Author Archives: krcmic.com

DMARC, short for Domain-based Message Authentication, Reporting and Conformance, is one of the most important technical concepts in email deliverability and domain protection

DMARC

DMARC, short for Domain-based Message Authentication, Reporting and Conformance, is one of the most important technical concepts in email deliverability and domain protection. It is also one of the most misunderstood. In practice, DMARC is not “magic” and it is not just another random DNS detail. It is a policy published in DNS that tells receiving mail servers what to do with messages that claim to come from your domain but do not pass authentication checks in the right relationship to the visible From domain.

If you send newsletters, direct mail, automated campaigns, transactional messages or ordinary company email from your own domain, sooner or later DMARC becomes very hard to ignore. It helps receiving systems recognise whether an email really matches the domain identity it presents to the user. It also gives domain owners visibility through reports, which makes it easier to see who is really sending on behalf of the domain and where weak spots still exist in the sending setup.

DMARC is a DNS-based email policy that helps prevent domain spoofing. It tells receiving servers how to handle messages that appear to come from your domain but fail authentication checks tied to the visible From address. At the same time, it can send reports that help you understand what is really being sent in your domain’s name.

What DMARC is and why people talk about it so much

Interest in DMARC has grown because SPF and DKIM alone are not always enough. You can have both configured and still leave room for confusion if the authenticated domain does not properly match the domain the user sees in the From field.

This is where DMARC brings order. It does not only ask whether a server was allowed to send a message or whether a message was signed. It also asks whether the authentication result actually makes sense in relation to the domain identity shown to the recipient.

That matters mainly because of spoofing, phishing and brand impersonation. If someone tries to send forged email in your domain’s name, DMARC is one of the main ways to tell receiving servers not to treat those messages as normal mail.

In practical terms, DMARC is especially important for:

  • companies sending newsletters and marketing campaigns,
  • e-commerce businesses using transactional and automated email,
  • brands that want to reduce the risk of domain abuse,
  • organisations working on deliverability and sender reputation,
  • senders with larger mail volumes who need to meet stricter mailbox-provider expectations.

How DMARC works in principle

DMARC builds on the results of SPF and DKIM, but adds one more condition that is easy to underestimate – alignment. This is the key difference between a simplified explanation and how DMARC really works.

It does not merely check whether SPF or DKIM passed in some technical sense. It checks whether the domain validated by SPF or DKIM is aligned with the domain shown in the From header that the recipient actually sees.

In simplified form, the process looks like this:

  1. the message arrives at the receiving mail server,
  2. the server evaluates SPF and DKIM,
  3. DMARC checks whether the SPF-authenticated or DKIM-authenticated domain aligns with the domain in the From field,
  4. if at least one aligned result passes, the message can pass DMARC,
  5. if not, the receiver looks at the DMARC record of the domain owner to decide how the message should be handled.

This is exactly why DMARC helps against domain impersonation. It is not enough for a message to be signed by some domain or sent from some technically allowed server. The authenticated identity also has to make sense in relation to the visible sender domain.

Important practical point: DMARC does not automatically guarantee inbox placement. It mainly helps with domain authentication, anti-spoofing and sender identity control. Deliverability still depends on other factors such as reputation, list quality, content, complaint rates and recipient behaviour.

What DMARC depends on – SPF, DKIM and alignment

DMARC does not stand on its own. It is a layer built on top of SPF and DKIM. If you have not clearly defined which servers may send on behalf of your domain, or if your messages are not being signed correctly, DMARC has very little solid information to work with.

A useful way to think about the relationship is this:

  • SPF says which servers are allowed to send email for your domain,
  • DKIM proves that the message was signed by an authorised domain and was not materially altered in transit,
  • DMARC checks whether the authenticated result from SPF or DKIM aligns with the domain in the visible From field and defines what should happen if it does not.

In practice, alignment is where many organisations get surprised. A message may “pass something” technically and still fail DMARC because the relationship between the authenticated domain and the visible sender domain does not line up properly.

That is one of the main reasons why DMARC deployments sometimes fail on the first attempt – not because DMARC is inherently mysterious, but because it reveals hidden inconsistencies in the sending infrastructure.

Where DMARC is published and what it looks like

DMARC is published in DNS as a TXT record, usually on the _dmarc subdomain of the main sending domain.

A simple example looks like this:

v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.com;

It may look short, but this record is doing several important things at once:

  • it declares that the record is a DMARC policy,
  • it sets the policy level,
  • it tells receiving systems where aggregate reports should be sent,
  • it can control how subdomains are treated,
  • it can define how strict alignment should be.

That is why copying a DMARC record from somewhere else without understanding it is risky. A badly designed DMARC record may not only fail to help. It can also start blocking legitimate messages from tools or services you forgot were sending on behalf of your domain.

What the policies p=none, p=quarantine and p=reject really mean

This is one of the most practical parts of the whole topic. The p= value defines what the receiver should do with messages that fail DMARC.

  • p=none – monitor only. The receiver is asked not to change message handling because of DMARC failure. This is typically used at the start of deployment so you can collect reports and see what your domain is actually doing.
  • p=quarantine – treat failing messages as suspicious. In practice, that often means sending them to spam or another lower-trust location rather than treating them as clean mail.
  • p=reject – ask the receiving server to reject the message outright if it fails DMARC.

These policies are often best understood as stages of maturity rather than as one quick switch. Many teams begin with p=none, use reports to clean up forgotten senders and alignment problems, move to p=quarantine when the setup is more stable, and only later go to p=reject.

Practical guidance – starting directly with a strict policy can be risky if you have not fully mapped all the systems sending mail on behalf of your domain. DMARC becomes much safer when it is rolled out in stages rather than as a one-step enforcement project.

Why reporting is such an important part of DMARC

One of DMARC’s strongest benefits is not only enforcement, but visibility. The record can ask for reports, most often through the rua tag for aggregate reporting and, where supported, ruf for failure-oriented reporting.

That matters because many organisations do not actually know every service that sends email using their domain. Marketing platforms, CRM tools, old servers, ticketing tools, billing systems and third-party apps often accumulate over time.

DMARC reports help uncover that reality. They can show which senders are authenticating properly, which are failing, and which sources may be spoofing or using the domain without correct setup.

In practice, this makes DMARC much more than a blocking mechanism. It becomes a way to audit your real sending landscape and identify where email authentication still needs work.

What else can be configured in a DMARC record

Beyond the core policy, DMARC records can include additional tags that shape how the policy behaves.

  • rua – where aggregate reports should be sent.
  • ruf – where failure reports should be sent, if receivers support them.
  • sp – a policy specifically for subdomains.
  • pct – the percentage of failing mail the policy should apply to, useful for staged rollouts.
  • adkim and aspf – whether DKIM and SPF alignment should be evaluated in relaxed or strict mode.

These details are part of what makes DMARC flexible. But they also make it possible to create a record that looks fine on the surface while behaving differently than intended. That is another reason why DMARC is best implemented with a clear understanding of what each tag is for.

Why DMARC does not solve everything by itself

DMARC is powerful, but it is not a universal email fix.

It does not guarantee inbox placement. It does not fix poor sender reputation. It does not repair broken list hygiene. It does not automatically make recipients trust your emails. And it does not remove every edge case in complex mail flows such as forwarding, mailing lists or older third-party systems that break alignment.

It is better to think of DMARC as a domain identity and anti-spoofing layer. That is already extremely valuable, but it is still only one part of the wider email setup.

What are the limits of DMARC? DMARC helps receivers evaluate whether a message is consistent with your domain identity. It does not tell them whether a message is “good” in every broader sense. Spam reputation, content quality, mailing practices and receiver-side filtering still matter. That is why DMARC should be seen as a critical part of email security and deliverability – but not the whole system.

Where DMARC matters most in practice

DMARC becomes especially important when a domain is used for:

  • marketing and newsletter sending,
  • transactional email from e-commerce or SaaS systems,
  • company mailboxes and day-to-day business communication,
  • brand protection against spoofing and phishing,
  • compliance with stricter expectations from large mailbox providers.

That is why DMARC is not only a technical concern for mail administrators. It also matters to marketers, founders, e-commerce operators and anyone responsible for a domain’s public credibility.

Why this term is worth understanding even outside technical roles

DMARC is one of the clearest examples of the fact that email is not only about writing a message and pressing send. Behind the scenes, there is also identity, trust and policy.

If you understand what DMARC does, it becomes much easier to see why an email may be blocked even though it “looked fine”, why a brand can be impersonated through email if authentication is weak, and why one forgotten sending tool can cause trouble across an entire domain.

That is why DMARC is worth understanding even outside technical professions. It sits exactly at the point where email deliverability, domain protection, sender reputation and brand trust all meet.

