Smart Libraries Newsletter American Library Association NON PROFIT 50 East Huron Street US POSTAGE Chicago, IL 60611-2795 USA PAID PERMIT 3020 ALA­ TechSource BIRMINGHAM, AL www.techsource.ala.org

March 2008 OCLC Acquires EZproxy

Smart Libraries Newsletter

Smart Libraries Newsletter delivers hard data and innovative insights about the world of library technology, every month.

Contributing Editor Marshall Breeding To subscribe 615-343-6094 [email protected] To reserve your subscription, contact the Customer Service Center at 800-545-2433, press 5 for assistance, or visit www.techsource.ala.org. Interim Editor Tom Peters The 2008 subscription price is just $85 US. 816-228-6406 [email protected]

Production and design by Kimberly Saar Richardson, Administrative Assistant American Library Association Production Services. Judy Foley Smart Libraries Newsletter is published monthly by ALA TechSource, 800-545-2433, ext. 4272 a unit of the publishing division of the American Library Association. 312-280-4272 [email protected] Copyright American Library Association 2008. All rights reserved. Newsletter

TM

ALA­ TechSource www.techsource.ala.org Formerly Library Systems Newsletter™

50 East Huron Street, Chicago, Illinois 60611-2795, USA

OCLC Acquires EZproxy

In a move that continues its ongoing drive to accumulate a broad set of library IN THIS ISSUE automation components, OCLC has acquired EZproxy from Useful Utilities, a one-person company based in Peoria, Arizona, a suburb of Phoenix. The acquisi- tion of this product gives OCLC control of an important piece of the infrastruc- OCLC Acquires EZproxy ture that connects individual libraries to the content and services on the Web. PAGE 1 This issue of Smart Libraries Newsletter describes what the EZproxy software NewGenLib: An Open Source ILS for Libraries does and why it is important, provides some information on the business acquisi- in the Developing World tion, and offers some background and perspective. PAGE 3 So, You Want to Use RFID in Your Library PAGE 4

March 2008 XXVIII Volume Number 3 An Essential Tool to Access Electronic Content Proxy servers like EZproxy facilitate access to Web-based information. A typical Innovative SUSHI a la ARL PAGE 5 academic library spends a significant portion of its collections budget on subscrip- tions to electronic content with the intent to provide access to that content to its Live Online Homework Help from Tutorvista.com users. Libraries generally need to enable access to their patrons not only when in PAGE 6 the library but also from off-site locations. EZproxy was developed specifically to Something Wikia This Way Comes help libraries deliver access to subscribed electronic content to off-site patrons. PAGE 7

EZproxy was developed specifically to help libraries deliver access to subscribed electronic content to off-site patrons.

When a publisher licenses its content to a library, it needs some mechanism ISSN 1541-8820 to ensure that only the users of its subscribers gain access to the product and not the general public. Most publishers rely on IP address to regulate access, requiring that a library provide a list of the IP address ranges used within the organization it serves. This provides a convenient mechanism for on-campus or in-library access, but fails to accommodate off-site users. In order to serve off-site users, various types of proxy servers can function as an intermediary between a user and a remote service, effectively delivering to them a library IP address so that they can use these restricted resources. The key challenge lies in implementing a secure authentication system that ensures that access continues to be restricted to individuals associated with Receive Smart Libraries via e-mail the organization with the minimum of inconvenience for library users. Subscribers that would like an e-mailed ver- sion of the newsletter each month should for- Authentication ward one e-mail address and all of the mailing label information printed on page 8 of the A crucial component of EZproxy involves authentication—the ability to deter- newsletter to [email protected]. Type “e-mail my mine whether an individual is associated with the institution and has the right Smart Libraries” into the subject line. In addi- to access a given resource. Providing access to on-site users can easily be accom- tion to your monthly printed newsletter, you plished by virtue of their IP address of their computer. The library must use some will receive an electronic copy via e-mail (to one address per paid subscription) at no extra1 Continued on next page charge each month. A­LA TechSource www.techsource.ala.org

