Google is very simple to use, but are you making the most of it?
Google searches on iPad
Most people know how to use Google. You visit the homepage enter in some search terms and boom: you get results.
However, there are a number of little tricks you can use to make sure you find what you are looking for as quickly as possible.
There
are even some not search-related tools that are incredibly useful, such
as a timer, and some silly ones that mess around with the way the page
appears.
Here's our run down of the best.
Search for an exact phrase
You can search for an exact phrase, like this
If you are looking for a precise phrase or quote,
put the words into quotation marks, for example "pug riding a unicorn".
You're welcome.
Find websites that are similar to one you like
If you have a favourite website and are looking for something similar, just type “related:” along with the website you know.
So if you like the Mirror.co.uk, you’d search “related:mirror.co.uk” and it will show you other news websites. So, er, the Telegraph is pretty close by the looks of it.
Find the meaning of words you don’t understand
Are you afraid of long words? Here's the word for it
Instead of looking for an online dictionary and then
entering in a word you don’t know, you can simply enter the word
straight into Google’s search bar, along with the command “define:”
So
if aren't sure what hippopotomonstrosesquipedaliophobia means, you’d
put in “define: hippopotomonstrosesquipedaliophobia” and you’ll find out
it means fear of long words. Seriously.
Convert metric to imperial and vice versa
Convert imperial to metric and vice versa
If you want to make a quick conversion between miles and
kilometres, just enter the search term “10 miles in km” and it will come
up with the answer. You can do the same for kilos and pounds, inches
and cm. The same works for currency conversions.
Search when you are missing words or letters
If you are trying to remember an actor but you can’t remember
his or her first name, this is the perfect tool for you. Just use the
asterisk as a wild card - that means you can swap any word or letter and
results containing all alternatives will be delivered. So if you search
for “actor * Johnson” it will search for actors with the second name
Johnson. But we only really care about Dakota at the moment.
Find out the time in another country
You can easily find the time in another country
Have a loved one in another time zone or need to
make a business call to somewhere far away? Find out what time it is by
entering the command “time:” followed by the country or city. It's
always time for a beer somewhere in the world.
Search within a website
If you know you remember an article about, say, pugs
on a specific website but can’t quite remember the title, just enter
“pugs site:bbc.co.uk” or any other variation involving keywords you are looking for and the website you want to search.
Set a timer
It’s pretty self-explanatory but if you need a
countdown, just enter in “set a timer for 10 seconds” (or 10 minutes or
10 hours) and Google will let you know when the time’s up with an alarm.
Good for people who waste a lot of time down internet rabbit holes.
Pointless but fun
No, your eyes aren't deceiving you
If you want to have fun with the search engine type “tilt” or “do a barrel roll” into the search bar.
Here is this handy operator developed by Daniel Russellwhich
comes in as a handy trick when you are googling stuff. It’s a handy
trick, particularly when you’re looking for combination of search terms
(containing two or more search keywords) when one dominates the results,
but you’re interested in the relationship between two query terms.
The AROUND(n) operator (used in
uppercase, as shown with n = a number) is an undocumented Google search
operator that will help you find documents where the distance between
two search terms is around ‘n’. The higher the number ‘n’ the less is
the proximity between the search words. Here’s an example:
A research query that says “hot springs” will mostly show search
results about geographical hot springs (because these two words are
maximized in use together than with separation between them).
However, if we modify the query to
look like “hot AROUND(5) springs,” you get results where the two terms
are written on the page in close proximity.
Also, note also that if Google is unable to find anything within the
limit (of ‘n’), it will just do regular ranking of the terms without the
AROUND coming into the application.
This operator is particularly helpful in long articles or long text,
for example searching Google books. It is also helpful for when
searching for quotes, speeches or a song that’s stuck in your head, but
you can only think of a few words from it.
Google’s wildcard search operator, represented by Asterisk (hot *
springs), may achieve similar results but with AROUND, you even get to
specify the distance between the two search terms. Note: Do remember to write AROUND in all CAPS, else it won’t work.
Did you like this bonus tip about Google search? Tell us in comments!
Stay tuned for latest technology news and tips from Dailytechtricks
Apple
will be announcing the newest version of its mobile operating system,
iOS 9, at WWDC on June 8 according the Apple tracking website 9to5Mac.
At
the Worldwide Developers Conference, Apple reveals the new software
features it plans to bring to iPhones, iPads, and MacBooks and this year
it is not going to be any different. 9to5Mac’s Mark Gurman claims have some details what to expect from Apple’s next big iPhone update.