Related terms

  • DNS – DMARC is published as a DNS TXT record, so its role only makes full sense in the wider context of how DNS works.
  • SPF – one of the two core authentication methods DMARC builds on.
  • DKIM – the other core authentication method DMARC evaluates together with alignment.
  • Alignment – the rule that checks whether the SPF-authenticated or DKIM-authenticated domain matches the visible From domain closely enough to count as a DMARC pass.
  • From domain – especially important in DMARC because this is the sender identity the human recipient actually sees.
  • TXT record – the DNS record type used to publish DMARC.
  • rua / ruf – DMARC reporting tags used to request aggregate and failure-oriented reports.
  • p=none, p=quarantine, p=reject – the three main DMARC policy levels that define how failing mail should be handled.
  • MX records – not part of DMARC itself, but closely related to the wider email infrastructure of a domain.
  • Nameservers – the authoritative servers that publish the DMARC record and the rest of the domain’s DNS data.
TXT records - A TXT record is a DNS record used to store text-based information for a domain or subdomain

TXT records

A TXT record is a DNS record used to store text-based information for a domain or subdomain. At first sight, that can sound vague, but in practice TXT records are extremely important. They are commonly used for domain ownership verification, email authentication, service validation and other technical instructions that need to be published through DNS without pointing directly to a server or IP address.

Unlike an A record, which points to an IPv4 address, or an MX record, which tells the internet where incoming email should be delivered, a TXT record does not route traffic in the usual sense. Its role is different. It publishes text data that other systems can read and interpret.

That is exactly why TXT records appear in so many practical situations. You may see them when connecting a domain to Google Workspace or Microsoft 365, when setting up SPF or DMARC, when verifying domain ownership for an external service, or when publishing security-related information connected to email and domain control.

A TXT record is a DNS record that stores text information in DNS. It does not normally point to an IP address or a mail server. Instead, it publishes information that other systems can read and use for verification, authentication or configuration purposes.

What a TXT record actually does in practice

A TXT record allows a domain owner to place text-based information into DNS in a way that other services can query and interpret. The value itself may look like plain text, but in many real-world cases it is not meant for humans to read casually. It is meant for systems and services that expect a specific format.

For example, an email service may look for a TXT record that defines which servers are allowed to send mail for your domain. A cloud service may ask you to place a verification code in a TXT record to prove that you control the domain. A security setup may use TXT records to publish policy information that receiving systems should check before trusting a message.

This is why TXT records are often described as very flexible. They can hold simple text, but in practice they are often used to carry structured technical information.

Why TXT records matter so much

TXT records matter because many modern internet services rely on them as a simple and standard way to publish small pieces of control or verification data.

They are useful because:

  • they are widely supported – nearly every DNS provider supports TXT records,
  • they are flexible – the value can hold many different types of information depending on the use case,
  • they are easy to query – external systems can look them up through DNS without needing direct access to your hosting or email server,
  • they work well for verification – adding a TXT record is one of the most common ways to prove control over a domain.

This is also why TXT records show up again and again when connecting domains to third-party tools. They are one of the simplest ways to confirm ownership and publish technical instructions without changing how the website itself loads.

A TXT record is often the “proof” or “policy” record of a domain. It is where systems look when they need to check whether a domain owner has published a verification token, an email rule or another text-based technical instruction.

What TXT records are used for most often

The most common use cases are much more practical than the name “text record” may suggest.

  • Domain verification – many services ask you to add a TXT record with a specific verification string to prove that you control the domain.
  • SPF – SPF is published as a TXT record and lists which servers are allowed to send email for the domain.
  • DMARC – DMARC is also published as a TXT record and defines how receiving mail servers should treat messages that fail email authentication.
  • Other service integrations – various SaaS tools, security platforms and cloud services use TXT records for domain linking and validation.

That is why TXT records are so common in email administration, but not limited to it. They sit at the point where DNS meets identity, trust and service configuration.

What a TXT record looks like

A TXT record usually contains a hostname or DNS name, the record type TXT, and a value written as one or more text strings.

A simple example could look like this:

example.com TXT "verification=abc123xyz"

Or in the case of SPF:

example.com TXT "v=spf1 include:_spf.google.com -all"

And for DMARC:

_dmarc.example.com TXT "v=DMARC1; p=none; rua=mailto:dmarc@example.com"

To a non-technical user, these may just look like random strings. In practice, each one follows a specific format expected by the service that reads it.

TXT records do not point to a server

This is one of the most important distinctions. A TXT record does not normally point traffic anywhere. It does not say “go to this IP address” the way an A record does, and it does not say “deliver email to this mail server” the way an MX record does.

Instead, it publishes information. That is why TXT records are often misunderstood by people who expect every DNS record to route a service somewhere. TXT records are more about declaration than about routing.

Put simply, a TXT record says: here is a piece of information about this domain. Other systems can now read it and act accordingly.

Can a domain have more than one TXT record?

Yes. A domain can have multiple TXT records. In fact, this is very common.

For example, one domain may simultaneously publish:

  • a verification TXT record for Microsoft 365,
  • an SPF record for email sending,
  • a DMARC record on the _dmarc subdomain,
  • another verification token for an external marketing or analytics service.

This is one reason why TXT records need to be managed carefully. They are flexible, but they can also become messy if old values remain in DNS long after a service has been removed.

Having multiple TXT records is normal. The problem is not the number itself. The real issue is whether each one is still needed, correctly formatted and consistent with the current domain setup.

How TXT records relate to email

TXT records are especially important in email configuration. This is where many domain owners first meet them.

For example, SPF is published as a TXT record. DMARC is also published as a TXT record. And depending on the provider, some DKIM-related setups also involve TXT publication of the public key, although some providers instead use CNAME-based DKIM delegation.

This matters because email reliability is not only about where mail is delivered. It is also about who is allowed to send it, how the sender is authenticated and whether the domain publishes the expected trust signals for receiving systems.

That is why TXT records are so often involved in deliverability issues. A website can work perfectly while email authentication still fails because a TXT-based SPF or DMARC configuration is wrong or incomplete.

What can go wrong with TXT records

TXT records are simple in concept, but there are still several common mistakes:

  • the value is pasted incorrectly,
  • quotation marks or formatting are changed by mistake,
  • an old TXT record remains in place and conflicts with the new setup,
  • the record is published on the wrong hostname or subdomain,
  • the administrator assumes the change is live immediately, even though DNS cache is still serving older data.

Another practical issue is size and structure. Some TXT values are long, especially in email-related use cases. DNS systems may split long TXT content into multiple quoted strings behind the scenes. That is normal, but it is one of the reasons why copying and editing TXT records manually should be done carefully.

Why TXT record changes do not show up immediately

Like other DNS records, TXT records are affected by caching and TTL. That means even after the authoritative record is changed correctly, part of the internet may still see the older value for some time.

This becomes very visible when verifying a domain with a service that keeps saying “record not found” even though the TXT record has already been added. In many cases, the problem is not that the record is wrong. It is simply that the new value has not yet become visible through the relevant DNS resolvers.

That is why TXT record changes should be checked with DNS lookup tools, not only inside the DNS provider’s control panel.

What are the limits of TXT records?

TXT records are very useful, but they are not meant for everything. They are good for relatively small pieces of text-based data, verification strings and technical policy information. They are not designed to replace proper routing records such as A, AAAA or MX, and they are not a place for large amounts of structured application data.

They are also highly context-dependent. A TXT value only makes sense if the system reading it knows how to interpret it. Without that context, it is just text sitting in DNS.

TXT records are excellent for publishing small pieces of verification or policy data, but they are not general-purpose routing records and not a substitute for the other DNS record types a domain still needs for websites, email delivery and core infrastructure.

Why this term is worth understanding even outside technical roles

TXT records are one of the clearest examples of how DNS is used for much more than pointing a website to a server. They show that modern domains also carry proof, trust signals, service validation and policy information in the background.

If you understand what a TXT record does, it becomes much easier to understand why one service asks you to “add this DNS value”, why a domain verification process may fail for a few hours even after the record is added, or why email authentication depends so heavily on correctly published text-based DNS data.

That is why TXT records matter not only to DNS specialists, but also to website owners, marketers, founders and anyone connecting a domain to external services. They are quiet DNS records, but often some of the most operationally important ones.

Related terms

  • DNS – TXT is one type of DNS record, and its role makes full sense only in the wider context of how DNS works.
  • Nameservers – TXT records are stored on authoritative nameservers and served from there to the rest of the internet.
  • Hostname – important because TXT records may be published on the root domain or on specific subdomains, depending on the use case.
  • A record – useful for contrast, because A points directly to an IPv4 address, while TXT stores text-based data.
  • AAAA record – similar to an A record, but for IPv6 rather than IPv4.
  • MX record – another DNS record type, but with a very different function, since MX controls incoming email routing.
  • SPF – one of the best-known examples of a policy published through a TXT record.
  • DMARC – another major email policy record published through TXT.
  • Domain verification – one of the most common reasons third-party tools ask domain owners to add a TXT record.
Domain Name System - DNS - what is it?

DNS

DNS, short for Domain Name System, is one of the core systems that makes the internet usable in everyday life. Its main role is to translate human-readable domain names into technical information that computers can actually work with – most often the IP address of a server. Thanks to DNS, people do not have to remember strings of numbers just to open a website, send an email or connect to an online service. They can simply use an ordinary domain name, while the technical lookup happens in the background.

At first glance, DNS does not look especially visible or important. Most users never notice it at all. They type in a web address, open a page or send an email, and everything seems to happen instantly. In reality, DNS is one of the key layers that keeps the wider internet working in a practical and understandable way. Without it, normal online use would be far less convenient, because people and businesses would have to work directly with technical addresses instead of simple names.