alternate authentication mechanism to Integrating EZproxy into Integration with eLearning allow access to off-site patrons. Most academic institutions maintain Library Content Delivery Environments some type of authentication service for In order to make access seamless to its True to the academic library orienta- its user community. Practically all col- users, the library can implement a few tion of EZproxy, work has been done to leges and universities offer an authen- simple changes to integrate EZproxy into use the utility to help integrate library tication service as part of the campus the various systems it uses to point its resources into the Blackboard course network to support access to course- users to its electronic resources. To invoke management system. A Blackboard ware or virtual learning environments, EZproxy, the library will reformulate the building block integrates authentication e-mail systems, and the like. Such an URL for each of its resources to one that mechanisms providing access to library authentication service might be imple- routes access through the proxy server. resources listed in a course without the mented using protocols such as LDAP The links provided through the library’s need for the dual logins that would oth- (Lightweight Directory Access Protocol), online catalog through the 856 field in erwise be needed. CAS (Central Authentication Service), the MARC record as well as any menus, RADIUS (Remote Authentication Dial- link resolvers, finding aids, or other Web EZproxy Background in User Service), Kerberos, or Athens. pages used to provide access to restricted Many campuses are working toward sin- content will prepend the EZproxy URL to EZproxy was created by Chris Zagar, gle sign-on environments where all the the resource’s native location. For exam- a librarian employed by the Maricopa network services available to the com- ple to access the resource located at http:// Community College system in Arizona. munity work through a single centralized tvnews.vanderbilt.edu, all access points The software was initially released in authentication service. Academic libraries would be adjusted to use http://proxy. 1999 and by the time that it was acquired increasingly rely on campus-wide authen- library.vanderbilt.edu/login?url=http:// by OCLC had been purchased by over tication services rather than maintaining tvnews.vanderbilt.edu. With this version 2,400 libraries spanning sixty countries. their own independent service. of the URLs in place, as long as users go While academic libraries comprise the Public libraries, however, usually through the library’s Web site, they will majority of its users, it has also been don’t have the luxury of authentica- be able to access its resources from any sold to many public and special librar- tion services provided by their higher- location. EZproxy will detect whether ies. Zagar maintained a tight focus on the level organization and tend to rely on they are off site and perform authentica- company, developing and supporting a their integrated library system’s patron tion as needed. In most cases prepending single product. This focus has resulted in database as the authority for identifying the EZproxy component of the URL can be a reputation for highly reliable software valid remote users. A key component of accomplished programmatically without with stellar support. The product has the ILS involves a database of registered the need to change each one individually. become the de facto proxy server used in library patrons, which is used for in-per- academic libraries. son circulation transactions as well as Useful Use Statistics The cost of EZproxy has held steady Web-based self-service features. Many of at $495 since its initial release. At this the ILS products provide an API (appli- Given the large financial investments that price, EZproxy ranks as an extremely cation programming interface) to allow libraries make in their collections of sub- inexpensive, but essential, infrastructure it to function as an authentication service scribed content, it is essential to measure component for libraries. Unlike most for other applications. the level of use each product receives. other software products, Useful Utilities EZproxy was specifically designed Content publishers routinely provide offers perpetual free maintenance once for libraries and can take advantage of libraries with usage statistics. EZproxy an institution purchases the product, the authentication services available to also gives the library an additional means which includes the access to new releases both academic and public libraries. In to monitor use counts through its logs. of the software and technical support. addition to the major protocols used Libraries can use standard Web server Sales of EZproxy have generated reve- on campus networks, it can authenti- log analysis tools to create reports that nue of just over $1 million since its ini- cate against library automation systems show the use of each product as mediated tial release. including Millennium from Innovative by the proxy server. These reports can EZproxy is not open source software. Interfaces, Web2 and HIP from Sirsi- be especially helpful in helping libraries Useful Utilities developed EZproxy using Dynix, as well as the SIP protocol (Ses- measure the levels of use by patrons from the traditional closed source licensing sion Initiation Protocol) supported by all off-campus locations versus those in the model, but with extremely liberal terms the major ILS products. library or on campus. and at a very low price. 2 Smart Libraries

