Category Technology

A single google query uses 1000 machines in 0.2 seconds

What do you do when you want to check something online? Most of us will likely enter a search string in the Google search bar and wait for it to come up with its results. There’s hardly any “wait” these days as the tumaround for most searches are nearly next to nothing for practical terms.

Did you know that a single Google query actually uses 1000 machines in just 0.2 seconds? Even though Google is usually secretive about their search infrastructure, they revealed certain details in 2009. During a keynote talk at WSDM 2009, a Google Fellow revealed Google’s exponential growth during the decade from 1999 to 2009. As compared to 12 machines that were used earlier, 1000 machines were employed by 2009 in order to hold the complete search index in memory. Crawler updates, which used to take months in 1999, were down to just minutes by 2009. Search queries and processing power went up by a factor of 1000, while latency went down from around 1000 ms to 200 ms or 0.2 seconds.

Also, according to Jeff Dean, Google puts the search index all in memory several years ago and displays search results almost instantaneously to the person who is trying to search, so for each query, 2 , It is said that thousands of machines are working in tandem instead of three dozen machines. Google has developed various index compression technologies over the past several years and finally put it in a format that combines the four deltas of the position in order to minimize the number of replacement work required for decompression I told you it was solved. Google is paying attention to where their data is located on the disk, and data that needs to be read immediately is placed on the outer circumference of the disk which can read data at a higher speed even in the hard disk , It seems that cold data (data that does not need to be read out quickly, data with low reading frequency) and short data are placed on the inner circumference of the disk.
Also, in usual server applications, we use ECC memory at a higher price than usual which can correct errors themselves, but Google uses non-parity memory, so we created our own program to recover from errors, My own disk scheduler. The Linux kernel has also made a number of corrections to meet the needs.
Regarding the physical server as well, in the first phase it was a self-made server without a case, then it became a server to fit in a normal rack, but now it is back to a custom server without case again.

Credit : Giga zine

Picture Credit : Google 

What does app limit do on iPhone?

At the Worldwide Developer’s Conference (WWDC) 2018, Apple announced a new feature for iOS 12- the ability to limit how long you use individual apps via the App Limit setting. Say you don’t want to spend more than an hour on Instagram per day; set a limit and you’ll receive a full-screen notification when your time is up. It also syncs across your other iOS devices, so that you can’t avoid the limit. Not only can you see the time you’ve spent on individual apps, but you can set time limits as well.

Say you don’t want to spend more than an hour on Instagram per day. Set a limit and Apple will send a full-screen notification when time is up. Better yet, it syncs across your other iOS devices, so you can’t cheat that way. Unfortunately, it doesn’t seem you can set a hard limit. As far as we can tell, it’s pretty easy to extend your time after you receive the notification to stop there’s an ‘ignore limit’ prompt right on the alert. Still, it’s meant to be more of a deterrent than a permanent measure. Parents will also be happy to know they can apply similar allowances to their kids’ devices. Parents can limit how much time their kids spend in some apps, while allowing others – like educational apps – to be used unfettered.

It’s a small but important update. The average person will spend nearly two hours on social media apps (including YouTube) every day, and that number is expected to increase. Tools like these could help us buck that unfortunate trend.

Credit : The next web 

Picture Credit : Google 

What are Google Tasks?

Create lists of to-do items and check them off once completed with Google’s new to-do app. Tasks syncs across devices and integrates into the desktop version of Gmail and Google Calendar. You can add additional information like a description, date and sub tasks to your tasks, and create separate lists that you can switch between. In the new re-designed desktop Gmail, tasks are located to the right of your screen, so you don’t have to open the app on your smartphone if you’re at your computer. Drag emails from your inbox into the Tasks panel to automatically create new tasks around them. Free for iOS and Android. Aside from its simplicity, Google Tasks’ best feature is its deep integration with Gmail. Your inbox isn’t the best to-do list—so Google Tasks gives you somewhere to list those important messages that need a reply or action on your part. Drag an email from anywhere in Gmail to the Google Tasks sidebar to instantly turn it into a task. It’ll keep the email’s subject as the task name, with a link to the email underneath. You can then archive or move the message and still open it easily from the Google Tasks link.

Much like a paper to-do list, the most direct way to use Google Tasks is to jot down basic things you need to do and check them off as they’re completed. But if you’d rather plan, rearranging your tasks into the order you should complete them, you can do that too. Just click on a task and drag it to the order you want. Move a task with subtasks? Just drag to move the whole set together. Or, if you decide a subtask should be its own task, drag it out, and it’ll turn into a standalone task.

Credit : Zapier

Picture Credit : Google 

What is the name of the Japanese man who created stunning arts using Microsoft Excel?

While most digital artists opt to use Photoshop or other similar digital imaging software, 77-year-old Japanese artist Tatsuo Horiuchi chooses to work with Microsoft Excel to produce his beautiful works of art. His “paintings” are remarkably intricate works that mimic traditional Japanese paintings that offer scenic views of natural landscapes rich with cultural motifs.

