Find It Online The Complete Guide To Online Research Fourth Edition Alan M. Schlein Download
Find It Online The Complete Guide To Online Research Fourth Edition Alan M. Schlein Download
https://ebookgate.com/product/find-it-online-the-complete-guide-
to-online-research-fourth-edition-alan-m-schlein/
https://ebookgate.com/product/a-guide-to-conducting-online-
research-1st-edition-ted-j-gaiser/
https://ebookgate.com/product/emarketing-the-essential-guide-to-
online-marketing-first-edition-rob-stokes/
https://ebookgate.com/product/the-rough-guide-to-myspace-online-
communities-1-rough-guide-reference-1st-edition-peter-buckley/
https://ebookgate.com/product/the-information-professional-s-
guide-to-career-development-online-1st-edition-sarah-l-nesbeitt/
Online Marketing Inside Out Online Marketing Sitepoint
1st Edition Brandon Eley
https://ebookgate.com/product/online-marketing-inside-out-online-
marketing-sitepoint-1st-edition-brandon-eley/
https://ebookgate.com/product/the-marketing-plan-how-to-prepare-
and-implement-it-fourth-edition-william-m-luther/
https://ebookgate.com/product/the-complete-guide-to-the-gap-year-
kristin-m-white/
https://ebookgate.com/product/online-society-in-china-creating-
celebrating-and-instrumentalising-the-online-carnival-1st-
edition-david-kurt-herold/
https://ebookgate.com/product/the-smart-girl-s-guide-to-privacy-
practical-tips-for-staying-safe-online-1st-edition-violet-blue/
Find It Online
The Complete Guide to Online Research
4th Edition
ON DEMAND
Q PRESS
©2004 By Facts on Demand Press
206 W. Julie Drive, Suite 2
Tempe, Arizona 85283
(800)929-3811
www.brbpub.com
ON DEMAND
QPRESS
Find It Online
The Complete Guide to Online Research
4th Edition
1st Printing
ISBN 1-889150-45-2
Edited by J.J. Newby and Peter J. Weber
Cover Design by Robin Fox & Associates
Schlein, Alan M.
Find it online : the complete guide to online
research / [by Alan M. Schlein ; edited by Peter Weber
and J.J. Newby]. - 4th ed.
p. cm.
Includes index.
ISBN 1-8891150-45-2
Allrightsreserved. Printed in the United States of America. No part of this book may be used or reproduced in any form or by
any means, or stored in a database or retrieval system without the prior written permission of the publisher, except in the case
of brief quotations embodied in critical articles or reviews. Making copies of any part of this book for any purpose other than
your own personal use is a violation of United States copyright laws. Entering any of the contents into a computer for mailing
list or database purposes is strictly prohibited unless written authorization is obtained from Facts on Demand Press.
This book is sold as is, without warranty of any kind, either express or implied, respecting the contents of this book, including
but not limited to implied warranties for the book's quality, performance, merchantability, or fitness for any particular purpose.
Neither the authors, the publisher, nor its dealers or distributors shall be liable to the purchaser or any other person or entity
with respect to any liability, loss, or damage caused or alleged to be caused directly or indirectly by this book.
Acknowledgments
I could never have gotten this book done without the incredible help and inspiration
of a lot of people.
Researching this book was both challenging and incredibly rewarding, giving me the
opportunity to tap into the knowledge of some of the best minds in the online world.
I should discharge my debt to them by absolving them of blame for any error or biases. Any
mistakes are mine. Having established that all problems are mine, I am deeply grateful to all
those who have helped along the way.
First, to my contributors, listed on the back cover whose insights, guidance, and willingness to
share your knowledge have taught me much of what I know. Many of you are simply the best
in yourfieldsand I thank you for your willingness to share your knowledge with me and
contribute to this book. Special thanks to Greg Notess, Nora Paul, Barbara Quint, Mary Dee
Ojala, Mary Ellen Bates, Amelia Kassel, Mark Goldstein, Gary Price, Danny Sullivan, Reva
Basch, and Chris Sherman who have repeatedly contributed to my growth as well as to
specific points of this book. A special note to Carole Lane and Don Ray; I can never thank you
enough for your expertise, guidance and support. Also a note of thanks to my great networks
at AIIP and IRE who have been good friends and supportive of every effort I make.
Next, I want to acknowledge that, at least for me, a reporter is nothing without a good editor.
In the first two editions, I had the guiding hand of Shirley Kwan Kisaichi. In the Third
Edition, I could never have done this without the skilled work of J.J. Newby. You outdid
yourself this time, making me continue to do better. P.S.: Congrats to J.J. and Jeff on the baby.
Thanks also to my team at BRB Publications - Mike and Mark Sankey, editors Peter J.
Weber, Ivy and Christine Bailey for having the continued faith in me to get this book into a
third edition and for all their help along the way. I would also like to thank my friend and
website designer Dan Levy; Vince Ricardel for the back cover photo; my many friends at the
National Press Club; and of course, a few journalists who have always helped on my career
path, Charlie Thomson, Brian Buchanan, Ian Brodie, and Hugh Davies. Also a note of thanks
to the folks at Dialog, Factiva, and LexisNexis for giving me access to your resources and
support for my training classes.
On a personal front, I dedicate this book to my Dad, Richard, who I think about all the time
and who inspired me to thoroughly enjoy the career I have chosen and whose memory and
spirit continues to thrive among all those he touched.
To keep this to a reasonable length, I would like to give a blanket thanks to all my friends,
family, clients and colleagues. Thanks for your patience and understanding.
To my mom, Betty, my brother Michael and his wife Jordan, my sister Carol and her husband
Craig and their children Margaret and Jamie, you all give me great joy. Also, to my extended
family, Fred Weinberg, Jason and Lara. You are an enjoyable bonus.
To my wonderful stress-relief team - you know who you are - for helping distressed me when
needed, and to my A-team (listed alphabetically) for keeping me motivated, relaxed, focused
and smiling:
Gina Adams, Elizabeth Auster, Angela Betters, Lolita Baldor, Randy Blumenfield, Anna
Darling, Lisa Day, Kelli Emerick, Cassandra Falls, Katherine Feldmann, Corinna Ferrer,
Christopher Fotos, Tatianna Franchesci, Robin Frasca, Tammie Gaydos, Rose Geiger Mitch
Gerber, Briana Gowing, Joanne Grossi, Holly Haines, J.J. Hastings, Mary Holverstott, Donna
Hover, Theresa Howell, Cynthia Hunter, Heidi Klamath-Moore, Holly Klotz ,Cheri Lacey,
Jean Lyman, Kendall Marks, Beth Marchak, Lisa Marshall, Ginny McNair, Sarah Memari,
Jackie Merrick, Eric Mittleman, Julie Montgomery, Jim Moody, Kevin "Kebmo" Moore,
Belinda Norton, Cheryl Peppers, Heather Pedersen , Tiffani Prior, Eric and Kat Powell,
Helena Rey, Rory Robertson, Jonathan Salant, Marsha Shaikh, Donna Sager, Gina Simpson,
Paul Skolnick, Stephanie Spong, Karen Spranklin, Mark Thalheimer, Eric Thompson, Patsy
Thompson, Nicole Vann, Stephanie Viers, Marsha Walton, Melissa Wang, Lora Ware ,Terri
Williams, Britt Wilsen. Desiree Wood, Lorrie Worley, Jessica Zicari, and the many other
friends in L.A. and Washington D.C. whose ears I bent in the course of this book. You should
only know how important you are to me.
To my amazing growing family of cats - Moose, Murph, Kali and Sammi - who always know
the perfect moment to crawl onto my lap and give me unrivaled joy and affection.
