Browse Definitions:
Definition

domain tasting

Domain tasting is the practice of purchasing numerous available domain name s and then exploiting a five-day grace period to determine which names would be profitable to own. The usual intent is to resell domain names likely to command high prices, although there are a number of ways that domain tasters (sometimes called "domainers") make money from the practice.

As of March 2008, the cost to register a domain name is less than $10. Moreover, the registrant has five days, the add grace period (AGP), during which any money paid is refundable. Even a minimal transaction cost is waived. The AGP was originally intended to allow legitimate purchasers to return names registered in error (with a typo, for example) at a time when the cost per domain was considerably higher.

Domain tasters make money from the practice in a number of ways besides selling profitable domain names. In some cases, they repeatedly register and unregister domain names, in effect obtaining the use of the name for free. A domainer may also register a large number of domains and then set up Web sites containing nothing but advertising links. The domain taster monitors the activity on each site and keeps the domain names that generate the most clickthrough revenue or produce the highest clickthrough rate s.

In volume, even pages that are only registered for the add grace period can make a great deal of money. According to Jay Westerdal, the CEO of Name Intelligence, Inc., a Google AdSense partner was making $3 million per month from the practice -- after Google's cut.

Domain tasting can be a problem for individuals and businesses interested in setting up new Web site s. The domain name they want to purchase may be unavailable even though no one is using it for legitimate business. Domain tasting also clutters the Internet with essentially useless Web pages, consuming server resources and generating superfluous Internet traffic.

There are a number of approaches being considered to make domain tasting unprofitable and so end the practice. For example, Google may disqualify sites less than five days old for their AdSense program. However, there are similar programs available for domainers to exploit. ICANN , the organization that regulates the domain name system, announced a proposal to do away with the grace period for registration. The cost per name is not significant for a legitimate registrant, who is unlikely to want to register a great number of names. However, it would be prohibitive for the domain taster, who -- like the spammer -- relies upon volume to make a profit.

According ICANN, in January 2007, the top ten domain tasters were responsible for 95% of all deleted .com and .net domain names: 45,450,897 of the total 47,824,131 deleted names.

See also domain kiting , cybersquatting

This was last updated in March 2008

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close