Home Home Tech Yahoo pipes out a challenge to Google

Yahoo pipes out a challenge to Google

There is so much information circulating throughout the web in the form of XML feeds that it's hard to keep track of it all. However, Yahoo wants to make it easy for ordinary web surfers to pick the eyes out of it all and organize it into a custom made useful format with tools from a website called Yahoo Pipes.

As Yahoo says on its website, Pipes is a hosted service that lets you remix feeds and create new data mashups in a visual programming environment.

According to Yahoo, the usefulness of the huge volume of XML feeds available to web users has been limited because users are restricted to feed readers which can access the information from one feed. However, Pipes allows users to take the data from one or more feeds and use it to build new applications.

On its site, Yahoo provides examples, such as: Pasha's Apartment Search pipe, which combines Craigslist listings with data from Yahoo! Local to display apartments available for rent near any business.

It's basically an application that had to happen in the Web 2.0 environment in which bloggers and posters are becoming one person news sources and news aggregators are picking up all the information on specific topics as fast as it can be posted.

Yahoo Pipes aims to provide ordinary web users with the ability to take the plethora of available data and develop new information applications, such as Pasha's Apartment Search pipe, which will have value for a variety of segments of the global Internet community.

While there have been queries raised about copyright issues of using proprietary content to create new applications, Yahoo, like Google, appears intent on re-writing the rules of content and publishing in the virgin territory of the Web 2.0 space.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Stan Beer

 

Stan Beer co-founded iTWire in 2005. With 30 plus years of experience working in IT and Australian technology media, Beer has published articles in most of the IT publications that have mattered, including the AFR, The Australian, SMH, The Age, as well as a multitude of trade publications.

 

Popular News

 

Telecommunications