Skip to main content

[转]“部落格观察”推出Blog排名

并不指望我blog能如何,但是何时才有简体中文Blog排名呢?


//原文(决定以后转载都加上这个)

4月份,我曾经写过一篇“blog的价值到底该如何评估?-试谈blog排名的计算”,谈到blog价值的评估及其排名计算的方法。不过却一直没看到一家中文网站提供blog排名的服务,直到今天才偶遇到一家台湾网站“部落格观察”推出了blog排名服务,该服务对blog的成长和排名进行统计分析,只面向繁体中文和台文blog(不过经测试简体blog一样可以提交)。

输入你的blog地址,它会自动分析,然后生成这个blog的唯一ID,通过这个ID可以将blog的排名及统计情况实时显示出来,同时支持图片和文本方式,你也可以很方便的将这个排名放到你的blog上。如果你有兴趣也可以去登记一下。

从这个blog排名的排行榜上,可以看到台湾地区排名第一的blog是:弯弯~用漫画写日志,更多的blog排名可以看这里

部落格观察推出的blog排名综合了多项搜索引擎、网摘、blog工具网站的数据,以下是排名的计算公式:

总排名=Index 指数+ 影响+ Page 总分+ Blog Influence+ Technorati 。。。

Index指数 Google Web Page(含 http:// 及 不含) + Google Link + Yahoo Link + Blogger Search (link 与 url 加总) 及 Technorati (link, blog, url 先加总) 先取 log 再相加
影响 将 Google 加上 Blogger 及 Technorati 的总合 然后与 Yahoo Link 相乘,再开根号
重视度 订阅人数 加 网摘人数
Page总分 将 Google Web Page (W and W/OUT http://) + Google Link + Yahoo Link +Blogger Search + Technorti
[!] 原始的 Blog Influnece 分数
Google Google 搜寻出来的 Web Page 数量 (含 http:// 及不含)
Link Google 及 Yahoo 用 link: 搜寻出来之数字
Blogger 在 Blogger 用 link 与 url 搜寻出来之数字
Technorati Technorati 的排行, Blog 连结数, 来源数与网页数 (但系统排名是经过调整)
Bloglines 透过 Bloglines 阅读 Feed (RSS, Atom, …) 的人数
Delicious del.icio.us 摘录 Blog 网址的人数

从以上可以看出这个blog排名计算相当的全面,也很有参考价值,不过如果是大陆做blog排名,部分服务商需要做变更,这样才更符合大陆blog的实际情况。


Comments

Popular posts from this blog

Determine Perspective Lines With Off-page Vanishing Point

In perspective drawing, a vanishing point represents a group of parallel lines, in other words, a direction. For any point on the paper, if we want a line towards the same direction (in the 3d space), we simply draw a line through it and the vanishing point. But sometimes the vanishing point is too far away, such that it is outside the paper/canvas. In this example, we have a point P and two perspective lines L1 and L2. The vanishing point VP is naturally the intersection of L1 and L2. The task is to draw a line through P and VP, without having VP on the paper. I am aware of a few traditional solutions: 1. Use extra pieces of paper such that we can extend L1 and L2 until we see VP. 2. Draw everything in a smaller scale, such that we can see both P and VP on the paper. Draw the line and scale everything back. 3. Draw a perspective grid using the Brewer Method. #1 and #2 might be quite practical. #3 may not guarantee a solution, unless we can measure distances/p...

Hardware Password Manager

[Updates 2025-01-20] The original blog post assumes that all passwords are stored in one password manager, and the password manager either unlocks everything or nothing (e.g. Keepass). After discussing with friends, I realized that if I use something like pass , and I use a hardware GPG token, I can actually store and sync all encrypted passwords to all devices, because I will only decrypt the passwords on demand, and the computer will not see the GPG private key. The compromise is that the computer will see the list of all password entries (e.g. accounts), as well as a few other issues . I've been using Keepass for many years. I don't use online password services because I cannot fully trust them. Besides, I may not always have Internet connection, which is why I also don't use a self-hosted service. Everything has been working fine, until I turn my paranoid knob to the max. Here's the thought experiment . The Imaginary Scenario Let's say I have 100 PCs for differe...

ESP32S3: Flash Encryption and Secure Boot

Flash encryption and secure boot are useful security features for ESP32S3 chip. While not perfect, they definitely make it harder to extract the secrets in the chip. However, it is tricky to enable both features at the same time. The topic is actually discussed in the official documentation: ESP32S3 Security Features Security Features Enablement Workflows Especially, the second one mentioned it is recommended to enable flash encryption before secure boot. But I still find the documentation confusing. In the end I was able to successfully enable both, here's my findings. My Understanding After my adventure, here's what I think could have worked. WARNING, this is untested. Follow  Security Features Enablement Workflows : Burn all the keys, as long as their purpose eFuses and read/write protections Burn other security eFuses, but DO NOT burn ENABLE_SECURITY_DOWNLOAD in the middle, which is mentined at the end of the instruction for both flash encryption and secure boot. Burn...