DNS = the internet system that turns domain names into real destinations. DNS is the system that translates a domain name into the technical record a device needs in order to reach the correct server or service. In practice, this usually means an IP address, but DNS can also store other records for email, verification, security and subdomain behaviour.

What DNS actually does in practice

When someone enters a domain name into a browser, the device does not automatically know where it should connect. It first needs to find the relevant DNS data for that domain. DNS provides that answer by returning the technical record linked to the name. Once that record is found, the browser, email system or other application can continue and connect to the right destination.

This entire step usually happens in a fraction of a second. From the user’s point of view, it looks like the page is simply loading. Behind the scenes, however, the domain has just been translated into a real technical target. That is why DNS is often described as one of the hidden foundations of the internet. It is constantly in use, even when people do not realise it.

DNS is not only relevant for websites. It also plays an important role in email delivery, domain verification, security settings, subdomains and other online services that need to know where traffic should go or how a domain should behave.

Why IP addresses alone are not enough

In theory, internet services could work only with IP addresses. In practice, that would be uncomfortable and difficult to manage. People remember names more easily than numeric strings, and domains are far more practical for websites, email services and business operations.

There is also a broader technical reason. One domain does not have to represent only one website on one server. The same domain can be linked to different types of records at the same time. One record may point the website to a server, another may define where email should be delivered, while another may be used for verification or security-related purposes.

That is why DNS is not just a simple lookup tool for matching one name to one IP address. It is a structured system that stores information about how a domain, or part of a domain, should function in real operation.

The practical value of DNS is simple: people work with clear domain names, while the technical side of the internet uses DNS to find the real destination in the background. Without that layer, both users and domain owners would have to manage technical addresses manually, which would be far less practical.

Which DNS records are used most often

DNS is not one single piece of data. A domain can have multiple DNS records, and each type serves a different purpose. Among the most common are the following:

  • A record – maps a domain or subdomain to an IPv4 address.
  • AAAA record – maps a domain or subdomain to an IPv6 address.
  • CNAME record – points one domain name or subdomain to another domain name.
  • MX record – defines where incoming email for the domain should be delivered.
  • TXT record – stores text-based information, often used for verification, email settings or domain policies.

This matters because different DNS changes affect different parts of a service. One update may move a website to a new server. Another may change email routing. Another may affect whether a third-party service can verify domain ownership. DNS therefore has a much wider role than many people first expect.

How DNS is related to nameservers

DNS records must be stored somewhere and served from somewhere. That is where nameservers come in. Nameservers are the servers that hold the DNS records for a domain and provide authoritative answers when someone asks for them.

Put simply, DNS is the system, while nameservers are part of the infrastructure that publishes the actual answers. This distinction matters because the two terms are often used as if they meant the same thing, even though they do not.

In practical administration, when someone says they are “changing DNS”, they are usually editing records stored on the authoritative nameservers for the domain, or changing which nameservers are authoritative for that domain in the first place.

What a DNS resolver does and why it matters

When a user enters a domain name, their device usually does not go directly to the authoritative nameserver of that domain. Instead, it relies on a DNS resolver. The resolver performs the lookup on the user’s behalf, follows the DNS chain and returns the answer that the device needs.

The resolver is also important because it uses cache. That means it temporarily stores DNS answers it has already looked up, so it does not need to repeat the full process every time. This makes internet use faster and more efficient, but it also explains why DNS changes do not appear everywhere at once.

If a resolver still has an older answer stored in cache, it may continue returning that older result for some time. This is one of the key reasons why DNS changes can seem inconsistent across locations, devices or providers.

DNS is a layered system, not one central switch that updates instantly everywhere. Records are served by authoritative nameservers, looked up by resolvers and often stored temporarily in cache. That is why different users may see different results for a while after a DNS change.

Why DNS changes do not take effect immediately

One of the most common real-world situations is a DNS update that looks correct in the control panel, but does not seem fully live yet. A website still points to the old server, email still follows the old route or a verification record does not appear to work immediately. In many cases, this is not a mistake. It is simply how DNS behaves.

The main reason is caching and the TTL value, which stands for Time to Live. TTL tells resolvers how long they may keep a DNS answer in cache before they must ask again for a fresh version. A higher TTL often makes normal lookups faster and more efficient, but it can also make updates take longer to become visible everywhere.

That is why DNS changes are often discussed together with propagation, waiting and checking whether the new state has already spread to the resolvers that matter. In practice, a change may be technically correct on the authoritative nameserver and still not be visible to every user at the same moment.

DNS and email – not just websites

Many people mainly associate DNS with websites, but email depends on it just as much. DNS is used to define where incoming messages should go, which systems are allowed to send mail on behalf of a domain and how receiving servers should treat messages that do not pass certain checks.

This is why DNS is closely linked to terms such as SPF, DKIM and DMARC. These settings are not separate from DNS. They are built on DNS records. If they are incorrect, the problem may not show up on the website at all, but instead in email deliverability, trust and anti-spoofing protection.

That is also why DNS problems are often broader than people expect. A domain may appear to work normally in the browser while still having serious email-related DNS issues in the background.

What DNS does not guarantee

DNS is essential infrastructure, but it does not guarantee that the destination service itself will work properly. If a DNS record points to the wrong server, a broken hosting setup or a mail platform that is not configured correctly, the service may fail even though DNS itself is behaving exactly as it should.

The same applies to performance and security. DNS helps route traffic and publish important service information, but it does not solve server speed, application bugs, hosting quality or broader service security on its own. It is a key connecting layer, but it is still only one part of the wider operational picture.

What are the limits of DNS? DNS is crucial, but it is not a guarantee that a service will work well. It can tell a browser or mail system where to go, but it cannot guarantee that the target server is healthy, that the website loads correctly or that the email service is properly configured. DNS is a fundamental layer of internet infrastructure, not a complete service-quality solution.

Why DNS is worth understanding even outside technical roles

DNS is one of those concepts that many people only notice when something stops working. Yet it is useful far beyond technical administration. Once you understand the basic logic of DNS, it becomes much easier to see why a website may not switch to a new server immediately, why email can misbehave after a domain change or why one user may see the updated version of a service while another still sees the old one.

That is why DNS matters not only to developers or infrastructure teams, but also to website owners, marketers, content managers, founders and business operators. You do not need to become a DNS specialist, but understanding the basics helps you make better decisions and communicate more clearly when domain-related issues appear.

DNS is worth understanding because it shows how the internet works beneath the surface. It may seem invisible in day-to-day use, but it plays a central role whenever a domain needs to point to the right place, email needs to be trusted or an online service needs to behave as expected.

Related terms

  • Nameservers – servers that store DNS records for a domain and provide authoritative answers to DNS queries.
  • TTL (Time to Live) – the value that tells resolvers how long they may keep a DNS answer in cache before requesting a fresh copy.
  • DNS resolver – the service that looks up DNS records on behalf of the user and returns the result based on available data and cache.
  • DNS cache – a temporary stored copy of DNS answers that speeds up browsing and other lookups, but also delays how quickly changes appear everywhere.
  • MX record – a DNS record that defines where incoming email for a domain should be delivered.
  • SPF, DKIM, DMARC – email-related authentication and policy records that show DNS is not only about websites, but also about email trust, verification and delivery.
Bagging - The Ensemble Method That Makes Predictions More Reliable

Bagging

Bagging stands for bootstrap aggregating. It is a machine learning method that does not rely on a single model, but on multiple versions of the same model trained on different samples of the same dataset. Its purpose is not to turn an average model into something extraordinary. Its real value lies in making predictions more stable when the underlying model is too sensitive to the exact data it was trained on. That is why bagging is most commonly associated with models that tend to vary a lot from one training sample to another – especially decision trees.

At first glance, bagging may look like a technique that simply repeats the same process several times. In reality, its strength comes from the fact that each model sees the same problem through a slightly different sample of the data. Those individual views are then combined into a single prediction that is usually more stable and more reliable than the output of one standalone model.

Bagging is an ensemble method that trains multiple versions of the same model on different randomly drawn training samples and then combines their predictions into one final result. In classification, this usually means voting. In regression, it usually means averaging. The goal is to reduce instability and make the final prediction less sensitive to random quirks in the training data.

What bagging actually does

Bagging is built on a simple but very effective idea.

Instead of training one model, you train several models of the same type. Each of them learns from a slightly different training set created from the original data. These are not completely new datasets. They are known as bootstrap samples, which means they are created by random sampling with replacement.

In practice, this means that some records may appear several times in one sample, while others may not appear at all. That small difference is enough to make each model learn a slightly different version of the same problem. Bagging then takes advantage of those differences rather than treating them as a drawback.

Why one model is often not enough

In many tasks, a single model can perform reasonably well and still be unnecessarily sensitive to the exact data it was trained on. Change the training set slightly, and the model may behave differently. This is especially true for unstable models, where even a small change in the data can lead to a noticeably different structure and a different result.

Bagging addresses that weakness by avoiding reliance on a single trained model. Instead, it creates several models, each trained on a different variation of the data. Once their outputs are combined, the influence of random fluctuations becomes weaker. The final prediction is usually more balanced and less likely to overreact to noise in the dataset.

