Search Tools

January 1997


Search Tools

Automated probes find data lost in cyberspace.

Although an exact count is impossible, experts estimate that there are at least several hundred million Web pages out in cyberspace-and thousands more being created every month. This abundance of information is useless unless Net surfers can find what they need quickly and easily. Fortunately, several search technologies are available for locating a lot of information in a small amount of time.

One of the best-known technologies in this young market is the search engine, which is an automated program designed to explore and catalog Web sites based on simple queries. Users can access search engines on the Net via Web browsers and, once there, type in words or phrases on specified topics. Software "spiders" then crawl through the Web and use algorithm-based search logic to retrieve requested data within a couple of seconds.

Some engines do exhaustive searches of thousands of Web sites while others only go to sites that have the most hypertext links pointing to them. Data content also can vary. Several search engines provide full text from every relevant Web page while others supply summaries, site titles or URLs (Universal Resource Locators, which serve as Web addresses). Most engines take simple English database queries, but a few require users to employ the cryptic Boolean logic language to express search conditions.

Several search engines, such as Excite and InfoSeek, employ a type of artificial intelligence known as fuzzy logic to find Web pages related to keywords even if those exact words are not located on the pages. Since search-engine services are so diverse, the best advice is to sample as many as possible to find the most suitable one. Most are subsidized by advertising so the services are usually free for the surfing, providing users can avoid the increasing number of busy signals caused by Net congestion.

A more expensive but thorough alternative is to use commercial software packages that run Web searches simultaneously on several engines. The idea behind multiple searches is to pick up sites from one database that another may have left behind. WebSeeker from the Forefront Group, for instance, compiles results from 20 search-engine databases, eliminates duplicate listings and indexes the results. Similar programs include Blue Squirrel's Squrl, Iconovex's EchoSearch and Quarterdeck's WebCompass. The software runs between $100 and $400, depending on the level of sophistication.

Another type of search tool is the Net directory, which is essentially an electronic Yellow Pages of Web sites. Directories such as Yahoo categorize Web sites based on descriptions submitted by organizations when the sites are registered. Like search engines, services at the various Net directories vary widely. Some simply list URLs under categories and subcategories while others also include some text in their listings. A few even rank sites according to reports on the number of hits they receive. And one, the Four11 Directory (, lists nothing but Internet e-mail addresses.

Search technology is being employed by those building internal enterprise networks known as intranets. Agencies with bulging Web sites, such as NASA, are using database search software to help surfers find information quickly by typing in keywords. Commercial utility packages from companies such as Architext Software, Fulcrum and Verity can be loaded on Web servers to make intranet explorations as swift as those on the Web. Once text and images are obtained, they can be stored in electronic filing systems, such as Excalibur's EFS Webfile, for easy access.

Alta Vista
Digital Equipment Corp.'s Alta Vista search engine features a database of more than 30 million Web pages.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.