Contents
Browser Beware 4
A World of Knowledge at Your Fingertips 4
Have You Heard About...? 6
I Cannot Get Away From the Web.. .Or Do I Want To? Love Links 7
Problem Solving 8
Ultimate Entertainer; Home Is Not Just a Browser Button 9
Thoughtfulness at the Click of a Mouse; Keeping In Touch 10
More Creative Uses of The Internet 11
Not All That Glitters Is Gold 13
When Private Information Becomes Public; Data Mining 14
Online Technology - Picking Up Where Direct Marketing Leaves Off 15
The Letter You'll Never Get 17
Personal Information from a Marketer's Point of View 18
You Can Level the Playing Field! 21
Additional Websites for Creative Uses of the Internet 22
Meta-Search Tools 98
Advantages and Disadvantages of Meta-Search Tools 99
Paid Placement or Paid Inclusion; Researcher Beware!
Paid Placement and Paid Inclusion - How They Work 100
Meta-Search Tools and Paid Positioning 101
Best Search Engine Tools 103
Search Engine Comparison Chart 112
Other Top Search Engines; New Search Engines to Watch 113
Best Subject Directories 115
Subject Directory Comparison Chart 118
Best Meta-Search Tools 120
All-In-One Meta-Search Tools 124
Specialized Search Tools (listed alphabetically by category) 125
Archive Searching; Bibliographies/Books/Libraries; Business Intelligence 126
Education; Engineering/Math/Computers; Environment 127
Genealogy; General-to-Specific Search Tools 128
Health and Science 130
History; KIDS Search Tools 131
Media Finders: Audio and Video, Image, Music 133
Military; News; NewsBlogs; Politics; Public Records 134
Reference Sites; Religion; Statistics 135
Toolbars 135
Tips from a Search Engine Guru 138
The Invisible Internet - What Search Tools Cannot or Do Not Access 140
Opaque Web; Private Web; Proprietary Web; Truly Invisible Web 141
Other Invisible Web Characteristics 142
Ten Tips for Searching the Invisible Web 143
Finding Images on the Invisible Web 145
Best of the Invisible Web 145
Local Searching - A Future Trend 146
Resources on Search Tools; Must-Read Best Search Tool Resources 148
Additional Websites for General Search Tools 149
A Guide to Fact Finding, Document Finding, and People Finding Research Tools 151
Contact Information and People-Finding Tools 153
Where Does Information on People Come From? What information is Available? 154
Best People Finders 155
Reverse Phone Searching 159
Yellow Page Finders 160
Email Finders 161
Group and Affiliation Listing Finders; Accountant, Architect, Association Finders 162
Aviation Professional Finders; College and Alumni Related Finders 163
Hollywood Finders; Information Broker Finders 164
Legal Profession Finders; Government Finders; Medical Professionals Finders 166
Health and Medicine Information Tools 167
Military Finders 171
Expert Finders 172
Genealogy and Personal History Search Tools; Adoption Search Tools; Biography Sites 174
Genealogy Resources 175
Find It Online
Government Records Versus Public Records; Changing Landscape of Public Records: 9-11 Fallout .248
Types of Public Records; Bankruptcy Court Records; Corporate Records 250
Court Records 251
Recorder's Office and State Agency Records 253
Vital Records 255
Contents
Managing Incoming Information; Managing Email; Managing.. .Using Bookmark Folders 378
Managing Downloads; Managing Your Offline Life 379
Helpful Hard-Drive Organizers 380
Filtering: Controlling the Deluge 380
Filtering for Kids 381
Best Filtering Tools 382
Bots as Personal Search Tools 383
Best Bots 384
Push Technology 385
Push: The Downside 386
Alert Services 386
Computer Virus Alerts; Competitive Intelligence Alerts; Earthquake Alerts
Government Alerts; Table of Contents Alerts News Alerts 387
Other News Alert Tools 388
Contents
Online Interactions: A Reality Check; Web Browsing; Internet Service Providers (ISPs)
Gated Communities 443
Discussion Groups and Bulletin Boards; Mailing Lists;
Usenet Newsgroups; Instant Messaging 444
Privacy and Email 445
Ten Tips to Combat Spam 446
Popups, Pop-Unders, and Messenger Service Annoyances 448
The Ultimate Gold Mine: You; The Golden Trail of Cookie Crumbs 450
Spyware: A Potential Hazard 451
Get To Know Your Cache 452
Major Privacy and Security Threats; Identity Fraud: A Devastating Epidemic 453
Medical Records: A Privacy Meltdown Waiting to Happen 455
Children: Prime Targets for Data Miners 457
Workplace Privacy 458
Find It Online
Cell Phone and Camera Privacy Issues; Cell Phone Images 459
Web Cams 460
Your Data vs. Industry Concerns 461
Ten Tips for Protecting Your Privacy Online 461
More Ways to Protect Your Privacy; Deep Clean Your Computer 464
Disable Your Cookies 465
Use Anonymizers and Encryption; Padlock Your ISP; See Yourself as Others See You 466
End Marketing/Telemarketing; Stop Giving Out Your Personal Information 467
Read and Watch for Privacy Policies; Make Sure Online Forms Are Secure 468
The State of the Law 468
Some Perspectives on the Larger Debate 471
I Have Anti-Virus Software, Do I Need a Firewall Too? 472
Terrorism and Its Effects on Privacy 474
Additional Websites for Privacy and Protection 476
The Internet has opened up a new world to millions of people. Think of the advantages. The
Internet enables you to be your own researcher and find information critical to making decisions
that affect your life. The Internet allows us to instantly tap into amazing information sources. It
allows people to answer questions they never could before, and communicate like never before.
Still, as super searcher Mary Ellen Bates says, many researchers look at the Internet as a gardener
looks at a field of wildflowers. There is a ton of great material there and you know it is there, but
you still need to pick your way through the huge amounts of weeds and nasty pests to find what
you want.
Find It Online is your field guide, a companion to help you zoom past the weeds and head straight
to the best of the Internet. It will show you what is really out there, how it can be useful to so
many areas of your life, and how to get the results you want quickly and efficiently. Consider this
book as your practical, how-to guide, updated yearly, with pages and pages of the best websites
and commercial databases, plus tips from some of the world's leading researchers.
This edition has new features. Fighting against spam. How to control popup ads. The best ways to
handle annoyances - you will find new and valuable information, resources, and techniques to
help make your online experiences more fun, rewarding, and have less hassles. This edition will
again highlight international online resources and provide tips for finding the information in other
countries, how to translate those results, and other important considerations for performing truly
global research. You will also learn that major search tools are becoming more local in focus.
We are seeing a new sophistication in the many search tools available to us, a world of tools no
longer limited to just search engines and subject directories. This edition of Find It Online
provides the latest in search developments in addition to teaching you the basic tenets of sound
research such as developing a search strategy, and also how to verify the information you find.
You will learn about the many tools in your research arsenal, why they are effective, and how you
can use them. For example, you will learn how to properly select from search engines, subject
directories, meta-search tools - and more - to find just what you need when you need it.
Find It Online - something you keep next to your computer and flip through the chapters as you
need them. Whether you are a newbie to the 'Net or a professional researcher, you are bound to
find tips and tricks, and useful resources that are relevant to your searching needs.
• Chapter 1 gives you a look at how people all over the globe are creatively using the
Internet to change the world around them.
• Chapter 2 gives you the basics you need to understand how your computer finds
information, and why your search works or not. Learn how to fight spam, handle email
like a pro, and know how to look good on the computer and on the Internet.
Find It Online
• Chapter 3 helps you frame a strategy to find what you are looking for.
• Chapters 4 and 5 give you the latest look at search engines and the many other specific
tools you can use to find information. These chapters also focus on ways to tap into the
"invisible web" and get to hard-to-find information that search engines may not locate.
Learn the importance of "the human element" - finding experts or people knowledgeable
about the subject you care about, who can guide you quickly to the best information.
• Chapter 6 examines the amazing collections of information found on governmental sites.
• Chapter 7 looks at the expanding selection of public records available on the Internet.
• Chapter 8 looks at the myriad of news resources available online and where to find
breaking news online.
• Chapter 9 focuses on business information and how you can research companies,
competitors, and potential new markets around the world.
• Chapter 10 looks at the international landscape and shows you how to find information
in foreign places. This chapter includes locating translation tools enabling you to read
pages in foreign languages and find out what they mean in your native language.
• Chapter 1 1 examines managing andfilteringinformation. Here you will find tips and
tricks for triaging the overwhelming amount of information you get when you research.
This chapter also highlights some effective strategies for narrowing the barrage of
information by using alerting tools to track information that is important to you.
• Chapter 12 offers techniques and insights into determining if the information youfindis
accurate, credible, and the most up-to-date available.
• Chapter 13 gives you some specific searching examples and problem-solving techniques
you can apply to your own search requests.
• Chapter 14 offers a reality check on how your privacy is being violated when you search
for information. Learn about spam and ways you can protect yourself from prying eyes!
• A bonus chapter - The Cutting Edge - looks at how all this technology is changing and
where we are going in the near future, with the latest on wireless search tools, and
hotlinks directly to the best sites. You can only view this chapter online at
www.deadlineonline.com.
In addition, Find It Online offers a series of valuable indices, and at the ends of chapters are
additional websites to take you a few steps further. Not all information can be found for free
online, so we have included profiles of vendors who have public records for purchase.
Looking for more innovative ways to help you and your company research more effectively, contact me
and maybe I can show you and your staff how to do it with a hands-on demo. Conversely, I am always
looking for the latest techniques and tricks and the best sites, so if you have suggestions, or comments,
go to my website www. deadl ineonl ine . com or email me at alan@deadl ineonl ine. com
- Alan Schlein
Creative Uses of the Internet
Chapter 1
In Karoo National Park - a animal preserve that spans parts of South Africa, Namibia and The
Congo - modern technology has partnered with an ancient art to help protect the wildlife.
Preserving the legacy of the Kalahari bushmen, today's bushmen trackers continue to
successfully track game. They can follow nearly invisible animal tracks and identify the animals
that made them, when they made them, and even what they ate along the way. These bushmen,
like their ancestors before them, are an invaluable resource of information about the local
environment. For generations, conservationists have sought to tap that knowledge.
Now, despite their inability to read and write, the bushmen can record what they see and share
their unique wisdom with the rest of the world by using handheld computer devices linked with
satellites in space. Information that has never been written down is now being logged, cataloged,
and used to map the environment. Under this program - developed by Louis Liebenberg, Director
of Cybertracker Projects in South Africa, Namibia, and the Congo - these wired trackers are
enabling conservationists to accurately follow the wildlife across the African bush.
It works like this: when a tracker sees a black rhinoceros or other endangered species, he matches
it with a picture icon on his handheld computer. The attached global positioning system or GPS -
a technology used around the world by planes, cars, and boats for positioning and mapping
purposes - pinpoints the tracker's signal to a ground location within seventy-five yards of his
position. When he returns to camp, he uploads the information to a central computer. The
information is mapped so that park and conservation officials know precisely where endangered
animals are located. This helps the everyone drastically reduce threats from both predators and
poachers.
Add an internet connection into the mix, or wireless capability, and that information can be sent
anywhere in the world in a matter of seconds.
Find It Online
This is not so unusual. The work of cybertrackers and the African bushmen is just one example of
the technological revolution reshaping our world.
Do we really know how to use the Web? Consider this: a 2004 Outsell (www. o u t s e l l i n c . com)
study of over 12,335 knowledge workers found that:
• 85 percent said they do not know what information is available on the Internet,
• 72 percent said they do not know which sources are reliable,
• 70 percent said they think information is "too hard tofind,"and
• 56 percent said they do not know how to evaluate sources.
And 88 percent of these people say they are "skilled" or "very adept" 'net users!
Is this feeling of being overwhelmed due to rapid advancements in information technologies - the
Internet, electronic notepads, a never-ending fount of publicly-accessible information?
Browser Beware
While the Internet offers remarkable opportunities to learn, the future also comes with the need
for caution. For better or worse, online technology is making it easier than ever for personal
information to be collected, disseminated and accessed by a mind-boggling array or people and
entities. Even if you do not use a computer, your privacy is being violated on a regular basis. You
are a part of the online world, whether or not you actively participate in it.
In order to retain some control of the information that can be found about you, it is incumbent on
you to learn exactly what someone else can uncover about you and how you can protect yourself
from being exploited.
So while a new world of information is easily available, the very information you want to know
about someone else may also be found about you. If you feel vulnerable, the best way to protect
yourself is to learn what others canfindout about you.
But first you need to understand how to use these resources. Think of the Internet as the world's
largest library, available whenever you need it.
"You can't take that book out," snapped the librarian as the man handed her the book at the
counter. "That's volume seven of the encyclopedia, How-to-Hug."
The lesson is if you keep looking hard enough, eventually you can find what you need. To be
smart and time-efficient, it is always better to learn how the system you are using works.
Despite the myth to the contrary, you cannot find "everything" on the Internet. If you learn how
to use the search tools and understand how the Internet works, then you can avoid spending hours
aimlessly looking for that one site in a million and quickly pinpoint exactly what you want to
find. In the process, you can protect your privacy by learning what information can be found
about you and how to keep that information out of the hands of prying marketers.
Over the past couple of months, I have looked to the Internet to discover:
• how to calculate the difference between South African rand and American dollars
• the blue book value of a car
• the most popular words people search for on the Internet
• how to check the weather report in Hawaii (sunny and warm, surprise)
• a synonym for the words "amplitudinous"
• if a specific lawyer has been sued for malpractice
• absolutely everything I can about an alleged terrorist
• the patient safety records of some nursing homes
• the proper way to fix a plumbing problem
• how to buy dinner for someone while they are honeymooning on a remote island
• a vegetarian restaurant in the Netherlands
• the gravesite of someone's ancestor
• how to write a grant request and a business plan
• the location of the nearest ATM machine
• how to track my packages being shipped across the world
• who was born and what happened in history on a friend's birthday
• how to compare the cost of living in different cities for friends who were looking for jobs
• the rules of a long-forgotten childhood game
Another creative use of the Internet, at least for me, is to let its strengths compensate for my
weaknesses. A confession. I am hopelessly geographically-impaired. When people tell me to go
west, I am in trouble. Now, because I routinely look at map sites like www. mapquest. com or
www. mapsonus . com, I can find my way. These sites provide turn-by-turn directions, telling
you to make a left at this corner and arightat that one.
Find It Online
D
Some people suggest the Internet's time has already come and gone. I think otherwise. Between
580 million and 655 million people were online in 2002 and those numbers keep skyrocketing,
with as many as 945 million expected online by the end of 2004 according to Computer Industry
Almanac www.clickz.com/stats/big p i c t u r e / g e o g r a p h i c s / a r t i c l e . p h p / 5 9 1 1 _ 1 5 1 1 5 1
Can you find everything you want on the Internet? Using computers in research is a big step in
the direction of finding information. Vast stores of information are on the Internet, but locating
exactly what you want requires some forethought about how to search for it. Unquestionably,
computers can manipulate huge volumes of information, but getting exactly what you want when
you want it requires more than putting in a keyword and praying you come up with the right
answer.
