11 Essential Algorithms That Make The Internet Work

number

[credit provider=”Dylan Love”]

For the maths-phobic out there, don’t let the word scare you. An “algorithm” is nothing more than a set of instructions, just like a recipe or how-to book.And the Internet relies on many, many algorithms in order to function properly.

When you type search terms into Google, it follows a very complex algorithm to determine which results to show you. When you buy something on Amazon with a credit card, it uses an algorithm to safely transmit your credit information. And just the simple act of navigating the Internet and loading a webpage requires the use of an algorithm.

From basic and essential to complex and useful, here are 11 of the many algorithms that make the Internet work.

[slideshow]
[slide
permalink=”google-search-1″
title=”Google search”
content=”This is a huge one. You probably use it several times a day without realising the complexity behind it. It’s an algorithm that’s constantly changing in order to bring you the best search results possible.

And it’s VERY protected. It’s the Internet’s equivalent to the recipe for Coca-Cola.”
image=”http://static.businessinsider.com/image/4e3fc937eab8ea4248000005″
caption=””
credit=””
credit_href=””
]
[slide
permalink=”routing-algorithms-2″
title=”Routing algorithms”
content=”Routing is the process of finding a path in a network to send traffic. A number of routing algorithms are out there with names like fuzzy routing, heuristic routing, and adaptive routing, but each one helps make network communication possible.

Routing is one of of the core technologies at the heart of the Internet — no routing, no Internet.”
image=”http://static.businessinsider.com/image/4e413924ecad04ad7000003b”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”encryption-3″
title=”Encryption”
content=”Encryption is the process of turning information into unreadable nonsense characters. It’s what makes Internet credit card transactions possible and it’s at the heart of Internet security.

128-bit and 256-bit encryption algorithms are two of the most popular today. Prior to 1996, both were recognised as munitions by the US government — they were literally illegal.”
image=”http://static.businessinsider.com/image/4b4f792c0000000000ad5437″
caption=””
credit=””
credit_href=””
]
[slide
permalink=”facebook-news-feed-4″
title=”Facebook news feed”
content=”If you’re the type with several hundred Facebook friends, your news feed would absolutely explode with numerous trivial updates from people throughout the day. Luckily Facebook has put some algorithms into effect that attempt to identify the most important updates and only show you those.”
image=”http://static.businessinsider.com/image/4d5af0534bd7c899620d0000″
caption=””
credit=””
credit_href=””
]
[slide
permalink=”sendmail-5″
title=”Sendmail”
content=”Sendmail is an email routing tool — it’s makes sure that your email gets where you want it to. It supports the Simple Mail Transfer Protocol (SMTP), which is used by almost every webmail service.

It actually depends on several algorithms to handle tasks like queue management and delivery processing.”
image=”http://static.businessinsider.com/image/4e2456ba4bd7c856591c0000″
caption=””
credit=””
credit_href=””
]
[slide
permalink=”netflix-recommendations-6″
title=”Netflix Recommendations”
content=”Netflix already had a pretty good recommendation algorithm, but they wanted to make it even better. In 2009 they announced the Netflix Prize, a competition to see who could design a more successful algorithm that yielded higher customer ratings on recommended movies.

The team that won was able to improve ratings by 10% and they walked away with $1,000,000.”
image=”http://static.businessinsider.com/image/4e1c8c1dccd1d5cc4c1b0000″
caption=””
credit=””
credit_href=””
]
[slide
permalink=”hashing-algorithms-7″
title=”Hashing algorithms”
content=”Hashes are essential to ensure that transmitted messages haven’t been tampered with. The sender creates a ‘hash’ of a message and sends that along with the message itself. The person on the other end decrypts the message and the hash, produces another hash from the received message, and compares the two hashes.

If they’re the same, then it’s almost certain that the message hasn’t been altered by a third party.”
image=”http://static.businessinsider.com/image/4e4141bc69beddd07f00002d”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”advertising-algorithms-8″
title=”Advertising algorithms”
content=”Intelligent advertisers will implement an algorithm to determine which ads are displayed on a page in order to make sure that they prove relevant and drive revenue.

Take Google’s Adwords, for example — its algorithm relies upon your search terms in order to show you ads related to your search.”
image=”http://static.businessinsider.com/image/f1b9b9145a5fc04860f23900″
caption=””
credit=””
credit_href=””
]
[slide
permalink=”google-news-9″
title=”Google News”
content=”Google’s news algorithm looks at the volume of material that appears on a given topic and considers the number of other pages linking to it in order to determine if it should be displayed.

There are likely many more factors involved, but like Google’s search algorithm, those are kept under wraps.”
image=”http://static.businessinsider.com/image/4c1253907f8b9a5d179f0100″
caption=””
credit=””
credit_href=””
]
[slide
permalink=”amazon-recommendations-10″
title=”Amazon Recommendations”
content=”Going off of its nearly endless list of items customers have purchased together, Amazon can implement an algorithm to show you related products you might be interested in buying.

(It’s so useful that I sometimes use it as a way to find new authors or bands.)”
image=”http://static.businessinsider.com/image/4e413fda6bb3f7577800003b”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”pandora-playlists-11″
title=”Pandora playlists”
content=”Pandora follows an algorithm to determine which songs to play for you after you tell it what you like. It pulls its data from the Music Genome Project, an effort to ‘map’ songs based on identifiable elements and group them with similar songs.

It worked so well that Pandora went public with a $3.2 billion market cap.”
image=”http://static.businessinsider.com/image/4c24d5f17f8b9a2e50fc0100″
caption=””
credit=””
credit_href=””
]
[slide
permalink=”want-to-go-even-more-behind-the-scenes-12″
title=”Want to go even more behind the scenes?”
content=”Here are 22 Easter eggs hidden in your favourite Mac and Windows software >
image=”http://static.businessinsider.com/image/4e3ffaf8ecad04475b00003d”
caption=””
credit=””
credit_href=””
]
[/slideshow]