According
to his report, the iOS 9 will not be a game changer of any sort but
will have some tweaks and new features plus the usual security updates.
Redesigned Siri : According
to Gurman, iOS 9 will feature a new and improved Siri which will be
similar to the Siri on Apple watch. The Siri on the Apple watch is much
more colourful than it is on iPhone and iPad.
iOS will also have new wallpapers and colour themes and will come in a blue and green colour scheme by default.
A
relaunched Beats Music Streaming service is also expected to be a big
announcement at WWDC but some rumours suggest the software isn’t ready
just yet.
Gurman had reported in February that Apple wont go in
for a big visual change in the iOS 9. Instead Apple is focussing on
overall improvements to stability and performance. So users can expect a
stable iPhone and iPad. Apple will also try to keep the size of the
update manageable so that it’s easier for users to actually install the
update. This is because with iOS update, many iPhone and iPad owners
complained that it required too much of space.
According to
sources iOS 9 will be rolled out in fall this year after the iPhone 6s
is released. In the meantime Apple engineers are readying the iOS 8.4
update which will bring security, stability and a redesigned Music app
to the iPhone and iPad.
Smartphones have become important aspects
and technologies in people’s daily lives. It is because of the
portability, mobility, and functionality of such devices that push
consumers to buy them, instead of simply and solely relying on their
laptops at home. However, many people tend to buy smartphones
impulsively without considering the worth or value of their money.
They’re simply allured by the sleek style or the famous brand name of
such device and totally unaware that these smartphones are actually
overpriced while considering their capabilities, performance, and
security.
Gresso Azimuth A1
The Gresso Azimuth A1 is amongst the
luxury smartphones this year, and tech experts claim that this one is
overpriced. It is a partial failure when it comes to its technical
aspects, although the exterior features have high-end materials and
design. It costs $2,000; however, the manufacturer will be creating a
cheaper version costing $999. Considered as a premium handset, it is
made up of grade 5 titanium with a tempered mineral glass front panel.
It also has a steel keyboard, along with hand-polished keys.
Samsung W2015 Luxury Flip Smartphone
The company has announced its latest
luxury smartphone – the Luxury Flip Smartphone W2015. It costs at $2450
and also considered as one of the overpriced handsets this year. It is
made up of metal or steel structure for more durability. Although it has
good technical and interior aspects, this smartphone features Android
4.4.4 KitKat OS, dual SIM support, and a 16-megapixel rear camera.
Experts claim that it has no significant difference from other
smartphones ever released or are still in the market.
Lamborghini 88 Tauri
At a whopping $6000 is the new creation
of Lamborghini called the 88 Tauri. Based on sources, the manufacturer
has created only 1,947 units, offering exclusivity. The price tag is
unreasonable, considering the phone’s unimpressive specs. However,
consumers might still grab this latest smartphone, considering the
famous developer, which is also an automaker. Lamborghini fans may be
purchasing this unit impulsively, although high quality steel has been
used for the entire thing.
Gresso Regal Black Edition Luxury Android Phone
Also from Gresso, this luxury phone is
$5,000 worth. Instead of aluminum, titanium materials and 18 karat gold
trim contributed to the ridiculous price tag. The external design
features sharp lines and sophistication. The key features claims are not
far from existing smartphones as it also makes use of Android KitKat OS
with a 13-megapixel rear camera. Hence, consumers will be mainly
purchasing the titanium and gold trim on this one.
Quantum computing is one of the hottest topics these days and we have
been covering it from time to time. This is a computation device that
uses the quantum mechanical phenomenon different from the usual digital
computers operating with the help of transistors.
Digital computing uses the binary digits for data encoding, whereas
quantum computing uses quantum bits i.e. qubits. Know more about it here.
What is the news? – Quantum Computing OS Developed!
Cambridge Quantum Computing (CQCL) has developed a new operating
system designed to run the futuristic quantum computers. The new OS is
named t|kit> (yeah, you read it correctly). This
development has been possible with the help of CQCL’s very own
proprietary custom designed super-fast super computer and this made the
imitating of the working of a quantum processor.
“CQCL is at the forefront of developing an operating system that will allow users to harness the joint power of classical super computersalongside quantum computers. The development of t|ket>
is a major milestone,” company said in a statement. “Quantum computing
will be a reality much earlier than originally anticipated. It will have
profound and far-reaching effects on a vast number of aspects of our
daily lives.”