Bagging is not about finding one “best” model. Its strength lies in combining several separate versions of the same model so that the final result is less influenced by chance, noise or oddities in a single training sample.

What bootstrap aggregating means

The name itself captures the logic of the method quite well. Bootstrap refers to the way the training samples are created – by random sampling with replacement. Aggregating refers to combining the outputs of multiple models into one final prediction.

In classification tasks, the usual approach is majority voting. Each model predicts a class, and the final result is the class that appears most often. In regression tasks, the outputs are typically averaged. In both cases, the principle is the same: instead of trusting one model entirely, the final result is based on the combined effect of several models.

Why bagging is so often linked to decision trees

Bagging can be used with different model types, but it is most often discussed in connection with decision trees. The reason is straightforward. Decision trees can be very useful, but they are also quite sensitive to small changes in the data. If the training set changes slightly, the tree may choose a different early split, grow a different structure and end up making different decisions.

That is exactly why bagging works so well with trees. It keeps their natural strength – their ability to capture complex relationships – while reducing their instability. From there, it is only a short step to methods such as random forests, which are built directly on the same idea.

How bagging relates to model variance

In machine learning, bagging is most commonly associated with reducing variance. Put simply, it helps in situations where a model reacts too strongly to the exact data it was trained on and therefore produces results that fluctuate more than they should.

That matters in practice. Most users do not care whether a model has “high variance” in a textbook sense. What matters is whether its output feels dependable and whether it changes too much for the wrong reasons. This is where bagging helps. It does not promise perfection, but it often makes a model more robust and more consistent.

Bagging is not the same as boosting

These two terms are often confused because both belong to the broader family of ensemble methods. In practice, however, they solve different problems in different ways. Bagging builds several models in parallel and combines their outputs. Boosting does the opposite: it builds models sequentially, with each new model focusing more heavily on the mistakes made by the previous ones.

This is the key difference: bagging improves results by combining several independently trained models and reducing variation in their predictions. Boosting follows a different logic – it builds models step by step, with each stage designed to correct earlier mistakes. In simple terms, bagging is mainly about stability, while boosting is mainly about correction. Both can work very well, but they are not interchangeable.

Where bagging is used in practice

Bagging is most useful when a model can extract a meaningful signal from the data, but its output changes too much depending on the exact sample it was trained on.

A typical example is a decision tree. A tree may perform well overall, but even a small change in the training data can lead it to choose a different first split, grow a different structure and produce a different result.

A practical AI example would be an email classification system that sorts incoming messages into categories such as refund request, sales enquiry or technical support. One decision tree might place a lot of weight on words like “return”, while another might focus more on phrases such as “not working” or “order issue”. If the system relied on just one tree, the result could be overly sensitive to the exact shape of the training data. Bagging reduces that risk by building several trees on different samples of the data and combining their outputs through voting.

The same logic applies to regression tasks. Imagine a model that estimates future energy consumption, property prices or the likelihood of customer churn. A single tree may react too strongly to a handful of unusual cases and produce an unstable estimate. If you train several trees on different bootstrap samples and average their predictions, the result is usually more reliable.

That is where bagging becomes practically valuable. It does not introduce a completely new learning logic. Instead, it reduces the influence of chance and of quirks in one particular training sample. The result is a more robust prediction that is less dependent on the model having fitted one specific version of the data too closely.

What are the limits of bagging?Bagging is useful, but it is not a universal answer to every modelling problem. It works best when the underlying model is unstable and has relatively high variance. If the base model is already very stable, the benefit may be limited. In some cases, bagging brings only a modest improvement while significantly increasing computational cost. It also does not fix everything. If the data is poor, the model choice is wrong or the objective is badly defined, combining multiple models will not solve the core problem. Bagging is a strong technique, but it is still only one part of a broader modelling and training strategy.

Where bagging matters outside technical fields

Bagging has practical value far beyond technical or academic work. It is useful wherever prediction stability matters. Typical examples include finance, insurance, marketing, e-commerce and customer service – in other words, areas where models are used to estimate risk, predict customer behaviour, classify requests or forecast demand.

In these settings, the problem is not just whether a model can make a decent prediction once. The real issue is whether its output remains dependable and does not shift too much because of random variation in the training data. Bagging helps by combining several versions of the same model instead of relying on just one. The result is often a more stable and more trustworthy prediction, which in real-world use is often more valuable than a model that appears slightly “smarter” but behaves inconsistently.

This is also why bagging is worth understanding beyond purely technical contexts: it shows that in AI, a more reliable result does not always come from one supposedly superior model. In many cases, it comes from combining several similar models in a way that reduces noise and makes the final output more dependable.

Related terms

  • Machine learning – bagging belongs to machine learning because it learns from data rather than from hand-written rules. The difference is that instead of relying on one trained model, it works with several variants trained on different samples and combines their outputs.
  • Decision tree – bagging is most commonly used with decision trees because it helps reduce their natural sensitivity to changes in training data.
  • Ensemble method – bagging belongs to this family of approaches because it works with multiple individual models and combines their outputs into one final prediction that is usually more stable than the output of a single model.
  • Model variance – this term helps explain why some models fluctuate too much and why combining them often leads to more consistent results.
  • Bootstrap – this is the technical foundation of bagging, because it defines how different training samples are created for individual models.
  • Boosting – this helps distinguish two ensemble methods that are often mentioned together, even though they combine multiple models in very different ways.
Machine learning - The Technology That Learns From Data Instead of Fixed Rules

Machine learning

Machine learning is a branch of artificial intelligence in which systems learn from data instead of relying only on fixed, hand-written rules. A model is trained on examples, looks for patterns in those examples and then uses what it learned to make predictions, classifications or estimates on new data. That is the core idea. The system is not told every possible answer in advance. Instead, it learns a useful structure from past observations and applies it to cases it has not seen before.

At first glance, machine learning may sound like a highly technical concept reserved for researchers or developers. In reality, the underlying logic is straightforward. Many real-world problems are too complex to solve with rigid rules alone. It is relatively easy to define a rule for something simple, but much harder to manually describe every possible variation of spam email, customer behaviour, product demand, credit risk or image content. Machine learning is used in such situations because it allows a system to improve its output by learning from examples.

Machine learning is not about a machine “thinking” like a person. It is about training a model on data so it can detect useful patterns and apply them to new cases. The model does not learn in a human way, but it can still become very effective at specific tasks.

What machine learning actually means

Machine learning starts from a simple practical problem. You have data, you have an outcome you care about, and you want a system to discover a useful relationship between the two.

For example, you may want to predict whether a transaction is fraudulent, estimate how many products will be sold next week, classify a support request or recommend an article to a reader. In each case, the model is trained on historical examples. It analyses which patterns in the data tend to be associated with which outcomes.

That is why machine learning differs from traditional rule-based programming. In a rule-based system, a developer must explicitly define what should happen in each situation. In machine learning, the developer still defines the goal, the training process and the model type, but the detailed decision structure is learned from data.

Why rules are often not enough

There are many tasks where strict rules work perfectly well. If a customer adds products to a basket and clicks the payment button, the system does not need machine learning to calculate the total price. A deterministic rule is enough.

But many useful tasks are not so clean. Consider email filtering. A spam message does not always follow one obvious pattern. Some spam emails use suspicious wording, others imitate legitimate communication and others rely on formatting tricks rather than clearly suspicious phrases. Writing a complete manual rule set for every such case quickly becomes inefficient and fragile.

The same applies to product recommendations, demand forecasting, credit scoring, fraud detection and image recognition. These tasks involve patterns that are too varied or too subtle to describe exhaustively by hand. Machine learning becomes useful because it can absorb those patterns from examples rather than from manually written logic.

Machine learning is most valuable when the problem is too variable, too large or too complex for a fixed set of rules. It works especially well where useful patterns exist, but those patterns are difficult to write down manually in advance.

How a machine learning model learns

The learning process usually begins with a dataset. That dataset contains observations, often called examples or records, and each example includes features. Features are the pieces of information the model uses to learn. In a churn model, features may include purchase history, service usage and support contacts. In an image model, they may be visual patterns encoded numerically.

The model is trained by adjusting its internal parameters so that its predictions become closer to the desired outcome. Different models do this in different ways. A decision tree splits data into branches. A linear model assigns weights to variables. A neural network adjusts many layers of internal connections. The details differ, but the goal is the same: improve the model’s ability to generalise from past data to new cases.

This is an important point. A model should not only perform well on data it has already seen. It should also work on unseen data. That is why evaluation matters so much in machine learning. A model that memorises training examples without learning a broader pattern may look good during training and still perform poorly in real use.

Main types of machine learning

Machine learning is not one single method. It is a broad field that includes several different learning setups.

The best known is supervised learning. Here, the model is trained on labelled examples. It sees inputs together with the correct outcome and learns to predict that outcome. This is common in classification and regression tasks.

Another major category is unsupervised learning. In that case, the data has no explicit target label, and the goal is to find structure inside the data itself. That may mean grouping similar customers, detecting anomalies or reducing complexity in the dataset.

There is also reinforcement learning, where a system learns through feedback from actions and outcomes over time. This is used in more specialised areas such as game playing, robotics or decision optimisation.

