Digital Envoy
Encyclopedia
Digital Envoy, Inc., part of Dominion Enterprises
Dominion Enterprises
Dominion Enterprises is a Norfolk, Virginia-based media and information services company for the automotive and commercial vehicle, real estate, apartment rental, and employment industries...

, a media and information services company, is the parent company of Digital Element
Digital Element
Digital Element is a U.S.-based corporation that first coined the phrase "IP Intelligence", a technology that maps the Internet using non-invasive methods and indexes by Internet Protocol addresses...

 and Digital Resolve.

Company & History

Founded in 1999 by Rob Friedman, Sanjay Parekh and Dennis Maicon, Digital Envoy patented and introduced geotargeting technology (also recognized as geolocation
Geolocation
Geolocation is the identification of the real-world geographic location of an object, such as a radar, mobile phone or an Internet-connected computer terminal...

 or IP location technology). In 2005, Digital Envoy created two business units: Digital Element
Digital Element
Digital Element is a U.S.-based corporation that first coined the phrase "IP Intelligence", a technology that maps the Internet using non-invasive methods and indexes by Internet Protocol addresses...

 and Digital Resolve. In 2007, Landmark Communications
Landmark Communications
Landmark Media Enterprises LLC is a privately held media company headquartered in Norfolk, Virginia specializing in cable television, broadcast television, print publishing, and internet publishing...

, Inc. purchased Digital Envoy. The company became part of Dominion Enterprises in 2009.

See Also

  • Geolocation
    Geolocation
    Geolocation is the identification of the real-world geographic location of an object, such as a radar, mobile phone or an Internet-connected computer terminal...

  • Geolocation software
    Geolocation software
    In computing, geolocation software is used to deduce the geolocation of another party. For example, on the Internet, one geolocation approach is to identify the subject party's IP address, then determine what country , organization, or user the IP address has been assigned to, and finally,...

  • Geomarketing
  • Geotargeting
  • Internet Protocol
    Internet Protocol
    The Internet Protocol is the principal communications protocol used for relaying datagrams across an internetwork using the Internet Protocol Suite...

  • IP Address
    IP address
    An Internet Protocol address is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing...

  • Website localization
    Website localization
    Website localization is the process of adapting an existing website to local language and culture in the target market.Two factors are involved—programming expertise and linguistic/cultural knowledge....

  • Web analytics
    Web analytics
    Web analytics is the measurement, collection, analysis and reporting of internet data for purposes of understanding and optimizing web usage....

  • Identity Theft
    Identity theft
    Identity theft is a form of stealing another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name...

  • Internet Fraud
    Internet fraud
    Internet fraud refers to the use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme....

  • Two-factor authentication
    Two-factor authentication
    Two-factor authentication is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi-factor authentication, which is a defense in depth approach to security...

  • Man-in-the-middle attack
    Man-in-the-middle attack
    In cryptography, the man-in-the-middle attack , bucket-brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other...

  • Online banking
    Online banking
    Online banking allows customers to conduct financial transactions on a secure website operated by their retail or virtual bank, credit union or building society.-Features:...

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK