iTnews
  • Home
  • News
  • Technology
  • Software

Facebook takes top spot with over a third of internet visits

By Iain Thomson on May 31, 2010 7:13AM
Facebook takes top spot with over a third of internet visits

Latest Google data shows social networking domination.

Facebook is the most visited site on the internet according to Google's latest data.

The site logged 570 billion page views in April, reaching 35.2 percent of the total internet population. The next most popular site was Yahoo, with 490 billion page views and 31.8 percent of the market.

While Google's data doesn't include its own sites the full list does provide some fascinating insights into web search behavior.

Microsoft's Live site scooped third place but the open source Wikipedia claimed fourth, with one out of every five internet users visiting the crowd-sourced encyclopedia. The organisations latest upsets do not seem to have hurt the site's credibility.

Chinese search giant Baidu took eight place, reflecting its dominant position in its home market, with the official government news site of China, sina.com.cn, taking eleventh place.

Mozilla came in 10th with 140 million page views while Apple languished in 27th place with barely half that number of visitors.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:
billioninternetlatestplacesitesoftwareviews

Partner Content

Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Iain Thomson
May 31 2010
7:13AM
0 Comments

Related Articles

  • IoT Explained: What is the Internet of Things in Australia (June 2022)
  • Don't miss Australia’s premiere IoT Conference on 9th June
  • 5 essential digital transformation ideas
  • Top 5 Benefits of Managed IT Services
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Aussie Broadband nears end of NBN PoI fibre rollout

Aussie Broadband nears end of NBN PoI fibre rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Student details, photos exposed in University of WA data breach

Student details, photos exposed in University of WA data breach

Transport for NSW exits Global Switch data centre

Transport for NSW exits Global Switch data centre

Digital Nation

Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Swinburne University overhauls student management system
Case Study: Swinburne University overhauls student management system
COVER STORY: What happens when Google changes its algorithm?
COVER STORY: What happens when Google changes its algorithm?
Personalisation strategies need to be built from the ground up
Personalisation strategies need to be built from the ground up
COVER STORY: Multiple cloud models make security more complex
COVER STORY: Multiple cloud models make security more complex
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.