will frequently log on and stay longer | complexqcのブログ

complexqcのブログ

ブログの説明を入力します。

A new wave of search enginesBaidu to do Well, Top Design Nike Air Force 1 Low Womens Red White Shoes the Internet has the sound of two discussions, the media or the community? The author's research views, Baidu do speak, the community can be a simple story, it can be a complex story with a motive, and its ultimate goal is not to be a media or community-based microblogging. From the development trend of the search engines to predict, we believe that the next round of the wave is I2I. First, Baidu Why do speak 1. First from the company's positioning talk Baidu search engine position is, once they come to Baidu is a business integrated services IT company, it would rank first in the Chinese search engine position back next, defeated the original second child or third. Because, this time is no longer a means Baidu \u0026 ldquo; Search \u0026 rdquo ;. Baidu to do Well, the essence is still the search engine service, and improve the search real-time information. Google's strength is very strong in the United States can not subvert Twitter and Facebook. Baidu to do \u0026 ldquo; China's Twitter or Facebook \u0026 rdquo ;, is impossible. In the face of Baidu Well, there are two strong competitors, Sina and Tencent, Sina is the voice of the Internet, Tencent is the relationship between the Internet. Baidu speak face Weibo this powerful opponents, I just can not speak \u0026 ldquo; China's Twitter \u0026 rdquo ;. Not as a people's voice sound one hundred leaders. What is a leader? He followed the team, one behind the leaders with a million people, one million one hundred leaders is, how can a people's voice louder than a hundred thousand? Sina years insist on doing the news media, the Internet and establish the influence and credibility are difficult to surpass Baidu. Baidu only implement differentiated positioning, to avoid direct competition, seek dislocation development. Well Baidu positioning of steering social direction, encountered Tencent, you do Nike Air Jordan Mens not kill action, can not be done Tencent, Baidu Well then launched a real-name authentication, through real-name authentication to reshape social value, expand their own micro-blog products. 2. Pressure from competitors' products do search engine Tencent, Sohu, Netease are doing microblogging, network rumors Sina also do search for instant information. Tencent acquired Sing, can strengthen communities and local forces of advertising, with local portals and communities should be able to do the advertising for the city and county, which is Baidu's short board. In urban and rural markets of the 234 line, Tencent's search engine and affiliate ads can fast break. Sohu and Alibaba cooperation to engage in search, Alibaba has acquired Phpwind, it's also a lot of pressure on Baidu. Baidu's competitors have microblogging product, Baidu can not ignore this situation, resulting in a lost war instant information search. 3. Chinese-style business thinking tweets received Google's licensing fees, allowing crawls do instant messaging search. After the charges authorized by China's micro-blog to the search engines could cost a business model, but it has several major portals search engines when you have to pay first, second, may not let you grab information. Baidu may be thinking, with its tens of millions each year to pay for a micro-blog, it is better and he is doing a microblogging product, it avoids the risk of termination of cooperation. Two, I2I is the wave of development in the search engine round 1. What is I2I? I2I is to open up the relationship between IP and ID, to achieve cross-site communication, learn who is behind the IP. Suppose, a boss to do the wine business, there is an SMS blasts, a passerby came to market, that there 100 000 phone number, but do not know who all of a boss do not. Lu Renyi walked to sell, that there 100,000 phone numbers, these numbers have 90,000 is the boss, and 10000 is often buy wine, a boss to buy these numbers. Passerby Why not sell? The reason is not clear who the number is, could not find target customers. Lu Renyi why Authentic Nike Air Force 1 Unisex Beige Brown Shoes sell? This is because the number who can figure out is to find the target customers. If a site real-name certification, the phone number in a ratio of IP, the real-name authentication than the cellular phone owner (ID). Thus, the search engine by Verified became obvious who is behind the IP, as the mobile phone number as Lu Renyi become worthless (an analogy, illegal speculation phone number). 2. Search engines can not do I2I? You can not do I2I, but your opponents do not? Tencent QQ client, technically fastest solve I2I, to know who is behind the IP? Accelerated search engine user behavior, so that the search engine advertising becomes more accurate. Tencent force website statistics would be a matter of time. 3. What search engine profitable core business? Keyword advertising. A with \u0026 ldquo; I2I \u0026 rdquo; analytical search engine keyword advertising certainly can greatly enhance precision marketing. Assumptions: IP is a \u0026 ldquo; 111.111.111.111 \u0026 rdquo; the user Joe Smith landed microblogging real name, then Joe Smith and landed on another site, if the site and the use of the search engine's statistical services, but also hung up affiliate advertising search engine. What happens is that? Statistics available on IP as \u0026 ldquo; 111.111.111.111 \u0026 rdquo; tell the search engine keyword advertising system, Joe Smith coming, running ads against John's. 4. What is microblogging? In addition to the media microblogging or social, but also is a platform for self-exposure. What are you doing? What concerns do you like? The more you admit the content, the more accurate the authentication information registered, the more help data analysis, precisely which ads to push you. Your name, region, age, sex, education, social relationships, hobbies, income, consumption and other data, the search engine is difficult to analyze the past, and wants a lot of data models and algorithms terror, the result is not accurate. Affiliate sites hung its affiliate advertising, its advertising system also do not know who is 2015 Latest Nike Shoes behind each IP is? Now suddenly resolved. Your real name: IP111.111.111.111 visitors called Zhang three, graduated from Peking University, MBA, M, 31 years old, unmarried, hobbies, travel, photography, sports and literature, the annual salary of 200,000, living in Beijing X Zone X Street Working units XX company, title XX department manager. In the micro-Bo made the picture is Canon SLR (Nikon lenses ads do not push). Microblogging talking about basketball (advertising push basketball shoes, do not push soccer shoes). Let the era of micro-ad 5.I2I rise in January 2010 I proposed the concept of micro-century and micro business, behind microblogging cloud information is commercial value. Concept of micro-analysis of the data is that when the micro-blog post a message \u0026 ldquo; I went to Beijing next week, \u0026 rdquo ;. Micro-blog to see hotel ad, this hotel is in Beijing, not in Guangzhou. If you do not know Google Search hotel search engine advertising you go to Beijing, you have to use the \u0026 ldquo; Beijing Hotels \u0026 rdquo; keywords. Then, this ID to browse the pages of other sites, but also to see the Beijing-themed advertising. This is impossible in the past, but in I2I era, this idea will eventually become a reality, you are in the search engine, enter \u0026 ldquo; \u0026 rdquo ;, hotel predict you will find Beijing hotel, rather than looking for Shanghai Hotels . Micro advertising is the advertising to which people or types of people, this is a revolutionary change! The company sells golf membership card, you can select executives, owners of such target customers in advertising time to run, you can distinguish between a foreign company executives, or private business executives? The big boss of the company, or small business owner. If the customer wants to sell golf membership cards \u0026 ldquo; \u0026 rdquo ;, Air Jordan 7 Joe Smith Micro ads will appear in \u0026 ldquo; Zhang \u0026 rdquo; eyes. Therefore, the micro-ads are customized ads to target customers, are an advertising plan, based on individual-centered, individual-targeted advertising program. 6. Micro Advertising Age has great interests of the chain drive that we heard of search engine advertising as is to show the search results. I2I era need to do this. The tens of millions of ID all have the ability to invest the second suite, advertising in the CCTV does not know which Zhangsanlisi will buy a second, but the search engine I2I know someone who lives in the 18th Street, Room 1203, Guangzhou John Doe want buy; two million of ID ready to buy a car this year, car brands do you want to run ads for these ID; two million ID are office ladies, often buy clothing, clothing brand do you want to run ads for these ID; this three million Authentic Nike Air Force 1 Unisex White Gold Shoes ID is love, flowers website Do you want to advertise for these ID? Third, website statistics prospect if I2I is the next round of development wave of the search engine, the search engine will layout the acquisition of site statistics company, or do large site statistics. From this point of view, the business website statistics are promising, it solves the \u0026 ldquo; Who goes, newspaper name \u0026 rdquo; problem. If there were only five site statistics, each value of two hundred million, you all buy it, will certainly be worth more than one billion. Tencent and Alibaba's acquisition have done right, site statistics and search engines are integrated with strategic significance, owners will be happy to raise revenue. Make access ID is also the case, once the business model and linked data will be able to achieve strong marketing. Solve I2I, decrypt network rumor is relatively easier. For example, a rumor post, who made it? Over the past only to see a posting of IP \u0026 ldquo; 111.111.111.111 \u0026 rdquo ;, but if this \u0026 ldquo; 111.111.111.111 \u0026 rdquo; other sites have logged Verified association ID, is I2I analysis can tell POLICE \u0026 ldquo; 111.111.111.111 \u0026 rdquo ; is Joe Smith, through mutual reconnaissance ID and IP, and Joe Smith, what site ID, in this year, which have been to the site, which pages are visited. Also, rumors posts in the crowd and spoke of Internet users who have their name. I2I can also logic to determine who ID is. Such as IP \u0026 ldquo; 111.111.111.111 \u0026 rdquo; Log ten different websites. 1. be identified by a site ID. If you are not using the ID, is on the way through the following overall judgment. 2. By region to identify, if most of the statistics show this ID owner in Guangzhou, the IP can initially excluded from the field. 3. The URL link structure with ID features, such as name.abc.com and www.abc.com/name structure pages that usually only ID users will frequently log on and stay longer. When there are two or three or more sites, the recognition rate will continue to increase. 4. From the sources of judgment, IP \u0026 ldquo; 111.111.111.112 \u0026 rdquo; from search keywords name.abc.com come to this page, IP \u0026 ldquo; 111.111.111.111 \u0026 rdquo; page from the favorites come, compared to the back of the IP more like the ID owner. 5. From the client's feedback to judge. Some clients let users participate in product feedback, or scan the browser what to upload statistics, web pages, and you never know these data, but the data people can grasp. Search engines will not take the analysis I2I? It certainly will not openly say \u0026 ldquo users; we analyzed you, then you run the ad for the \u0026 rdquo ;. How IP, data, logic and behavioral science to determine who IP is, there should be more methods, which is left to the experts. Finally, the assumption that a person who commits wrong, on foot, and one day get a fake ID to the Internet, inadvertently using an earlier ID, assume that the police had legitimate reconnaissance ID data, then he would be arrested on the Internet baffling. He did not know, by I2I from an IP or ID scouting him other ID. I2I certainly lead to the privacy of Internet users think, and even condemnation, Air Jordan 7 but a company to study the I2I, they will definitely go to the level of legal and technical avoid risk, because they are not short of money, not lack of experts and legal advisers. Source: Jane Zhe submission, the original link, this paper only simple view Zhe creative laboratory mentioned do not represent the official view of the company's paper.