In practical business settings, most common uses of machine learning fall under supervised learning, because companies usually want to predict something concrete such as demand, risk, conversion, fraud or churn.

Why machine learning includes many different methods

One reason machine learning can seem confusing is that it contains many model families. Decision trees, logistic regression, random forests, boosting methods and neural networks all belong to machine learning, but they do not behave in the same way.

Some models are easier to explain and audit. Others may capture more complex relationships but require more data, more computing power or more careful tuning. Some methods are stable and simple. Others are powerful but sensitive to changes in training data.

This is where terms such as bagging, boosting, variance and bootstrap become relevant. They do not replace machine learning as a field. They describe specific techniques or ideas within it. Bagging, for example, belongs to machine learning because it trains models on data, but it focuses specifically on improving stability by combining multiple models rather than relying on only one.

Where machine learning is used in practice

Machine learning is already part of many everyday systems, even when users do not notice it directly.

It is used in fraud detection to identify suspicious transactions, in streaming platforms to recommend films or songs, in retail to forecast demand, in search engines to rank results, in customer support to sort requests and in healthcare to help identify patterns in medical data. In industrial settings, it can be used for predictive maintenance. In marketing, it can be used for segmentation, scoring or response prediction.

What connects these applications is not the industry, but the structure of the problem. There is data, there is a useful outcome and there is enough repetition for a model to learn something meaningful from examples.

What are the limits of machine learning?Machine learning can be powerful, but it is not a shortcut around poor data, unclear goals or weak system design. If the data is biased, incomplete or badly prepared, the model will learn from those weaknesses as well. It also does not automatically “understand” the problem domain. A machine learning system can be useful, but only when the data, objective and evaluation process are all handled properly.

Why machine learning matters outside technical fields

Machine learning matters far beyond engineering or academic research because many industries now depend on better prediction and better decision support.

In finance, the goal may be risk estimation. In e-commerce, it may be recommendation and demand planning. In customer service, it may be ticket routing. In logistics, it may be forecasting and anomaly detection. In each case, the value is not that the system looks intelligent in an abstract sense. The value lies in improving real decisions, reducing manual effort or identifying patterns at a scale that would be difficult for people alone.

This is also why machine learning should not be understood as one futuristic technology with one fixed meaning. It is a practical field built around a simple idea: if useful patterns exist in data, models can often be trained to detect and apply them in a structured way.

Related terms

  • Decision tree – a model that makes predictions by splitting data into branches based on conditions.
  • Ensemble method – an approach that combines multiple models into one final result.
  • Model variance – describes how much a model’s output changes when the training data changes.
  • Bootstrap – a sampling technique used to create repeated training samples from the same dataset.
  • Bagging – a machine learning technique that improves stability by combining multiple models trained on bootstrap samples.
  • Boosting – an ensemble method that builds models sequentially so later ones focus more on earlier mistakes.
A records - An A record is a DNS record that translates a domain or hostname into a specific IPv4 address

A records

An A record is a DNS record that translates a domain or hostname into a specific IPv4 address. This is what allows the internet to determine which server it should connect to when someone opens a website, an app or another service available under a specific name. So if a domain leads to a server over IPv4, the A record is what tells DNS which IP address belongs to it.

At first glance, an A record can seem like a basic technical detail that only comes up when hosting is being configured.

In reality, it is one of the most important DNS records of all. As soon as a domain or subdomain points to a specific server, the A record is very often the reason why.

An A record translates a domain name or hostname into an IPv4 address. In other words, when someone enters the name of a website or service, the A record helps determine which exact server the request should actually be sent to.

What an A record actually does in practice

When a user enters a domain into the browser, the device does not automatically know which IP address it should connect to.

First, the name has to be translated into a specific numeric network destination. That is exactly the role of the A record. If the domain or hostname is available over IPv4, the A record returns the matching IPv4 address, for example 203.0.113.10.

This means the A record is not the website itself and not the server itself. It is DNS information that says which IPv4 address belongs to that name.

Why it is called an A record

The letter “A” stands for Address.

It is one of the oldest and most fundamental DNS record types. That is exactly why it appears so often – it solves one of the most basic DNS tasks possible: translating a name into the address of a server.

In practice, the important thing is that an A record does not deal with aliases, email routing or other special DNS functions. Its role is very direct – to say which IPv4 address belongs to a given name.

What an A record looks like

An A record contains two main pieces of information:

  • the domain or hostname,
  • the IPv4 address that name should point to.

In practice, this means that a hostname such as www.example.com may have an A record with the value 203.0.113.10. When someone opens that name, DNS returns that IP address and the browser connects to the correct server.

The user enters a domain name or hostname, but the network ultimately needs an IP address. The A record is the DNS step that turns the name into a real technical destination.

What is the difference between an A record and an AAAA record?

An A record and an AAAA record solve a very similar problem, but for different address families.

  • A record maps a name to an IPv4 address.
  • AAAA record maps a name to an IPv6 address.

So both records do similar work, but each one is used for a different version of the Internet Protocol. In practice, one domain can have both at the same time. That is common when a service should be reachable over both IPv4 and IPv6.

Where A records are used most often

An A record is used anywhere a domain or subdomain should point directly to a specific IPv4 address of a server.

Typical examples include:

  • the main website,
  • subdomains such as www, blog or app,
  • application servers,
  • internal or dedicated services accessible through a specific hostname.

That is why A records are so common when setting up hosting, moving a website or pointing subdomains to particular services.

Why a domain can have more than one A record

A domain or hostname does not have to have only one A record.

In some situations, it can have multiple IPv4 addresses at the same time. This is used, for example, for traffic distribution, higher availability or redundancy. DNS can then return multiple answers and the client connects to one of them depending on its own behaviour and network conditions.

So multiple A records are not necessarily a mistake. On the contrary, they may be part of a fully intentional and technically correct setup.

An A record is not the same thing as a CNAME

This distinction is important.

An A record points directly to an IPv4 address. CNAME, by contrast, does not point directly to an IP address at all. It creates an alias from one name to another name. So if you need a name to point directly to a specific IPv4 address, the correct choice is an A record. If you want one name to inherit its destination from another hostname, the correct choice is CNAME.

That is why these two record types should never be treated as interchangeable. They are both important, but they solve technically different tasks.

Important point: an A record leads directly to an IPv4 address. If you need direct routing to a specific server, that is the right choice. If you only need an alias to another hostname, that is where CNAME belongs, not an A record.

How an A record relates to a hostname

An A record is always tied to a specific name – in other words, to a domain or hostname.

That means it does not belong to “the server in general”, but to the specific name under which that server or service should be reachable. One hostname can have one A record, while another hostname can have a different one. This is exactly how DNS distinguishes which service leads to which technical destination.

How an A record relates to hosting

When hosting changes, the A record is very often one of the main things that changes with it.

If you move a website to a new server, you usually receive a new IPv4 address that the domain should point to. That is the address that needs to be written into the A record. If the domain still points to the old IP address, it will continue leading users to the previous server even after the migration.

That is why the A record is one of the first things checked when a website is moved, hosting is changed or old content is still showing after a migration.

Why an A record change does not show up immediately

Like other DNS changes, an A record change does not become visible across the whole internet immediately.

The reason is caching and the TTL value. DNS resolvers keep older answers in memory for some time before they fetch the new version. That means some users may still see the old server for a while even though the A record has already been updated.

That is why A record changes normally come with some propagation time.

What happens if the A record is missing or wrong?

If a domain or hostname needs to be reachable over IPv4 and the A record is missing, DNS will not be able to return the correct IPv4 address. The result may be an unavailable website or another unavailable service.

If the A record is configured incorrectly, the domain may point to the wrong server. This often happens during hosting migrations, manual DNS edits or simple IP-address typing mistakes.

So the practical rule is straightforward: if the domain should lead to a specific server over IPv4, the A record must be correct and current.

Why this term is worth understanding even outside technical roles

The A record is one of those terms that looks technical at first, but in reality it sits behind many everyday situations that people outside IT still have to deal with.

As soon as a website is moved to new hosting, a new subdomain is created or a domain starts pointing somewhere it should not, the A record is often part of the explanation. Once you understand what this record does, it becomes much easier to see why the domain name alone is not enough and why the internet still needs a specific IP address to reach the right server.

That is why the A record matters even outside technical professions. It is one of the simplest but most important examples of how DNS turns a human-readable name into a real network destination.

Related terms

  • DNS – the A record is one of the most basic DNS record types, and its role only makes full sense in the wider context of DNS.
  • IP address – the A record translates the name into a specific IPv4 address.
  • Hostname – the A record is tied to a specific hostname or domain and defines which IPv4 address belongs to it.
  • AAAA record – the direct counterpart of the A record for IPv6 and the clearest comparison for understanding the difference between the two address families.
  • Nameservers – authoritative nameservers are where A records are stored and from where the internet looks them up.
  • CNAME – an important related concept, because unlike an A record, CNAME does not point directly to an IP address, but to another hostname.
Alias - An alias is an alternative or substitute name that does not point to its own separate destination, but instead refers to an already existing name, address or object

Alias

An alias is an alternative or substitute name that does not point to its own separate destination, but instead refers to an already existing name, address or object. In technical practice, people most often encounter this idea where there is no need to create a brand-new destination, because it is enough to give another name to something that already exists. That is why the term alias often comes up in DNS, email systems and user account administration.