- Death is big business on the Internet. There are tributes to people who are dead, those who just
refuse to admit they are dead - The Dead Psychics Line at www.geocities.com/
Athens/Forum/6909/dead.html and even pages to the "living dead." There are even betting
pools on when certain celebrities will die. Seriously, on Stiffs.com (www.stiffs.com). If you
like quirky sites, there is the National Museum of Funeral History (www. roadsideameri
ca.com/attract/TXHOUfuneral.html).
- There are serious pleas from those who need life-saving organs and perhaps the most unusual,
kiosks on the Internet tied to cemeteries where biographers and families write and film video
tributes to honor those who have recently passed away.
From the serious to theridiculousto the sublime, you can find it online.
Love Links
Ifirstfound out how my life-long bestfriendand new husband felt about me when I received
an email which led to a website he constructed that told me he loved me. If you don't have a
steady mate in your life, I know many couples who found true love on the Web via dating sites
such as Match.com (www. match. com) or Matchmaker.com (www.matchmaker. com). On
these sites, you can post a photo and a profile then sift through those of other members until
youfindyour match. Think of it as a relationship search engine. The site hides your real email
address so you can safely communicate via protected email before you give out any identifying
information. Once it is time for thatfirstdate, Yahoo! Yellow Pages (http : //yp. yahoo. com)
will help you twofindrestaurants or other businesses/services nearby (mini golf, bowling,
Find It Online
whatever your pleasure is) allowing you to search by name or category and by proximity to an
area or address. Most importantly, it allows you to get directions, which you can double-check
at MAPBLAST (www. m a p b l a s t . com, now owned by Microsoft). Nothing kills a first
impression like being late or getting lost.
For a night at the movies, you can search movie listings online at your local paper or use a
regional entertainment guide. There you can read the reviews and find the closest theater with
the best show times. Resources vary by area, but a Washington D.C. area example is
h t t p : / / e g . w a s h i n g t o n p o s t . c o m / s e c t i o n / m o v i e s . Many movie theaters now sell
tickets online, so you can skip the long lines at the box office.
Once you get to the "comfortable" stage with your date, you can plan a quiet dinner with what
you already have in the pantry with recipe searches at Busy Cooks (http : / / b u s y c o o k s .
a b o u t . com and go to Recipe Box), or www. r e c i p e s . com. Enjoy a steady stream of DVDs
by subscribing to NetFlix (www. n e t f l i x . com/Default). Provide them with a list of your
movie requests and you'll receive new DVDs each time you mail back the old ones.
Keep the romance alive by sending flowers and gifts (www. 8 0 0flowers.com,
www, ftd.com, www. thepopcornf a c t o r y . com) and the occasional silly card
( h t t p : / / g r e e t i n g s .yahoo.com or www. f lowgo. com).
And once you know this is forever, learn about the four C's of diamond ring shopping and even
try your virtual hand at ring design at www. adiamondi s f o r e v e r . com. Once she says "I do"
however, expect her to disappear for hours at a time when she logs onto The Knot
(www. t h e k n o t . com) which is the destination site for cyber-sawy brides because it provide a
personalized online checklist, seating chart software, articles, chat rooms, a place to host a
wedding website, a virtual gallery of wedding dresses, bridesmaids dresses and other wedding
attire, and tons more. She will rapidly overtake the bookmarks section of your browser marking
wedding favor places (www. b r i d a l i n k . com), registry sites (www. weddingchan
n e l . com), places to order invitations (www. wedding. o r d e r s . com) and much, much more.
If you are the groom, you should encourage this, however, because otherwise you will have to
go from store to store and vendor to vendor with her, so letting her work it all out online means
you can stay sane and use your weekends for your own activities.
Problem Solving
Many times, when I haven't known where to turn, I've turned to my trusty tool — the Web.
When our cats dug up a neighbor's garden, I found many resources on the Web including tips
at www. g a r d e n f ounda t i o n . com/pet s / p e t s 2 . htm, do-it-yourself methods for keeping
them from climbing fences at www. c o r p o r a t e v i d e o . c o m / k l i p s / d e t a i l s . htm,
instructions for building a kitty kennel at www. j u s t 4 c a t s . com, and the solution I finally
went with, Cat Fence-In at www.catfencein.com. There are tons of resources for just about
Creative Uses of the Internet
every kind of pet and every kind of pet crisis. Need a company that specializes in ground
transportation of pets? Try www, feather sandfurvanlines . com.
Unexpected babysitting duty for a friend? Thank goodness for coloring pages printed from the
Web, which you canfindthrough this coloring book search engine
http://ivyjoy.com/coloring/search.html.
When I suddenly broke out in a mysterious rash at the office, I quickly ruled out the possibility
of it being anthrax orricinby going to the Centers for Disease Control: www. cdc . gov. I also
discovered it was a case of stress-induced hives by visiting the Skin Rash Flowchart at
http://familydoctor.org/flowcharts/545.html.
When an out-of-state meeting ran long, the fact that I had downloaded the airline's flight
schedulefromthe Internet to my Palm Pilot proved to be a time saver. In a matter of minutes,
I was able to call and switch my tickets to the exact flight I wanted.
I am convinced there are few everyday problems that cannot be solved via the Web.
Ultimate Entertainer
Since I am often asked by friends and families to plan and organize parties for milestone
events, I've found so many helpful resources on the Web. I have found baby shower games
(www. df c r e a t i o n s . com/BabyShower. html), guidelines for age-appropriate parties for
kids (www. parenting. com, www. parents . com, www. amazingmoms . com), and for a
real party twist, found a How To Host a Murder party kit (www. mystery-games . com/w
ooden-horse/murmyspar. html). It is easier to shop online for party decorations and
goodies than runningfromstore to store, and the selection is much better. Afrequentstop is
Birthday Express (www. birthdayexpress . com) and for the murder party, I found several
things at Marshal Moody (www. marshalmoody. com/5Os . asp).
Keeping In Touch
This is not site-specific, but it shows you how the Web can bring far-flung family members
closer. My father used to joke that I was the hub of a communications network — the Newby
Network — and that I could hear and disseminate family news in a matter of hours. Thanks to
the Internet, now it takes seconds. Literally every member of my family has an email address,
including the infants and the elders. Most even have their own websites. All of us have Instant
Messaging accounts through AOL. So, when my sister went into labor, my mother in Florida
called my father in California who, unable to find me by phone, IM'ed me, so I could IM my
then-fiancé Jeff, who IM'ed his family in Florida, while at the same time my father IM'ed my
aunts, uncle, and grandparents. When we decided to call the hospital, I looked it up online,
found out the room extension, talked to my sister to get the details (a boy, seven pounds, nine
ounces, healthy, 20 inches long), and was able to broadcast this news in real time to all my
anxiously awaiting relatives. The IMs were chiming loudly on my screen while I talked to her,
and I was able to answer their questions: Does he have hair? Eye color? How is the father
holding up? It did not take long for the proud daddy to upload digital photos to the new baby's
website.
When we see photos on the website we like, we can easily move them over to Shutterfly
(www. s h u t t e r f l y . com) which allows you to order dye-sublimation ("real" photo prints)
Creative Uses of the Internet
copies of digital photos. You can also try Ofoto.com at www.ofoto.com. I made the proud
parents a brag book of their baby, and copies for all the grandparents.
m
If you want your family to be able to peek into your life, but do not have the skills or desire to
maintain your own website or web log, you may want to look into a no-programming-skills-
required online diary site at http : / / d i a r y l a n d . com.
