 1:00 p.m. on March 21, 2006 with a supremely pedestrian update about his experimental social network
Read More