At first glance, an alias can seem like a small detail or simply another way of naming the same thing.

In reality, it is a very practical principle. Instead of configuring everything again from scratch, you create an alternative name that leads to an existing target. This makes systems easier to manage, reduces duplication and simplifies future changes.

An alias is an alternative name that does not represent its own separate target, but refers to something else that already exists. In other words, instead of creating a new address, a new server or a new mailbox, you create another name for an existing one.

What an alias is in the simplest possible way

The easiest way to think about an alias is as a nickname or a second name.

One person may have an official name, but other people may also call them by something else. It is still the same person, just under a different label. An alias works in a similar way in technology. It does not create a new target, a new server or a new service. It simply adds another name to an existing one.

That is its main purpose. An alias does not create a new technical reality. It makes the existing one available under another name.

Why aliases are used

An alias is mainly used when the same target should be available under more than one name, or when administrators do not want to manage the same thing separately in multiple places.

This is useful, for example, when:

  • a service should work under more than one name,
  • configuration should be easier to manage,
  • an older name should continue to work even after the technical target changes,
  • the same setup should not have to be duplicated manually.

That is why an alias is not just a cosmetic naming trick. In many cases, it is a practical tool for keeping a system cleaner and easier to maintain.

An alias is useful where multiple names should lead to the same target.

Imagine, for example, that a company uses the address shop.example.com, but also wants eshop.example.com to work.

Instead of managing both names completely separately, one can act as an alias of the other. From the outside, two different names exist. Technically, however, they lead to the same place. If the target changes later, you update the main destination and the alias follows automatically.

Alias in everyday technical practice

Aliases are not used only in DNS.

They also appear commonly:

  • in email, where one mailbox receives messages sent to more than one address,
  • in user accounts or system naming, where one object is known under multiple labels,
  • in commands or scripts, where one shorter name points to another longer command,
  • in web and platform configuration, where several names lead to the same technical service.

In all of these cases, the principle stays the same. An alias does not create a new entity. It only creates another name for the one that already exists.

What alias means in DNS

In DNS, the idea of an alias is used when one name should not have its own independent address, but should instead refer to another hostname.

This is where the CNAME record comes in. A CNAME works as a DNS alias from one hostname to another hostname. That means, for example, that one subdomain does not need its own separate A or AAAA record if it can simply act as an alias of another hostname that already points to the real server.

In this context, the concept of alias is especially important. It shows that not every DNS name needs its own direct routing. Some names simply inherit the destination of another name.

Alias is not the same thing as a redirect

This is an important distinction.

An alias and a redirect are not the same thing, even though the two are often confused in ordinary conversation. An alias means that one name refers to another target at the level of naming or DNS logic. A redirect, by contrast, usually means the user or system first arrives at one place and is then actively sent somewhere else.

So with an alias, there is usually no “forwarding during the journey”. The alternative name leads to the same target from the beginning.

Alias is not a new independent target

This is another key point.

When you create an alias, you do not create a new server, a new mailbox or a new standalone service. You create another name for something that already exists. That is why aliases simplify administration – the technical destination only needs to be maintained in one place, while the other names follow it.

This is especially useful when the real target may change over time. Once the main destination changes, the alias can continue working without the same update having to be repeated in several different places.

An alias is not a new object. It is another name for an existing object. In DNS, that means one name does not use its own direct destination, but refers to another name that already has that destination.

Where alias makes the most sense

Alias is most useful where more than one name should refer to the same thing and where you do not want to manage everything manually in several places.

Typical examples include:

  • subdomains that should lead to one main service,
  • email addresses that should all end up in the same mailbox,
  • internal system names and shortcuts,
  • situations where an older name needs to remain valid for compatibility even though the technical setup has moved elsewhere.

That is where aliases save work and reduce the risk that a change is applied in one place but forgotten in another.

What are the limits of an alias?

An alias is very useful, but it is not the right answer for every situation.

If a name needs to have its own fully independent logic, its own direct addressing or its own separate records and settings, then an alias may not be the right solution. In DNS, for example, aliases through CNAME work well in some places, but not everywhere. They are best used where the name is meant to follow another hostname rather than behave as a fully independent endpoint.

That is why an alias should be understood as a naming shortcut, not as a replacement for all other technical configuration.

An alias works best when one name only needs to lead to an already existing destination without having its own separate technical setup.

For example, if eshop.example.com should behave exactly like shop.example.com, it can be used as an alias. Both names lead to the same place, and there is no need to manage two separate destinations.

The same logic applies to email. If sales@example.com should deliver messages to the same mailbox as info@example.com, an alias makes sense because no new mailbox has to be created. It is simply another name for the same destination.

An alias is less suitable when the name needs to behave as its own independent technical object. For example, if api.example.com must point to a different server, have its own DNS records, its own SSL certificate setup or its own routing logic, then it should not just be an alias of another name. In that case, it needs its own direct configuration.

Practical rule: if two names should behave exactly the same, an alias is often a good fit. If one name needs its own separate behaviour, settings or infrastructure, it should be configured as its own independent target.

Why this term is worth understanding even outside technical roles

Alias is one of those terms that sounds more technical than the logic behind it really is.

In reality, it expresses a fairly simple principle: one thing can be available under more than one name without becoming a new independent service. That matters not only to developers, but also to website owners, marketers, content managers and business operators who work with domains, email or external services and need to understand why one name may simply inherit the behaviour of another.

Once the concept of alias is clear, it becomes easier to understand why some changes only need to be made in one place, why several addresses may lead to the same target, and why some names inside a system are not independent at all, but simply point elsewhere.

That is why alias is worth understanding outside purely technical professions too. It is a simple naming principle, but one that explains a great deal about how domains, services and systems are organised in practice.

Related terms

  • DNS – aliases are especially important in DNS because some names do not need their own separate address, but can refer to another name.
  • CNAME – the most typical example of an alias in DNS, because this record makes one hostname an alias of another hostname.
  • Hostname – in DNS, an alias usually does not point directly to an IP address, but to another hostname.
  • IP address – an alias usually does not point directly to an IP address, but instead to a name that is later resolved into one.
  • A record – useful as a contrast, because an A record points directly to an IPv4 address instead of to another name.
  • AAAA record – similar to an A record, but for IPv6, and helpful for understanding the difference between a direct address record and an alias.
  • Nameservers – in DNS, alias records are stored on authoritative nameservers and served from there to the rest of the internet.
When Will a DNS Change Go Live? And Why Does It Not Show Up Immediately?

How long does a DNS change take – and why does it not show up immediately?

Why DNS updates usually take hours rather than minutes?

A DNS change does not work in a way that becomes visible across the whole internet immediately after you save it. In practice, the new setting has to become visible gradually through authoritative nameservers and through the caches of individual DNS resolvers, which is why the discussion is usually about hours rather than minutes. In most cases, a DNS change becomes visible within a few hours, but sometimes it can take up to 24 hours and occasionally even longer.

This is exactly what confuses many people.

The DNS records may already be changed correctly, but the website, email or another service still behaves according to the previous setup.

That does not automatically mean something is broken. Quite often, it is simply the result of how DNS infrastructure works and how long different systems keep older records in memory before asking for a fresh version.

A DNS change usually becomes visible within a few hours, but in some cases it can take up to 24 hours or longer. The main reason is not that the change failed, but that DNS resolvers and providers temporarily keep older records in cache according to the TTL value.

Why a DNS change does not take only a few minutes

DNS servers store domain information in cache.

That is useful in normal operation because they do not need to look up the same domain from scratch every time. It speeds things up and reduces load. The downside is that when you change a DNS record, part of the internet may continue using the older version for a while.

In practical terms, the new IP address or the new DNS record may already be set correctly, but some servers, internet providers or local devices may still be holding the older data in memory. That is why the change does not become visible everywhere at the same time.

What TTL is and why it decides how fast a DNS change becomes visible

How long a DNS server may keep an older record in cache is determined by the TTL value, short for Time to Live. It is the time in seconds for which the record is considered valid before it should be requested again from the authoritative source.

A common TTL value is 3,600 seconds, which equals one hour. In some cases, it may be set to 86,400 seconds, which equals 24 hours. That is one of the main reasons why DNS changes sometimes seem fast and at other times feel surprisingly slow. The higher the TTL, the longer the wait can be.

Put simply: if the record has a TTL of one hour, some resolvers may continue serving the previous version for around one hour. If the TTL is set to 24 hours, the older version may stay visible much longer. That is why DNS changes are often planned in advance and preferably outside peak traffic hours.

DNS changes do not “spread” all at once. They become visible gradually as caches expire. That is why the same domain can appear updated for one user but still unchanged for another.

You should also expect a short interruption

When DNS records are changed, it is sensible to allow for the possibility of a short interruption lasting a few minutes.

This matters especially when the routing of a website, email or another service is being changed. If such a change is made at the busiest time of day, the impact can be more noticeable.

That is why DNS changes are usually recommended outside peak hours – typically in the evening or at the weekend, when traffic is lower and a short interruption affects fewer people.