So the long-term impact of the Internet on global society is still undetermined, and most likely
will change along with how our use of the Internet changes.
One clear area where the Internet has proven to have negative consequences is in the area of
privacy. What follows here will begin to explain the unseen information caching aspect of the
business that is the Internet. Also, Chapter 14 illuminates privacy and protection issues, and what
you can do to protect your best interests.
Data Mining
The process of harvesting information, referred to as "data mining," is a huge, booming business.
When you register your pet, your house, or your car, pay your taxes, use a credit card, send in a
warranty, subscribe to a magazine or conduct any of the hundreds of activities that comprise
normal life, you leave behind information about yourself. In recent years, the quality and detail of
information about our lives has skyrocketed.
In the old days - what we can call "B.C." for "before computers" - credit card bureaus and junk
mailers collected information about people from the purchases they made and the warranty cards
they mailed in, but the companies had to record the information by hand, and cross-referencing of
the material was an inaccurate and unwieldy process. They were able to target market groups by
gender, age, ethnicity, neighborhood and so on, but with nowhere near the precision they do now.
Creative Uses of the Internet
•a
Magazines sell their subscription lists to direct marketers, too. Increasingly, so do other
institutions such as schools, churches, banks, insurance companies, and mail order companies.
They do it mostly without your knowledge and, in some cases, contrary to your consent. To these
companies, information about their customers belongs to them, not you. They consider the money
they make from selling the information to be part of their profit stream.
Businesses are not immune to the same kind of targeting. There is such interest in business
profiles that many companies build extensive databases, company profiles, and reports on
industries and competitors. In addition, companies target specific businesses and follow their
every movement to get new sales leads, and scour publications and all kinds of information to get
a jump on a trend or to stay a step ahead of the competition.
Three of the leading U.S. data mining companies - Metromail, (now Experian), First Data
Corporation, and Acxiom - control huge databases with demographic, geodemographic,
psychographic and behavioral information. First Data claims to maintain a database of more than
160 million individuals, and ten million U.S.-based businesses. Metromail Corporation claims to
sell data on ninety-five percent of U.S. households.
This data includes our birth dates, how often we travel, what we buy, prescriptions we use and
whom we telephone. In the U.S., some companies also gather, store and sell Social Security
Numbers - numbers that uniquely identify every U.S. citizen and are essentially the golden key to
a cache of private information. The major U.S. credit bureaus - Experian, Equifax, and Trans
Union - maintain databases with information about people's jobs, income, bank accounts, credit
limits and most significantly, credit card transactions.
Online Technology:
Picking Up Where Direct Marketing Leaves Off
Direct marketers who buy wholesale or custom-made databases from credit card companies and
other sources use the information to develop more product marketing and targeting strategies.
You know those telemarketing calls that keep your home phone ringing off the hook? Guess how
they got your name, number, and buying habits? Right. Read on.
There is one big difference between traditional direct mail and the Internet. Internet target
marketing starts where direct mail ends. Online technology enables almost anyone to access
information contained in one or more databases and combine them in a nanosecond. This allows
the marketers and their clients to zero in on your specific interests.
In fact, some of the largest commercial sites on the Internet have agreed to feed information about
their customers' reading, shopping and entertainment habits into a system developed by Engage
Technologies of Massachusetts. Engage is already tracking the moves of more than thirty million
Internet users, recording where they go and what they read - often without the user's knowledge.
Find It Online
•a
Not surprisingly, this technology disturbs privacy-rights advocates who worry about the
increasing ability of online companies to collect and store personal data.
Example: A cat food company wants to introduce a new line of gourmet food products. Using
traditional direct marketing techniques, they could contact a data miner and purchase lists
of people who precisely fit their target profiles. The data would include home addresses,
phone numbers, the names of their pets and contact information for the nearest pet store to
their homes.
They could also purchase lists of cat owners and people who buy cat products from
supermarkets and pets store companies. Using the Internet, they could purchase lists of
email addresses of people who visit cat-related websites or those who use cat-related
newsgroups and mailing lists. Such discussion groups are in abundance on the Internet.
The cat-related groups include a l t . a n i m a l s . f e l i n e s , a l t . c a t s , and
r e c . p e t . c a t s .misc. (Discussion groups are discussed in Chapter 5, Specialty Tools.)
In addition, there are other discussion groups, called mailing lists, where people subscribe to
receive correspondence about specific subjects. One cat-related group is called the PURRS
mailing list, which dubs itself "a purrfect place for all cats and kittens to chat."
Marketers are only beginning to tap into these groups as sources of information.
**hot tip: Most people do not realize that what you thought was a private email between you
and a friend could actually be seen by others along the route. At every step along
the way your information footprint passes across the screens of numerous online
handlers whose staff (permanent, temporary, subcontracted, ex-convicts,
whomever) can read your data — information that you never intended for
unauthorized viewing.
~^< **~< *0™ ~0~ *0"< o^»"" .««I""1 «*>" ~l*<" .«df" il»'"' *0<« .*#" «.»"" ****Um«Kl4F I I* 1 "" .«0<«< «mj"1" ,,#"" „,0«< ^"'- .*?«' ^«' ,,**•< *0"' **<"<**''< ,*»*'<*Ê*' m0"l**0"<*l0*lm
Creative Uses of the Internet
IB
The Letter You Will Never Get
By Don Ray
Just a long-overdue note to say thanks for all the information you gave us yesterday —
information we computerized and are making available to hundreds of other marketers like us.
You are our prime source of information, and income.
In case you weren't paying attention, here is where you dropped loose "information change"
into our little "information piggy bank:"
When you turned on your cellular phone this morning, we noted that you got a late start to
work. We did not sell the information, but we are working on it.
You stopped to get gas and used your electronic credit card to pay for the gas and a quart of oil.
I see you bought that new synthetic oil. We sold that information to the manufacturer. They
said they may send you a coupon for the next one before they sell your address to someone
else. You might want to drop them a thank you note.
Did you miss breakfast again? You stopped at the chain fast-food place and used your ATM
card. You actually had them put mayonnaise on your potato nuggets? We will alert the
condiment manufacturer. They may want to track the rest of your eating habits.
We were wondering if you were running low on cash. Sure enough, you stopped at the ATM
for a $60 withdrawal. Oh, I hope you do not mind, but we notice from the security camera there
that you are a bit overweight. Too much mayonnaise and potatoes? Just kidding. We sent the
information from your bank account to a couple of weight-reduction clinics. We do our best to
keep you in good health.
Hey, thanks for dropping your business card into that fishbowl at the restaurant. Listen, don't
count on getting a free lunch, but we were able to see from your card that you work in retail
sales. At your age, you should be doing better. We took it upon ourselves to give your name
and address to a couple of trade schools. For a minute we thought you might want to go to a
truck driving school, but with your driving record you might be better off as a dental hygienist.
While you were at work, we received that warranty card you mailed last week when you
bought the new DVD player. Thanks for letting us know that you like to play tennis, you enjoy
gardening, and you and your spouse have a combined income of $72,000. We will let the
appropriate people know. There are some telemarketers who will call you tonight to tell you
about some promising stock options.
Find It Online
o Oh, wait. Tonight's your bowling night. We just got the list from the bowling center. Is your
spouse going to their creative writing class tonight? After using their credit card to buy $115
worth of textbooks, they had better go.
You went to the supermarket on your way home last night. You saved $3.80 by using your
handy Preferred Customer Card, and we were able to learn a lot about your family. You have
been buying disposable diapers for over a year. You were buying the pink brand, with the
protection at the bottom. Now you are buying the blue brand with the protection infront.A
baby boy, eh? I confess, we checked the birth certificates to learn the little tyke's name.