The artist says, “I never used Excel at work but I saw other people making pretty graphs and thought, ‘I could probably draw with that.’” He adds, “Graphics software is expensive but Excel comes pre-installed in most computers… And it has more functions and is easier to use than [Microsoft] Paint.”

Horiuchi even dabbled with Microsoft Word, but found it to be too restrictive in its paper sizing. There is far more freedom for the artist to expand on his pieces in Excel. Since his discovery of the program’s artistic functions and his ability to utilize the software’s capabilities, Horiuchi has gone on to win competitions with his work, most notably taking first prize at the Excel Autoshape Art Contest in 2006.

Having gained worldwide praise over the last few years, Horiuchi has now caught the attention of Great Big Story. The artist invited GBS into his home, offering a behind-the-scenes look at his process. It’s hard to believe that these lifelike illustrations were made on Excel spreadsheets, which are typically used to crunch numbers.

Credit : My modern met

Picture Credit : Google 

What are the ways to stay safe online?

Do you spend a lot of time online? How can you stay safe in cyber space? Here are some simple tips to shield yourself from dangers.

When you download a game. you look for something that keeps you engaged. You possibly use it as a stress buster or to lift up your spirits. But imagine a game that draws you in such a way that you end up in a darker place, quite possibly a point of no return. That’s not all. Many children and teens are easy prey for online predators because they are wired to take on more risks, without considering the consequences. Here are some simple tips to guide you in cyber space.

Be alert to strangers

Do not let your guard down and allow the wrong people into your online circle. A false sense of security sets in on social networks and services where safety is an assumption. But remember do not interact with any unknown people. Anyone can create an online profile, so it’s best to be alert. You can turn down friend requests from strangers.

Set strong passwords and do not share them

Your password must consist of at least eight characters, which are a combination of letters, numbers, and symbols. Do not share your social media passwords with friends or acquaintances, no matter what situation arises. You may share it with your parents.

Mails, messages from unknown senders are best unread

One of the terrifying things about the Blue Whale is that it finds you, even if you do not. The best way to be safe is to not open any mails or messages from unknown people.

Do not respond to invitations sent by them.

Keep your account private on photo sharing sites

We tend to let our guard down on photo or video sharing sites such as Instagram, Snapchat and others. But the media uploaded on such sites inadvertently gives out a lot of personal information. Ensure that your account is private on this site, so that people would need to request your permission before following your stream.

Avoid open chat rooms

These places are filled with landmines and should be avoided like the plague. In a chat room, unknown people can strike up a conversation with you through private messages. What’s worse you never know if they are telling the truth about their identity. If you must, then log in using privacy settings.

Anonymous?

There are applications that allow users to send  anonymous messages to people. Recipient cannot respond to the messages. Although people usually use it to show their appreciation to writers or colleagues, it can be equally  harmful if fallen in the wrong hands.

Here’s how you can be cyber smart:

If someone on the internet asks you to meet in person-even if they are the same age- say no and inform a teacher or an adult whom you trust.

Passwords should be hard to crack. Avoid using obvious dictionary words. You can use online password generators, which jumble up characters and numbers. Change it often.

Your online posts should not reveal any personal information. This includes your moods, habits, locations, or information on your friends.

Do not participate in online surveys or contests requiring your personal information. It is illegal for companies to ask for any information from children under 13 years of age, without the consent of your parents.

Picture Credit : Google 

What is DBEST’s Transformative Bluetooth?

DBEST’s Transformative Bluetooth Hi-Fi System can go from a circle to an elongated snake form factor with a twist and turn of its speakers. The central section features an OLED display, control buttons and connectivity ports, either side of which are attached two 3W speaker units that rotate up to 180 degrees to allow users to customize the look of the unit and better direct the sound at them.

In addition to Bluetooth 2.1 + EDR connectivity, connect your computer, MP3 player or other audio device via a 3.5 mm input cable. The unit also acts as a standalone player thanks to its microSD card reader which allows you to play MP3 and WMA files stored on a memory card. And it has a built in microphone, so you can use the system along with your phone. Designed to be ultra-portable it measures just 1.9″ high x 6.8″ deep and weighs just 0.55 kgs. The unit’s 1,700 mAH lithium polymer battery can be charged in 3-4 hours via mini USB to provide up to 25 hours of streamed audio playback or up to 50 hours of wired audio.

In addition to Bluetooth 2.1 + EDR connectivity, you can also connect your computer, MP3 player, phone, Playstation, or other audio device via a 3.5mm input cable.  The Transformative system is 9.8 x 3.4 x 9.9 inches and weighs 1.2 pounds.  With it’s 1700mAh lithium-polymer internal battery, it makes a great portable system with up to 50 hours playback time between charges.  It has two 3W amps to drive the speakers, and it reproduces 180-20,000Hz.  It works as a standalone MP3 player, too; it has a microSD card reader so you can play MP3 and WMA files.  And it has a built-in microphone, so you can use the system as a speakerphone with your phone.  You can twist the speaker sections into a multitude of shapes to best fill your space with sound.

The Transformative Bluetooth HiFi System is available in the US at Amazon for $214.07and it’s eligible for Prime shipping.

Credit : The-Gadgeteer

Picture Credit : Google