In 2006, LITA, the Library & Infor- further develop authentication services. far below OCLC’s other recent acquisi- mation Technology Association, a divi- The acquisition of EZproxy by OCLC tions such as that of Sisis Informations- sion of the American Library Association, has sparked a few blog entries express- systeme ($4.5 million), Fretwell Downing awarded Zagar the Brett Butler Entrepre- ing concern about OCLC’s new own- Informatics ($8.9 million), and Openly neurship Award in recognition of his ership of this ubiquitous software and Informatics ($1.95 million). As OCLC work in creating EZproxy. suggesting the development of an open aims to develop new services through source alternative. (e.g., http://synthetic WorldCat, by acquiring EZproxy it gains Transition Details librarian.com/2008/01/12/ezproxy ownership of a critical piece of infrastruc- -to-be-acquired-by-oclc-time-for-an-open ture already positioned deeply within The purchase of EZproxy transfers to -source-alternative) the networks of over 2,400 institutions. OCLC the ownership of the software and OCLC’s supporters will interpret this —Marshall Breeding responsibility for support to its existing move as a savvy strategy to strengthen customers. OCLC indicates that it will [Note: EZproxy, developed by Useful the organization’s ability to expand ser- honor the commitment made by Use- Utilities, should not be confused with vices related toWorldCat.org into librar- ful Utilities for ongoing technical sup- ezProxy offered by LavaSoftware, a util- port and software updates to libraries ies. Those skeptical of OCLC, including ity that allows multiple computers on a that have previously purchased EZproxy. its commercial competitors, might view small business or home network to share The software continues to be available at this acquisition with more concern. In a single connection to the Internet.] the same price from OCLC as it was from either case, the acquisition of EZproxy Useful Utilities prior to its acquisition. may rank as a small financial maneuver More Info. @: Zagar will join OCLC as a full-time for an organization with $235 million Press Release: consultant for at least the next year, tak- in annual revenue, but one that gives to http://www.oclc.org/news/ ing a leave of absence from his position OCLC a strategic technological advan- releases/200690.htm in the Maricopa Community College tage. Although the terms of the purchase Useful Utilities Website: Libraries. In this role, he will help OCLC have not yet been released, from a finan- http://www.usefulutilities.com integrate EZproxy into WorldCat.org and cial perspective, this transaction ranks

NewGenLib: An Open Source ILS for Libraries in the Developing World

NewGenLib, a library automation system Lib, the development of a textbook on A new company was formed, Versus developed in India, has recently joined library automation, and on the creation IT Services Pvt. Ltd., to provide service the open source community. This prod- of e-learning modules on library auto- and support for the product as it moves uct was introduced in 2003, primarily mation. Versus Solutions, a small soft- into the open source realm. The relation- intended for libraries in the developing ware development company, performs ship of this new company to NewGenLib world. It has been adopted by about 122 the technical development of the soft- closely resembles that of Liblime to Koha libraries, primarily in India, but with some ware. Both organizations are located in and Equinox Software to Evergreen. sites in Syria, Sudan, and Cambodia. Hyderabad, India. NewGenLib, as an ILS tailored Two groups collaborate in the devel- The software has been distributed for libraries in developing countries, opment and support of NewGenLib. under the traditional commercial license may not necessarily be of direct inter- Kesavan Institute of Information and model since 2003. In January 2008, the est to libraries in our region. It does, Knowledge Management (KIIKM) is a decision was made to offer the system however, show that the open source non-profit professional trust that spear- as open source software under the GNU approach for library automation sys- heads the project. This organization GPL (General Public License). According tem has also made some advances describes its primary goal as “acting as to L.J. Haravu, one of the three principals internationally. – Marshall Breeding an independent, non-governmental cen- of KIIKM, the move to an open source tre for the study, training and advocacy model would result in wider adoption of More Info. @: in information and knowledge manage- the software. The organizations involved NewGenLib Website: ment.” The key activities and funding would move from a license-based busi- http://www.newgenlib.com for the trust relate primarily to NewGen- ness model to one based on service. 3 A­LA TechSource www.techsource.ala.org

