Digital Envoy
Encyclopedia
Digital Envoy, Inc., part of Dominion Enterprises
, a media and information services company, is the parent company of Digital Element
and Digital Resolve.
or IP location technology). In 2005, Digital Envoy created two business units: Digital Element
and Digital Resolve. In 2007, Landmark Communications
, Inc. purchased Digital Envoy. The company became part of Dominion Enterprises in 2009.
Dominion Enterprises
Dominion Enterprises is a Norfolk, Virginia-based media and information services company for the automotive and commercial vehicle, real estate, apartment rental, and employment industries...
, a media and information services company, is the parent company of Digital Element
Digital Element
Digital Element is a U.S.-based corporation that first coined the phrase "IP Intelligence", a technology that maps the Internet using non-invasive methods and indexes by Internet Protocol addresses...
and Digital Resolve.
Company & History
Founded in 1999 by Rob Friedman, Sanjay Parekh and Dennis Maicon, Digital Envoy patented and introduced geotargeting technology (also recognized as geolocationGeolocation
Geolocation is the identification of the real-world geographic location of an object, such as a radar, mobile phone or an Internet-connected computer terminal...
or IP location technology). In 2005, Digital Envoy created two business units: Digital Element
Digital Element
Digital Element is a U.S.-based corporation that first coined the phrase "IP Intelligence", a technology that maps the Internet using non-invasive methods and indexes by Internet Protocol addresses...
and Digital Resolve. In 2007, Landmark Communications
Landmark Communications
Landmark Media Enterprises LLC is a privately held media company headquartered in Norfolk, Virginia specializing in cable television, broadcast television, print publishing, and internet publishing...
, Inc. purchased Digital Envoy. The company became part of Dominion Enterprises in 2009.
See Also
- GeolocationGeolocationGeolocation is the identification of the real-world geographic location of an object, such as a radar, mobile phone or an Internet-connected computer terminal...
- Geolocation softwareGeolocation softwareIn computing, geolocation software is used to deduce the geolocation of another party. For example, on the Internet, one geolocation approach is to identify the subject party's IP address, then determine what country , organization, or user the IP address has been assigned to, and finally,...
- Geomarketing
- Geotargeting
- Internet ProtocolInternet ProtocolThe Internet Protocol is the principal communications protocol used for relaying datagrams across an internetwork using the Internet Protocol Suite...
- IP AddressIP addressAn Internet Protocol address is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing...
- Website localizationWebsite localizationWebsite localization is the process of adapting an existing website to local language and culture in the target market.Two factors are involved—programming expertise and linguistic/cultural knowledge....
- Web analyticsWeb analyticsWeb analytics is the measurement, collection, analysis and reporting of internet data for purposes of understanding and optimizing web usage....
- Identity TheftIdentity theftIdentity theft is a form of stealing another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name...
- Internet FraudInternet fraudInternet fraud refers to the use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme....
- Two-factor authenticationTwo-factor authenticationTwo-factor authentication is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi-factor authentication, which is a defense in depth approach to security...
- Man-in-the-middle attackMan-in-the-middle attackIn cryptography, the man-in-the-middle attack , bucket-brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other...
- Online bankingOnline bankingOnline banking allows customers to conduct financial transactions on a secure website operated by their retail or virtual bank, credit union or building society.-Features:...