How to check whether the DNS change is already visible

The simplest option is to verify the DNS records through a public DNS checker.

Such a tool shows what records different servers in different parts of the world currently see for your domain. That helps you quickly tell whether the problem is really an unfinished DNS change or simply the fact that some resolvers are still working with older cached data.

In practice, it is often useful to check the domain without “www” first and see whether the new state is already visible.

If a checker shows the correct records but the website still loads incorrectly for you, the issue is often no longer in the authoritative DNS setup itself, but in local cache or your provider’s resolver cache.

What to do if the change still has not appeared after 24 hours

If a DNS change still does not seem visible after one day, that does not automatically prove that something is configured incorrectly. In some cases, the TTL may be higher than the usual 24-hour assumption, which extends how long older data remains in cache.

A more common real-world situation is different: public DNS checkers already show the correct records, but when you open the site you still see the old version or perhaps an error page. In that case, the problem is often that the older DNS data is still stored in the cache of the operating system, the browser or the DNS resolver used by your internet provider.

Can flushing DNS cache help?

Yes – in exactly that kind of situation, clearing the local DNS cache can make sense.

On Windows, this is commonly done with the command ipconfig /flushdns in Command Prompt. On macOS, the exact command depends on the system version, but the principle is the same: remove older locally stored DNS information and force the system to fetch a fresh version.

If public DNS tools already show the correct values and the issue persists only for you or only for a subset of users, flushing DNS cache is one of the quickest steps worth trying.

A typical real-life scenario looks like this: the DNS records are already updated correctly, public tools show the new state, but your computer or your connection still works with the older version. In that case, the issue is not a failed DNS change. It is just delay caused by cache.

This is one of the most common misunderstandings: if the authoritative DNS records are already correct, but one computer still shows the old destination, that usually does not mean the DNS change failed. It usually means that some layer of cache has not expired yet.

What to think about before changing DNS

If you already know that DNS records will need to be changed, it is worth planning the change in advance. It helps to know the current TTL, to assume that the change will not be immediate, and to avoid making critical changes in the busiest part of the day.

For important services, it also makes sense to check what records are currently in place and to be very clear about what exactly is going to change. DNS often looks simple only until something goes wrong. And when a change does happen, the biggest practical issue is often not writing the new record itself, but waiting until the new version is actually visible across the wider internet.

Why this matters even outside technical roles

DNS changes are one of those things that many people only notice when a website stops loading correctly, email starts behaving strangely or a migration to new hosting does not seem finished. Yet this is exactly where the underlying logic of internet infrastructure becomes visible.

If you understand why a DNS change takes time, it becomes much easier to understand why a website may still point to the previous server after a migration, why email may still be delivered according to the older setup for a while, or why one person sees the new version while another still sees the old one.

That is why this topic matters not only to developers or DNS administrators, but also to website owners, marketers, founders and anyone responsible for a live domain. DNS changes rarely fail because of one dramatic mistake. More often, they simply need time because the rest of the internet is still catching up through cache expiry.

Related terms

  • DNS – the wider system that translates domain names into IP addresses and other technical records. Without understanding DNS itself, it is hard to understand why changes do not appear instantly.
  • Nameservers – one of the key layers through which new DNS settings become visible. If you do not know what role nameservers play, it is easy to assume a DNS change failed even when it is simply still propagating.
  • TTL (Time to Live) – one of the most important concepts for understanding DNS propagation speed, because it defines how long cached records may stay in use before being refreshed.
  • DNS resolver – the resolver decides which DNS answer a user or device actually receives at a given moment. It is often the place where the visible delay happens between a completed DNS change and what the user still sees.
  • DNS cache – the most common reason why a new DNS record does not become visible immediately, even though the authoritative change has already been made.
  • SPF records – a practical example of a DNS record used for email, showing that DNS does not affect only websites but also other important services.
  • DKIM records – another example of a DNS-based record where changes can directly affect email verification and deliverability.
  • DMARC – expands the context by showing that DNS also plays a role in domain protection and email trust, not only in traffic routing.
MX records - MX records are DNS records that tells the internet where your incoming email should go

MX records

An MX record, short for Mail Exchange record, is a DNS record that tells the internet which mail server should receive email for a specific domain. That is how a sending mail server knows where to deliver a message when someone writes to an address such as name@yourdomain.com. Without a properly configured MX record, a website can still work normally, but email delivery will sooner or later start to fail.

At first glance, an MX record may look like a small technical detail hidden somewhere in DNS administration. In reality, it is one of the most important records connected to any domain that uses email. As soon as you rely on business email, hosted mail, Google Workspace, Microsoft 365 or another mail platform, the MX record becomes one of the key settings that decides whether incoming email reaches the right place at all.

MX records are DNS records that tells the internet where your incoming email should go. Means – MX record tells the internet which mail server should accept incoming email for a domain. When someone sends a message to an address at your domain, the sending mail server checks DNS for the MX record and uses it to decide where the message should be delivered.

What an MX record actually does in practice

When someone sends an email to an address on your domain, the sending server has to work out where that message should physically go. It does not deliver the email to “the domain” in a vague sense. It has to deliver it to a real mail server. That is exactly what the MX record is for.

In practical terms, an MX record acts like a routing instruction for incoming mail. If it is configured correctly, the message goes to the right mail server. If it is configured incorrectly, delivery may fail or the message may be sent to a different mail server than the administrator intended.

This is one of the important differences between web traffic and email traffic. A website usually points to an IP address through an A or AAAA record. Email delivery, however, normally works through MX records, which define which mail servers should be tried for the domain and in what order.

What an MX record looks like

An MX record usually contains two key pieces of information:

  • the hostname of the mail server that should receive the email,
  • the priority value that tells sending systems which server should be tried first.

The priority value is often the part that confuses people at the beginning. With MX records, a lower number means a higher priority. So if a domain has two MX records with values 10 and 20, the sending server will first try the server with priority 10. Only if that does not work will it move on to the server with priority 20.

In other words, an MX record does not only define where mail goes. It also defines the order in which mail servers should be attempted. That makes it possible to have a primary mail server and one or more backup servers.

MX records use priority in reverse from what many people first expect. Lower number means higher priority. That is why a record with priority 10 is preferred over one with priority 20.

Why a domain can have more than one MX record

A domain does not have to use only one MX record. In fact, it is common to use more than one. The reason is simple – reliability and delivery logic.

Sometimes multiple MX records are used as backup. If the main mail server is not available, the sending system can try the next one in the list. In other cases, some servers may be configured with the same priority so that delivery can be spread across multiple mail servers.

That is why checking MX records is not only about whether “some MX record exists”. It is also about whether the priorities make sense and whether the full set of MX records matches how the domain’s email infrastructure is actually supposed to work.

An MX record does not store email – it only tells other servers where to send it

This distinction matters. The MX record itself does not receive, store or manage email.

It is only a DNS instruction that tells other systems which mail server should receive the message. The actual mail handling is done by the mail server the MX record points to.

Put simply, the MX record is routing data, not the mailbox and not the mail application. If it is configured incorrectly, the problem is not that the email account itself is broken. The problem is that incoming mail may never reach the correct server in the first place.

What to watch out for when configuring MX records

One common mistake is assuming that any MX record will do as long as one exists. In reality, what matters is whether it points to the correct mail server, whether it matches the requirements of the mail provider you are using, and whether the priority values are set properly.

Another important technical point is that an MX record should not point to a CNAME. In practice, the MX target should be a hostname that resolves through its own A or AAAA record. This may sound like a small detail, but it matters a great deal in email operations. If the MX target is configured incorrectly, delivery and compatibility problems can follow.

A further common issue appears during migration. An administrator changes the MX records while moving to a new email service, but the new mail environment is not fully ready yet. The domain then starts routing mail to the new destination before the rest of the mail setup is in place.

MX records should point to a real mail server hostname, not to a CNAME alias. And when changing MX records during a migration, the new mail platform should already be fully prepared before traffic is switched over.

What if a domain is not supposed to receive email at all?

Not every domain has to accept incoming email. Some domains exist only for a website, for technical purposes or for redirection, and there is no reason for anyone to send mail to them.

For these cases, there is also the concept of a null MX. This is an explicit DNS statement that the domain does not accept email. It is a more advanced configuration detail, but a useful one. If a domain truly does not receive mail, it is cleaner to say so explicitly than to leave sending servers guessing or attempting delivery unnecessarily.

In practical terms, null MX is about making the domain’s intent clear. It does not make mail work better – it tells the internet that the domain is not meant to receive mail in the first place.

What happens if an MX record is missing?

If a domain has no MX record, that does not automatically mean email can never be delivered. Under SMTP rules, a sending system may in some cases fall back to the A or AAAA record of the domain itself. But that is not a state a normal mail setup should rely on.

In practical terms, the rule is simple: if a domain is supposed to receive email, it should have correct MX records. Depending on fallback behaviour is unnecessary risk and often leads to confusion when something breaks in real operation.

One especially important point is this: a website can still work even if MX records are missing or wrong. Your email cannot. That is why MX records are one of the first things checked when mail on a domain is not arriving properly.