So, You Want to Use RFID in Your Library

If your library is considering implement- Interoperability, the wrecking ball Technology and Privacy Principles. ing an RFID (Radio Frequency Identifi- for silos, is one of the key components to The potential for vandalism of RFID cation) system, you may want to read a the growth and diffusion of RFID systems devices and systems is so multifaceted and report released a few months ago by NISO in libraries. Interoperability in the con- pernicious that it warrants its own section (National Information Standards Orga- text of RFID systems has various facets. in the report. Vandalism management is nization) called “RFID in U.S. Libraries.” Interoperability between RFID systems a form of risk management, involving its The report is the result of the work of available from different vendors would own set of values, policies, practices, costs, the NISO RFID Working Group, which help libraries avoid falling into an RFID and tradeoffs. The report notes that cur- included representatives from libraries, silo from which they cannot extricate rently most anti-vandalism strategies “… library vendors, publishers, RFID com- themselves. Supply chain interoperability create difficulties in implementation and panies, and others. throughout the lifecycle of books would hinder interoperability, and place the Vinod Chachra from VTLS chaired enable publishers, book jobbers, book library only a few steps ahead of increas- the working group and presented an stores, libraries, and various resale mar- ingly sophisticated vandals.” Modes of overview of the report during the meet- kets to use interoperable RFID systems. vandalism of RFID systems range from ing of the LITA RFID Interest Group at ALA For example, RFID systems through- the physical and obvious—damaging or Midwinter in Philadelphia in January. He out all industries now run at low, high, removing the tag from the item—to the emphasized that the report is a set of recom- ultra high, and microwave frequencies. digitally nefarious, such as modifying mendations, not a set of standards. Most RFID systems in libraries run in the the data on tags or introducing an RFID In terms of the ideal outcome of this high frequency range, with read ranges virus into the system. effort, the forward to the report notes, between eight and twenty inches. This report and other recent pub- “Ideally, the best outcome would be one Worldwide interoperability is lications about RFID technologies do that achieves true interoperability, per- another facet. Chachra noted that the a good job of articulating the facets, haps even at the international level, while Danes are using a fixed encoding model risks, and opportunities of RFID sys- protecting personal privacy, supporting on their RFID tags, while the UK, Aus- tems. If your library is contemplating advanced functionality, facilitating secu- tralia, and the US want a flexible encod- implementing an RFID system, you may rity, protecting against vandalism, and ing model. Of course, interoperability is do well to articulate early and reiterate allowing the RFID tag to be used in the a double-edged sword. The “application often why you want or need an RFID entire lifecycle of the book and other family identifier” (AFI) recommenda- system. As this report notes, in general library materials.” tions in the report would help avoid situ- the benefits of RFID systems include: There seems to be some aspect of ations where a person carrying an RFID reducing staff time spent in repeti- human nature (the will to control or tagged library book would have that item tive, manual processes such as check- hoard, or perhaps simply greed) that erroneously read by RFID systems in book- ing materials out and in; improving the often results in the creation of technol- stores, grocery stores, and discount retailers. customer experience via fast and pri- ogy silos. As a new technology devel- Privacy and security also are key vate self check-outs; improving the effi- ops, proprietary silos crop up faster than components to the broad acceptance and ciency and accuracy of shelf-inventory crabgrass in the spring. The report notes, use of RFID systems. The report contains projects; reducing the risk of repetitive “Most RFID systems available are propri- separate sections on each of these top- motion injuries in staff; improving the etary in some manner. Customers cur- ics. The report emphasizes that data about movement of books throughout the sup- rently often purchase tags, readers, self individuals never should be included in ply and usage chain, etc. —Tom Peters check-out stations, and any other com- RFID tags attached to individual library ponents from the same vendor. The pro- items. The main recommendation about More Info. @: prietary nature of these systems increases security is that the security method imple- NISO Report, “RFID in U.S. Libraries”: costs, makes changing vendors expensive, mented should serve as a point of differen- http://www.niso.org/standards/ results in hesitancy to purchase RFID tiation between the various RFID vendors. resources/RP-6-2008.pdf technologies, and limits the real poten- The report recommends that RFID tag ALA/BISG Resolution: tial of RFID as a cross-institution plat- systems comply with the 2005 ALA/BISG http://www.ala.org/ala/oif/ form for identification.” In short, they (Book Industry Study Group) Resolution statementspols/ifresolutions/ become silos. on Radio Frequency Identification (RFID) 4 rfidresolution.htm Smart Libraries