Brandon, eh? Named after your mother's father. How nice.
You know, we really value all the wonderful marketing information you are giving us. We have
visions of tracking you for the next twenty years.
Again, thanks so much to you, your spouse, your kids and Rascal for all you've done for us.
Sincerely,
p.s.: Forgot to mention that Rascal needs his rabies vaccination before the end of the month.
~ Don Ray is a multimedia investigative journalist and a sought-after speaker in information gathering, privacy
and public records. He has written books on sources of information, interviewing, checking out lawyers and on
document interpretation. His email address is donray@donray. com
Believe it or not, some people do not mind marketing. In fact, the following piece illuminates the
bright side to advertising on the Internet.
Personal Information
from a Marketer's Point of View
ByRobbinZeff
Before you get all worked up and conclude that the use of personal information by marketers is
a bad thing and has no direct benefit to you, consider this:
Targeting and personalization in advertising on the Internet has the same effect. Through the
sophisticated technological capabilities of the Internet, an advertiser can deliver the right ad to
the right person at the right time. In the example above, when Bill recommends a scone as he
hands me my coffee, he knows that it is the right time to hit me up for an additional purchase.
This strategy works just as well in selling books or CDs. If you are purchasing the latest murder
mystery novel by John Grisham, you might be interested in an ad for a similar page-turner by a
different author. In which case, the ad becomes a source of information.
This is precisely the strategy behind targeting and personalization in Internet advertising: put
the right ad in front of the right person at the right time to increase the relevancy of the ad to
the individual. For the marketer, personal information allows the advertiser to maximize the
efficiency of the advertising and make each ad a piece of relevant information to the consumer.
Targeting like this has been the age-old dream of advertisers. What the Internet brings to the
forefront is the ability to deliver on this promise.
Targeting based on content and context is easily achieved on the Web by placing ads on
specific websites and on particular pages within those sites. Search engines do this through
keyword ad placement. For example, an advertiser can buy a specific keyword like "allergy"
and every time that keyword is requested, an ad for its allergy relief medicine appears on the
page. This is only the beginning of the targeting capabilities for internet advertising. (See the
Paid Placement sidebar in Chapter 4, Search Engines.)
Find It Online
Example: A major newspaper chose to make its online access free to all registered users. Why?
The value of the demographic information provided by the viewers was deemed to be more
valuable than the potential income from subscription fees. Information about the demographic
profile of its readership enabled the newspaper to charge a premium for its ad space.
But, online targeting can do even more. The backbone of direct mail is using databases to target
consumers with specific interests and then exposing them to products that their profile might
find of interest. These databases are built on previous buying patterns, magazine subscriptions,
and even Zip Code analysis. Marketers rent these lists and then send their material to the
targeted lists. Internet marketers compile their own lists in addition to overlaying existing
database information. The result is that soon Internet marketers will be able to do everything
online that traditional direct marketers do by mail, but online targeting can go even further.
The next level of targeting is unique to the technological capabilities of the Internet. Through a
technique called "collaborative filtering," companies are learning the buying preferences of
consenting searchers and then using this information to recommend books, music, and even
movies. The result is that an enabled site can function as an old and trusted sales clerk who
knows your taste in music and movies and, consequently, knows just what to recommend.
Then there is a method of Internet targeting based on actual behavior in which special software
analyzes the user's behavior on the site and then presents ads based on analysis of the user's
behavior during that particular online session. Each user session is unique and the software
does have to store the data. For example, a web searcher who behaves like a thirteen-year-old
girl will receive ads that appeal to thirteen-year-old girls. Later, if that person comes to the site
and acts more like an adult, different ads will be shown.
So, is it a bad thing to have an advertiser know what you like and how you like it?
When the issue of access to personal information is put in this light, the answer for most
consumers is "no." Targeting in advertising is actually a service to the customer. One way or
another, ads will be shown on websites. Personally, I appreciate the fact that when I visit my
favorite websites, I am only shown ads for products and services of interest to me. Likewise, I
like the fact that when I walk into my favorite coffee shop, Bill behind the counter knows just
Creative Uses of the Internet
El
how I like my latte. My only hope is that someday my computer will be able to brew up a great
latte while I am on the Web.
~ Robbin Zeff is president of the Zeff Group, a research and training firm specializing in Internet advertising
and marketing. She wrote the best-seller Advertising on the Internet and The Nonprofit Guide to the Internet.
Her email address is robbin@zef f . com website is www. z e f f . com
Example 1: You work for a company that solicited and received bids for a large contract.
The lowest bid looks good ... too good. So, you go online and discover some
interesting facts: the low-bidding company incorporated just two years ago, and its
CEO's previous companies were tangled in numerous lawsuits, liens and
bankruptcies. Clearly, the CEO had a habit of changing companies every time he
ran into trouble - and he ran into trouble regularly.
Example 2: You are a divorcée and your alimony checks have been shrinking. You are due
a specified percentage of your ex's income, and something seems amiss. So, you
start digging online and discover through public records that he has remarried and
is in the process of transferring his assets to his new wife. Clearly, his strategy is to
reduce his assets and reduce his alimony payments. You have a right to file a court
appeal, and do, and the court is made aware of his hiding of assets. You fought
back by using public records, which cost you almost nothing to access.
The list of everyday applications is endless. As you read this book you will become familiar with
tools and concepts that enable you to move freely and effectively online. Websites are constantly
changing, but the techniques to master searching on the Internet will continue to work as the
Internet evolves. These techniques enable you to find more recent sites on subjects that interest
you. Chapter 14, Privacy & Protection, lays out a number of ways for protecting your privacy.
H£l Find It Online
Chapter 2
The Basics
Basic Internet Terminology
and Concepts
r irst, in this book there will be no talking about "surfing" unless it relates to the beach. There
will be no talk of "cyberspace" or the "information superhighway." These terms have been used
to the point of being meaningless when discussing online research. (Okay, okay; maybe we will
let the information superhighway reference go because it can be a useful metaphor...)
Second, while this book contains thousands of useful sites, the wonder as well as the frustration
of the Internet is that it changes every single day. New sites are added on the Internet at a frantic
pace, and existing sites can disappear without warning. So the focus of this book is not to be the
definitive index of websites, but to get you pointed in the right direction and teach you how to
reason your way through the Internet and find what you are looking for quickly and efficiently.
Finally, a caution: think carefully before you write, send, or post anything on the Internet. Do not
post anything you would not post on, say, a grocery store bulletin board, or as journalists say, do
not say anything you would not want to see attributed to you on page one of the newspaper.
While most of your email discussions will be private, mistakes happen and if you live online by
the public standard - meaning that everything that happens will be broadcast to the masses - your
caution will give you some peace of mind.
This chapter is designed to give anyone - novice or expert - a quick understanding of the basics
of how the Internet works and tips for using it more effectively. The chapter is divided into
subsections and uses the question and answer format to allow more experienced web users to skip
around to only the answers that interest them. Hopefully, this book will become a steady
companion with you as you work your way around the Internet. Feel free to skip around to the
chapters most relevant to your searching needs.
El Find It Online
Now, people can access the Internet from dial-up phone lines, dedicated digital high-speed phone
lines, cell phones, and other mobile devices such as personal digital assistants (PDAs). So the
answer is a little more complex, but the formula is the same. You still need a device that has a
computer's capabilities, a way to connect to the computer network, plus software such as a web
browser, email client and possibly other software components. Much of this software is preloaded
on your computer (we will use the term "computer" to universally mean whatever device you are
using to connect to the Web) and only requires you to enter a few pieces of information from your
ISP in order to get you up and running.
What I s an ISP?