What is the future of Quantum Computing and how does this OS affect it?
Cambridge Quantum Computing expects that now quantum computing will
be a reality much earlier than expected. These days, the research in the
quantum computing field is being done at a fast pace.
It should be noted that few days ago, IBM has made further progresswith
its simultaneous error detection to make a working quantum computer a
reality in near future. CQC has said these developments could affect our
lives in a larger way when quantum computing will be a reality.
Does this development of quantum computing OS excite you? Tell us in comments below!
Google now allows you to export and download your entire search
history in no time. Last year Google tested a download feature in search
history and it appears that this feature is now available for everyone.
Some of us might think that what is the need of this feature? But let
me remind you, no one wants to leave a trail of their Google search
behind, and this is an efficient way to check what Google is storing
behind you.
This feature was disovered by a blog and it tells that Google now
lets your export all your search history to Google Drive and then you
can download the searches in a ZIP archive form. The files in the ZIP
archive are arranged by year and quarter.
Here is how to download your Google search history, take a look:
How To Download Google Search History?
Step 1.
To download your search history, first you need to sign in to that account then head on over to Google Web History. Now click on the gear button and click on download.
Step 2.
Now Google will display you a warning as your Google search history may have some sensitive information.
It’ll be good if you are not downloading your search archive at public or shared computer. Now click on Create Archive.
Step 3.
Now open your Gmail account and you will find an Email, open it and you can download your Google search history from there.
How To Delete Google Search History?
To delete Google search history again click the gear button and then
click on Remove Items and select the time interval for which you want to
delete the history. Warning: Do not download your Google search history at shared or public computer.
Not all smartphones and their operating
systems were created equal. There are uniqueness and differences between
these devices in the market, and someone who wants to shed off some
cash on one, should consider the security of a smartphone, not just the
sleekness in style, size, or color. While joining the smartphone frenzy,
you must consider the connectivity and advanced computing ability of
each smartphone available in the market. A reliable smartphone should
have the greater protection software, securing from malware, malicious
apps, and vulnerabilities. Presented here are the top most secured
smartphones in the market today.
Blackberry
Blackberry is very different from
typical smartphones out there, especially when it comes to threats. The
Blackberry developers did an exceptional job in its operating systems,
keeping the sensitive inner workings secret from the public. It allows a
minimal number of reliable exploits for this smartphone. An interesting
and proven concept that was developed for this device is the BBProxy
application.
Symbian
Although this is one of the oldest
smartphones, Symbian has very small information when it comes to
malware. This is not very popular in the United States but in other
countries. In recent years, Zeus, the mobile version, is known to appear
in Symbian and is now used in intercepting text messages sent, the
second-biggest factor of authentication in various services.
Android
This operating system is
community-driven, and not owned by a private individual or an
organization. Thus, it is created in the best interest of most users.
However, Android applications are not greatly monitored for
vulnerabilities, allowing anyone to deliver apps that may contain
malicious functions. Android users must determine how safe and reputable
the source of the app is. Today, a third party marketplace is being
imposed in order to give way to additional policies and limitations on
distributed apps.
Windows Mobile
When it comes to malware attraction via
SMS, Windows Mobile has higher amount than others. Many systems of the
Windows Mobile are shared with the full-featured desktop counterparts,
contributing to the many pieces of malware, which originated on the
Windows OS that are ported to the Windows Mobile OS. The Zeus botnet
also has been known to appear in mobile versions of Windows.
iPhone
Malware in iPhone is different with the
IOS 4 release. The multitasking on the systems is easily unnoticed,
allowing malware presence to be less intrusive and easier to miss.
Malware is prevalent in iPhones that went through jailbreaking as the
imposed limitations or restrictions were intercepted. When passwords are
unchanged, hackers and attackers can easily create worms that could
infect the operating device of the user.
Conclusion
We confirm that Blackberry is the most
secured phone you can grab in the market. Remember, smartphones have
different weaknesses and strengths, considering the security of their
operating systems. Users must avoid installing an application from
unnecessary or unknown sources, only from a reputable one. Malware can
disguise as secure apps, putting the device and the user at risk,
especially the sensitive data contained in such device. Smartphone users
are strongly advised to make a thorough research when it comes to the
applications and their smartphones for valuable information and to
prevent the installation of malicious apps and malware.