Innovative SUSHI a la ARL

First there was a need. Back in the day for online books and e-reference works What this means is that these librar- (okay, it was the Nineties), when end-user- was released in 2006. ies now have immediate access with min- direct electronic resources subscribed to The standards begat metrics and col- imal work to aggregated usage statistics by libraries and library consortia were laboration. Once the standards and codes for their electronic resources that are reli- being rolled out at a frantic pace, quickly of practice for e-resource usage statistics able, standardized, and useful. replacing librarian-mediated database were in place, organizations and research- May SUSHI beget satisfaction, better search services, it was difficult to discern ers began to collaboratively explore how use of limited financial resources, and a the amount of usage each e-resource was to gain value from them. Reliable cost- better mix of e-resources for users. receiving by the patrons of each subscrib- per-use metrics, for example, began to —Tom Peters ing library. Such usage statistics could crop up. COUNTER worked with JISC More Info. @: be understood as a form of return-on- (Joint Information Systems Committee) COUNTER Web site: investment for the subscribing libraries, in the UK and the UK Serials Group on http://www.projectcounter.org/ and could help libraries make informed studies and new metrics. NISO SUSHI Web site: decisions during subscription renewal Collaboration begat SUSHI. COUN- http://www.niso.org/committees/ time and promotional campaigns. Back TER also worked with NISO (National SUSHI/SUSHI_comm.html then, each e-resource subscription was Information Standards Organization) Innovative Press Release of basically a pig in a poke, with only anec- on the SUSHI Project (Standardized Dec. 11, 2007: dotal feedback as a way to gauge usage Usage Statistics Harvesting Initiative). http://www.iii.com/news/pr.php and impact. The NISO SUSHI problem statement The need begat stats. Vendors and notes, “Participants from libraries, ILS aggregators of electronic resources quickly vendors and online content providers responded with a bewildering array of have collaborated on developing a model usage reports and report generators, often that includes an automated request and in a variety of interfaces, access methods, response for usage statistics. The request and file formats. As a result, intrepid local and response mechanisms have been librarians had to spend many hours try- designed within a web services model.” ing to interpret and aggregate the usage Via SUSHI, the collection, aggregation, reports available from all the vendors of and presentation of e-resource usage sta- e-resources they were using. The usage tistics from a variety of vendors can statistics were there to be gleaned and be automated, thus potentially soothing interpreted, but often the local cost in the addled pates of e-resource librarians terms of ongoing staff time to do this everywhere. proved to be unworkable. ARL and Innovative Interfaces The stats begat standards. Six put SUSHI to work. Late in 2007 they years ago the COUNTER (Counting announced that SUSHI had been inte- Online Usage of Networked Electronic grated into the Innovative Electronic Resources) project launched, with a goal Resource Management (ERM) product. of serving the international community ERM can be fully integrated with Inno- of librarians, publishers, and intermedi- vative’s Millennium system, or it can aries involved in e-resources by “…set- function as a standalone product. The ting standards that facilitate the recording initial ARL research libraries to partake and reporting of online usage statistics of SUSHI with ERM include Cornell, in a consistent, credible and compati- Dartmouth, the University of Arizona, ble way.” COUNTER began by issuing a Washington State University, Wayne Code of Practice for the generation and State University, and the University of provision of usage statistics related to Washington. All told, approximately one- online journals and databases. Another fourth of the ARL libraries use the Inno- Code of Practice covering usage statistics vative ERM. 5 ALA TechSource www.techsource.ala.org