Because there is no single gatekeeper to the Internet, an internet service provider creates a secure
entry point into one of the many computers that comprise the Internet. They provide accounts for
individuals and companies to access the Internet. These accounts include a unique ID and
password, and a phone number or connection your computer can use to connect to the ISP's main
computer. There are a variety of pricing plans and ways you can connect to the Internet.
Usually your ISP will provide software programs including a web browser, electronic mail or
email program, and sometimes additional software. They also tend to provide customer support
and technical information. Many also offer a wide array of other services including hosting web
pages. Most ISPs will work with the browser and email programs already installed in your
computer, but some internet companies like America Online (AOL) and Microsoft Network
(MSN) provide their own proprietary software to get you online. This includes a way onto the
Internet as well as a range of other online servicesfromnews to travel information, to chat rooms
- available only to their members. AOL, the largest of these online services, has thirty-three
million subscribers.
Internet Service Providers, telephone and cable companies have different methods of charging for
internet access. In the United States, the standard has become unlimited access for between
US$20-$25. High-speed cable unlimited access costs a little bit more, and satellite delivery is
usually more than that. In parts of Europe, Asia, and Latin America, access is charged on a per-
minute basis, so the costs of spending time on the Internet can vary dramatically. As a result, the
way someone researches a subject will change based on their budget. Also, when faced with per-
minute charges, people tend to go where they are familiar instead of exploring new sites.
^3 Find It Online
IMAP servers, or Internet Message Access Protocol servers, are sometimes used as alternatives to
POP. POP is great when you are using your own computer, because you must download the email
before you can read it. If you travel away from your PC or cannot take your laptop with you,
downloading your messages onto other people's computers can be a big problem later. That is
where IMAP comes in handy. With IMAP, you leave the email on the server, so you can read the
messages at your convenience. They stay on the server until you delete them. That way you can
check them from the office and again from home, or when traveling, before you delete them.
Most ISPs prefer you use a POP server so that they do not have to store your messages.
You can also use web-based email services that allow you to send and receive mail using only
your web browser.
Web mail works through the World Wide Web instead of using a separate email program. The
information rests on a server on the Web, and you never download it to your hard drive. Under
web-based mail, the browser acts as your simple email program. The big advantage of using web
mail services is they tend to be free since you already have the browser, and you can access them
from almost any computer in the world. It also allows those without their own computer to
receive email. It also provides a modest level of privacy or anonymity, allowing you to write
email from your office when you do not want to use your work email address. I strongly
recommended that you get a web-based email address as a backup to any POP-based email
service in case your regular email is not working.
There are a few downsides however to web-based email services. These services can be
extremely slow at times, and are often loaded with advertisements. Even worse, some of these
services put advertisement tags on the bottom of every piece of email so even your recipients will
see the ads. The worst part of this is that they are notorious for being the recipients of spam and
there is almost no way around it. (See the spam section below for more information.)
Mail forwarding is another option. With this type of email, your mail is redirected to wherever
you choose. This allows you to switch Internet Service Providers without losing your regular
email address. This can also be accomplished by setting up what is called an alias.
A few of the better web-based mail services include:
MSN Hotmail Lycos Mail Yahoo! Mail
www.hotmai1.msn.com http://login.mail.lycos.com http://mail.yahoo.com
What I s an I P Address?
When you are connected, your computer will be assigned a unique internet address, called an IP
address. This is the official location of your computer while it is on the Internet and allows other
computers to route information to you. No two computers can use the same IP address
simultaneously. Some ISPs give you a static IP address - your computer will always have the
same address, while others assign a dynamic address to you each time - a different number each
time you log in. The reason for dynamic IP addresses is that there are so many computers
accessing the Web at various times, that eventually it would run out of numbers. Dynamic
addresses allow web users to recycle addresses that are not in use at that particular time. Your
E9 Find It Online
The IP address or IP number is a code made up of a series of numbers separated by dots that
identifies a particular computer on the Internet. Every computer requires one to connect to the
Internet. A web IP address looks like 216 . 1 4 7 . 4 7 . 1 3 4 and if you put h t t p : / / in front of
that particular IP address in the location bar on your browser, you can go to that specific page,
which belongs to a terrific glossary on computer terms by Sharpened.net. Domain names are the
word-based addresses for websites and are usually much easier to remember than the IP address.
A domain name does not become active until it is matched to an IP address. Before you can send
something to someone, your email program must ask your Domain Name Server to convert their
email address to its IP address. This process is called a DNS lookup. Coincidentally, DNS lookup
is a valuable tool forfindingwebsites that are no longer active.
In addition to allowing computers to route information back and forth, IP addresses can be used
as investigative tools. Law enforcement agencies around the world have been able to track
criminals directly to specific computer IP addresses, even dynamic ones. (See the Chapter 14,
Privacy & Protection for more details.)
What I s a URL?
A web address is also called a URL or Uniform Resource Locator. Every web page has a unique
URL that can be broken into three parts: the protocol, the domain name, and the file path. While
in the early days many pronounced this "earl," the common pronunciation is to spell it out "u-r-1."
Some addresses may start out with h t t p s : / / or f t p : / / -these are just different types of
connections, called protocols, to computers on the Web.
At the end of the domain name - after the . (or "dot") - is a two- or three-letter abbreviation that
indicates the top-level domain. This part of the domain tells you the kind of organization the
website you are looking at is, or the country where the host server is located.
HTML tags consist of a left angle bracket (< or "less than" symbol) followed by the name of the
tag and closed by a right angle bracket (> or "greater than" symbol). Most tags are paired, with a
beginning (or open) and an ending (or close) tag. You can see the HTML coding on your browser
by clicking on "View," then "Source."
HTML coding is what makes the Internet easily readable to crawlers, but HTML has many
weaknesses. So the creative minds behind the Internet have been looking to a newer language to
help move the Internet into its next phase. It is called XML.
As Internet expert John December explains, XML (extensible Markup Language) is a method for
defining structure in documents. The philosophy behind XML is that the information (text,
images, etc.) of a document can be identified through a set of rules. With these rules, a variety of
software applications (like browsers) can interpret, display, or process data in documents.
XML, similar to HTML, was created to specifically address the issue of writing documents for
the Web. As in HTML, XML authors use elements bracketed by open and close tags. Unlike
HTML, XML does not limit you to a fixed set of elements and entities, giving you much more
flexibility and allowing the documents to include context and have structural relationships in your
documents. XML is the next big language.
Using XML, you will be able to define your own elements, which allows you to create a logical
structure in documents. So instead of being locked in by HTML coding, you can add elements
(like an image or a person) to help define structures that are in complex relationship. This
flexibility will ultimately help organize web pages and how they relate to one another. For more
on how this works, see John December's excellent site www. december. com
Language: English
BY
INGERSOLL LOCKWOOD,
Of the New York Bar.
That was a terrible night for the great City of New York—the night
of Tuesday, November 3rd, 1896. The city staggered under the blow
like a huge ocean liner which plunges, full speed, with terrific crash
into a mighty iceberg, and recoils shattered and trembling like an
aspen.
The people were gathered, light-hearted and confident, at the
evening meal, when the news burst upon them. It was like a thunder
bolt out of an azure sky: “Altgeld holds Illinois hard and fast in the
Democratic line. This elects Bryan President of the United States!”
Strange to say, the people in the upper portion of the city made no
movement to rush out of their houses and collect in the public
squares, although the night was clear and beautiful. They sat as if
paralyzed with a nameless dread, and when they conversed it was
with bated breath and throbbing hearts.