Live Online Homework Help from TutorVista.com

How and to what extent libraries should The service offers on-demand home- active whiteboard, voice-over-IP and support students working on their home- work help seven days a week from 3 to other components. work is an enduring service challenge 11 p.m. local time. Students may access Detailed monthly reports help sub- fraught with policy issues and pedagogi- the service from within the library or at scribing libraries better understand the cal concerns. Sometimes the line between home. According to TutorVista.com’s lit- usage and impact of this service on the having a librarian help a student pursue his erature, this service is “…offered to stu- students in the library’s service popula- or her homework assignments and actually dents across grades 2 through 12, college tion. The reports include information doing some of the work is blurry. students, and adults in school studying about the ages of the users of the service, Some libraries have decided to out- for courses, diplomas, or degrees.” the subject areas where homework help source all or part of this homework help The TutorVista.com interface enables is sought, the total number of library service to third parties, such as Tutor.com. the tutor, often an educator based in patrons who used the service, the average For example, some libraries may have India, and the student to interact one- time for the sessions, and some indica- online reference service questions roll on-one in real time using voice-over- tors of customer satisfaction. over to Tutor.com when the local library’s IP, text chatting, a shared whiteboard, Outsourcing homework help to a reference desk is closed. Many of these and other interactive tools. Bundled with company such as Tutor.com or Tutor- late night and early morning reference the service is a collection of instruc- Vista.com may raise some ethical con- questions are related to some homework tional content that includes simulations, cerns, turf issues (e.g., Why don’t school project being completed by individual demonstrations, animations, videos, and systems offer these types of services?), students and groups. worksheets. Students affiliated with sub- and quality assurance issues for librar- In January TutorVista.com entered scribing libraries can access this supple- ians and parents, but the need for insti- the library homework help market when mental content 24/7. tutionalized, online homework assistance it launched its Library Advantage Pro- The interface that makes a remote seems to be strong and growing. gram. Founded in 2005, TutorVista. TutorVista homework help session pos- —Tom Peters com began by focusing on the direct-to- sible is in a state of transition. Tutor- More Info. @: parents market. For about $100 per month, Vista had been using WebX, but has TutorVista.com’s Library Advantage the students in a subscribing family could begun developing their own interface, Program: have unlimited 24/7 online tutoring in all TutorVistaNow, that will provide greater http://www.tutorvista.com/libraries available subjects, which include Math, control over and integration of the inter- English, Chemistry, Biology, Physics, His- tory, Writing, Calculus, Statistics, and many more. The Library Advantage Program takes this to the institutional level. Pric- ing for the service depends on the results of several formulae, based on the student population served or the entire popula- tion served by the library. When I met with John Stuppy, President of Tutor- Vista.com, at ALA Midwinter, he said that the lowest price that emerges from the various formulae often will be the one offered to the library. Discounts for fund- ing-strapped libraries are available, too. TutorVista seems very interested in gaining libraries and other institutional customers.

6 Smart Libraries

Something Wikia This Way Comes

First, the Wikipedia challenged the ket shares currently held by and ments as their primary source of revenue notion of how to construct and deliver Yahoo. If the folks behind Wikia Search —not very innovative compared to what an encyclopedia. Now comes Wikia could capture five percent of all Web the major search engines already do. Search, which seeks to redefine how searches, they would be happy. Google The rough and tumble days when search engines operate. The core issue, currently holds a market share some- the top changed every few it seems, is whether the future of search where in the neighborhood of 50 and 75 months or weeks seem to be behind us engine development should be hitched percent, depending on who’s doing the now. Any new search engine needs to to existing, secretive, proprietary, auto- counting and how. work hard to achieve viability and a sin- mated search algorithms, or hitched to Whereas Google, Yahoo, Ask, and gle-digit market share. Wales is betting something else, such as a collaborative, other search engines guard their search the farm (or the farm of some venture human-based system that seeks to capi- algorithms as trade secrets and one of the capitalist) that if enough people volun- talize on the wisdom of crowds and the key assets of these search engine compa- teer to participate in and contribute to aggregated experiences of users of search nies, Wales argues that searching the Web Wikia Search, over time humans can do a engines. The search engine market is very should be “open, transparent, participa- better job of determining the relevance of tough and competitive. Virtue may get a tory, and democratic.” Search algorithms a website than even the most high-pow- bloodied nose. are like upstream editors that ultimately ered, proto-intelligent search algorithm. The public alpha version of Wikia determine what you will see and the order —Tom Peters Search, a free and open source Web in which you will see it. The Wikia Search More Info. @: search engine, was released in January algorithm, which will do the heavy lifting 2008. Wikia Search is from Wikia, Inc., of crawling and indexing the web before Wikia Search: a for-profit company founded by Jimmy human users perform the nuanced fine- http://www.wikia.com/wiki/Wikia Wales and Angela Beesley. Wales was one tuning, will be open source software. January 7 NY Times Article: of the co-founders of Wikipedia, but Wikia, Inc. is a for-profit company. http://www.nytimes.com/2008/ Wikia, Inc. has no official relationship Apparently they plan to use advertise- 01/07/technology/07wiki.html with , the not-for-profit organization that now runs Wikipedia. The initial public alpha version was almost universally panned. While many people may like the philosophy behind Wikia Search, ultimately the success of a search engine rides on the search results produced. In a quote in an article that appeared in the January 7 New York Times, Wales admitted that Wikia Search is not yet ready to be a Google-killer. But he hopes that Wikia Search, like the tor- toise racing the hare, will win out in the long run. Wales predicts that Wikia Search could at least put a small dent in the Web search mar-

7