In less than half an hour, mounted policemen dashed through the
streets calling out: “Keep within your houses; close your doors and
barricade them. The entire East side is in a state of uproar. Mobs of
vast size are organizing under the lead of Anarchists and Socialists,
and threaten to plunder and despoil the houses of the rich who have
wronged and oppressed them for so many years. Keep within doors.
Extinguish all lights.”
Happily, Governor Morton was in town, and although a deeper
pallor overcame the ashen hue of age as he spoke, yet there was no
tremor in his voice: “Let the Seventh, Twenty-second and Seventy-
first regiments be ordered under arms.” In a few moments hundreds
of messengers could be heard racing through the silent streets,
summoning the members of these regiments to their Armories.
Slowly, but with astonishing nerve and steadiness, the mobs
pushed the police northward, and although the force stood the
onslaught with magnificent courage, yet beaten back, the dark
masses of infuriated beings surged up again with renewed fury and
strength. Will the troops be in time to save the city? was the
whispered inquiry among the knots of police officials who were
directing the movements of their men.
About nine o’clock, with deafening outcries, the mob, like a four-
headed monster breathing fire and flame, raced, tore, burst, raged
into Union Square.
The police force was exhausted, but their front was still like a wall
of stone, save that it was movable. The mob crowded it steadily to the
north, while the air quivered and was rent with mad vociferations of
the victors: “Bryan is elected! Bryan is elected! Our day has come at
last. Down with our oppressors! Death to the rich man! Death to the
gold bugs! Death to the capitalists! Give us back the money you have
ground out of us. Give us back the marrow of our bones which you
have used to grease the wheels of your chariots.”
The police force was now almost helpless. The men still used their
sticks, but the blows were ineffectual, and only served to increase the
rage of the vast hordes now advancing upon Madison Square.
The Fifth Avenue Hotel will be the first to feel the fury of the mob.
Would the troops be in time to save it?
A half cheer, a half cry of joy goes up. It is inarticulate. Men draw a
long breath; women drop upon their knees and strain their eyes; they
can hear something, but they cannot see as yet, for the gas houses
and electric plants had been destroyed by the mob early in the
evening. They preferred to fight in the dark, or by the flames of rich
men’s abodes.
Again a cheer goes up, louder and clearer this time, followed by
cries of “They’re coming, they’re coming.”
Yes, they were coming—the Twenty-second down Broadway, the
Seventh down Madison avenue, both on the double quick.
In a moment or so there were a few bugle calls, and a few spoken
commands rang out clear and sharp; and then the two regiments
stretched across the entire square, literally from wall to wall, in line
of battle. The mob was upon them. Would this slender line of troops,
could it hold such a mighty mass of men in check?
The answer was a deafening discharge of firearms, a terrific crack,
such as some thunder bolts make when they explode. A wall of fire
blazed across the Square. Again and again it blazed forth. The mob
halted, stood fast, wavered, fell back, advanced again. At that
moment there came a rattle as of huge knives in the distance. It was
the gallant Seventy-first charging up Twenty-third street, and taking
the mob on the flank. They came on like a wall of iron, bristling with
blades of steel.
There were no outcries, no cheers from the regiment. It dealt out
death in silence, save when two bayonets crossed and clashed in
bearing down some doubly-vigorous foe.
As the bells rang out midnight, the last remnants of the mob were
driven to cover, but the wheels of the dead wagons rattled till
daybreak.
And then the aged Governor, in response to the Mayor’s “Thank
God, we’ve saved the city!” made answer:
“Aye, but the Republic——.”
CHAPTER II.
There had been a strange prophecy put forth by some one, and it
had made its way into the daily journals, and had been laughingly or
seriously commented upon, according to the political tone of the
paper, or the passing humor of the writer, that the 4th of March,
1897, would never dawn upon the American people. There was
something very curious and uncanny about the prediction, and what
actually happened was not qualified to loosen the fearful tension of
public anxiety, for the day literally and truly never dawned upon the
City of Washington, and well deserves its historical name, the
“Dawnless Day.” At six o’clock, the hour of daybreak, such an
impenetrable pall of clouds overhung the city that there came no
signs of day. The gathering crowds could plainly hear the plaintive
cries and lamentations put up in the negro quarters of the city. Not
until nearly nine o’clock did the light cease to “shine in darkness”
and the darkness begin to comprehend it.
But although it was a cheerless gray day, even at high noon, its
heaviness set no weight upon the spirits of the jubilant tens of
thousands which completely filled the city and its public parks, and
ran over into camps and hastily improvised shelters outside the city
limits.
Not until the day previous had the President announced the names
of those selected for his Cabinet. The South and Far West were fairly
beside themselves with joy, for there had been from their standpoint
ugly rumors abroad for several days. It had even been hinted that
Bryan had surrendered to the “money-changers,” and that the
selection of his constitutional advisers would prove him recreant to
the glorious cause of popular government, and that the Reign of the
Common People would remain but a dream of the “struggling
masses.”
But these apprehensions were short lived. The young President
stood firm and fast on the platform of the parties which had raised
him to his proud eminence. And what better proof of his thorough
belief in himself and in his mission could he have given than the
following:
Secretary of State—William M. Stewart, of Nevada.
Secretary of Treasury—Richard P. Bland, of Missouri.
Secretary of War—John P. Altgeld, of Illinois.
Attorney General—Roger Q. Mills, of Texas.
Postmaster General—Henry George, of New York.
Secretary Navy—John Gary Evans, of South Carolina.
Secretary Interior—William A. Peffer, of Kansas.
Secretary Agriculture—Lafe Pence, of Colorado.
The first thing that flashed across the minds of many upon
glancing over this list of names was the omission therefrom of
Tillman’s. What did it mean? Could the young President have
quarreled with his best friend, his most powerful coadjutor? But the
wiser ones only shook their heads and made answer that it was
Tillman’s hand that filled the blank for Secretary of the Navy, left
there by the new ruler after the people’s own heart. Evans was but a
creation of this great Commoner of the South, an image graven with
his hands.
The inaugural address was not a disappointment to those who had
come to hear it. It was like the man who delivered it—bold,
outspoken, unmistakable in its terms, promising much, impatient of
precedent, reckless of result; a double confirmation that this was to
be the Reign of the Common People, that much should be unmade
and much made over, and no matter how the rich man might cry out
in anger or amazement, the nation must march on to the fulfillment
of a higher and nobler mission than the impoverishment and
degradation of the millions for the enrichment and elevation of the
few.
Scarcely had the young President—his large eyes filled with a
strange light, and his smooth, hairless visage radiant as a cloudless
sky, his wife’s arm twined around his, and their hands linked in those
of their children—passed within the lofty portal of the White House,
than he threw himself into a chair, and seizing a sheet of official
paper penned the following order, and directed its immediate
promulgation:
It was two o’clock in the afternoon when news of this now world-
famous Executive Order was flashed into the great banking centres of
the country. Its effect in Wall street beggars description. On the floor
of the Stock Exchange men yelled and shrieked like painted savages,
and, in their mad struggles, tore and trampled each other. Many
dropped in fainting fits, or fell exhausted from their wild and
senseless efforts to say what none would listen to. Ashen pallor crept
over the faces of some, while the blood threatened to burst the
swollen arteries that spread in purple network over the brows of
others. When silence came at last, it was a silence broken by sobs and
groans. Some wept, while others stood dumb-stricken as if it was all
a bad dream, and they were awaiting the return of their poor
distraught senses to set them right again. Ambulances were hastily
summoned and fainting and exhausted forms were borne through
hushed and whispering masses wedged into Wall street, to be
whirled away uptown to their residences, there to come into full
possession of their senses only to cry out in their anguish that ruin,
black ruin, stared them in the face if this news from Washington
should prove true.
CHAPTER V.
ebookgate.com