Web and email are different services. A domain can load perfectly in the browser while email delivery is failing at the same time. That is why MX records matter even when the website itself appears completely healthy.

How MX records relate to other email DNS records

An MX record handles the routing of incoming mail, but that is not the whole DNS layer of email. In practice, it is closely connected to other records, especially SPF, DKIM and DMARC.

This matters because healthy email operation is not only about where a message should be delivered. It is also about how the sender is authenticated, how domain abuse is limited and how the domain’s trustworthiness is communicated to receiving systems. The MX record solves one critical part of the mail setup, but not the whole thing.

Why MX record changes do not take effect immediately

Like other DNS changes, MX record updates do not become visible across the whole internet instantly. The reason is caching and the TTL value, which stands for Time to Live. DNS resolvers keep previous answers in memory for a limited period and only fetch the new version when that period ends.

This means that after changing mail provider or moving to a new mail server, some parts of the world may still deliver mail based on the old settings for a while. That is why these changes should be handled carefully, ideally only when the new mail servers and the rest of the supporting mail setup are already fully prepared.

Where MX records most often come up in real life

MX records are most often dealt with when setting up business email, moving to Google Workspace or Microsoft 365, changing hosting provider or troubleshooting delivery problems. These are exactly the moments when it becomes clear that a website and email are two different services and that each relies on a different part of the DNS setup.

For a website owner, company administrator or business founder, the practical lesson is simple: if the domain uses email, MX records are among the most critical settings to keep under control.

Why this term is worth understanding even outside technical roles

MX records are one of those DNS terms that most people only run into when mail stops working. Yet they are one of the clearest examples of the fact that a domain is not only about the website. It is also about other services that need to be pointed correctly and kept in sync.

If you understand what an MX record does, it becomes much easier to understand why the website can work normally while email does not. And in everyday business reality, that is often more important than people expect – especially on company domains, where reliable email delivery may matter even more than the website itself.

That is why MX records are worth understanding even outside technical professions. They are a quiet part of DNS, but one of the most important ones whenever a domain is expected to receive email reliably.

Related terms

  • DNS – an MX record is one type of DNS record, and its role only makes full sense within the wider logic of DNS.
  • Nameservers – MX records are stored on the authoritative nameservers for a domain, and sending systems look them up there through DNS resolution.
  • TTL (Time to Live) – defines how long systems may keep MX records in cache before they fetch an updated version.
  • Hostname – the specific server name the MX record points to. In practical terms, this is the mail server hostname that should receive email for the domain.
  • CNAME – a DNS record type that points one name to another name. For MX, this matters because the MX target should not be a CNAME alias, but a hostname with its own A or AAAA record.
  • SMTP – the protocol used for email transport, which relies on MX records to decide where incoming mail should be delivered.
  • SPF, DKIM, DMARC – related email authentication records that show email setup is not only about routing, but also about verification, trust and domain protection.
A hostname is a specific name used to identify a host, server, device or service in a network. In the internet and DNS context, it usually means a domain name or subdomain name that points to a particular technical destination - for example www.example.com, mail.example.com or api.example.com. In simple terms, a hostname is the human-readable name a system uses instead of making people work directly with an IP address

Hostname

A hostname is a specific name used to identify a host, server, device or service in a network. In the internet and DNS context, it usually means a domain name or subdomain name that points to a particular technical destination – for example www.example.com, mail.example.com or api.example.com. In simple terms, a hostname is the human-readable name a system uses instead of making people work directly with an IP address.

At first glance, the word hostname can seem obvious. People often use it casually and assume it simply means “the domain”. In practice, however, the meaning is narrower and more useful than that. A hostname is usually the specific network name that identifies one particular endpoint, service or machine within the wider naming structure.

That is why the term appears so often in DNS, hosting, server administration, email infrastructure and API configuration. As soon as someone needs to point a service to a real technical target, the hostname becomes part of the conversation.

A hostname is the specific name used to identify a host or service on a network. In DNS practice, it is usually the domain name or subdomain name that points to a concrete server, application or endpoint. People work with the hostname, while DNS resolves it to the technical destination behind it.

What a hostname actually does in practice

When someone opens a website, connects to an API, sends email or uses another internet service, they usually do not work directly with a numeric IP address. Instead, they use a hostname.

That hostname is then resolved through DNS to the appropriate technical information – often an IP address through an A or AAAA record, or another name through a CNAME record.

This means the hostname itself is not the server, not the application and not the network path. It is the usable name that identifies where the system should go next.

In real life, that makes hostnames one of the most practical layers of internet infrastructure. They separate the human-facing identity from the lower-level technical addressing.

How a hostname is different from a domain

This is where many people get confused.

A domain is the broader namespace, such as example.com. A hostname is usually a specific name inside that structure that identifies a host or service, such as www.example.com or mail.example.com.

In practice, people sometimes use the terms loosely and say “domain” when they really mean “hostname”. That is understandable in ordinary conversation, but technically the distinction can matter.

For example:

  • example.com may be the main domain,
  • www.example.com may be the hostname for the public website,
  • mail.example.com may be the hostname for mail-related infrastructure,
  • api.example.com may be the hostname for an application endpoint.

So a hostname is usually a concrete DNS name used for a particular system role, while the domain is the broader naming space it belongs to.

The domain is the wider address space, while the hostname is the specific label you actually use for one service, one server or one endpoint inside that space.

How a hostname is different from a URL

This is another common mix-up. A hostname is not the same thing as a full URL.

A URL may contain several parts:

  • the protocol, such as https://,
  • the hostname, such as www.example.com,
  • the path, such as /products,
  • and sometimes query parameters or fragments.

So in the address https://www.example.com/products, the hostname is only www.example.com.

This matters because many technical settings apply specifically to the hostname, not to the full URL. DNS, SSL certificates, server configuration and routing rules often begin with the hostname.

How a hostname is different from an IP address

A hostname is a name. An IP address is a numeric network address.

The hostname is what people and systems usually use at the interface level. The IP address is what the network ultimately uses to route traffic to the correct destination.

That is exactly where DNS comes in. DNS translates the hostname into the technical data needed to continue the connection.

Without this separation, people would need to remember and manage raw numeric addresses much more often. Hostnames make networks and internet services much more practical to use.

What a hostname usually looks like

A hostname is typically written as one or more labels separated by dots, for example:

  • www.example.com
  • mail.example.com
  • app.eu.example.com

Each label is one part of the name. In DNS terms, names are built from labels joined together with dots.

In normal usage, people usually write the hostname without a trailing dot. In strict DNS notation, a fully qualified domain name can be written with a final dot, but in everyday practice that is rarely shown.

Can a hostname include the main domain only?

In some contexts, yes. The main domain itself can act as the name used for a service, especially for a website running directly on the apex domain.

But in practical internet and hosting discussions, the word hostname often refers more specifically to a service name under the domain, such as www, mail, api or another subdomain-like label.

That is why the term can feel slightly blurry in ordinary speech. In real operations, however, what matters most is whether the name clearly identifies the intended host or service and resolves correctly in DNS.

What rules apply to hostnames?

At the DNS level, names are built from labels, and those labels have length limits. In internet host naming practice, host software is expected to handle labels up to 63 characters and full names up to 255 characters.

It is also worth knowing that older naming assumptions were relaxed long ago, and hostnames may begin with a digit as well as a letter. That surprises some people because outdated explanations still repeat older, stricter rules.

For everyday use, the most important takeaway is not memorising every syntax detail. It is understanding that hostnames follow technical naming rules and are not just arbitrary text.

Important point: a hostname is not just a label someone invents casually. It is part of a structured naming system with technical rules, DNS behaviour and operational consequences.

Where hostnames appear most often

Hostnames are used in many everyday technical situations, even when users do not notice them explicitly.

Typical examples include:

  • website hostnames such as www.example.com,
  • mail-related hostnames such as mail.example.com,
  • API hostnames such as api.example.com,
  • application endpoints such as app.example.com,
  • verification or service-specific names used by cloud tools and SaaS platforms.

In all of these cases, the hostname acts as the network-facing identity of that endpoint. DNS and the surrounding infrastructure then take care of the technical mapping.

How a hostname relates to DNS records

A hostname usually becomes operationally meaningful only because it has relevant DNS records attached to it.

For example:

  • an A record can map the hostname to an IPv4 address,
  • an AAAA record can map it to an IPv6 address,
  • a CNAME record can make it an alias of another hostname,
  • a TXT record can publish verification or policy information for that hostname.

This is why hostnames are not just naming labels in the abstract. They are also the anchor points where actual DNS logic is applied.

How a hostname relates to nameservers

The DNS records of a hostname are stored on the authoritative nameservers for the domain or zone.

That is where resolvers look when they need to find the records tied to that hostname. So when someone changes the DNS configuration of a hostname, the change does not appear magically by itself. It becomes visible through the nameserver and resolver process, just like any other DNS change.

What happens if a hostname is wrong or missing?

If the hostname is wrong, does not resolve in DNS or points to the wrong destination, the service may fail even if the rest of the infrastructure is healthy.

A website may not load. An API may not connect. A verification process may fail. Email-related services may break. The hostname itself is not the entire service, but it is often the first naming layer the whole connection depends on.

This is why hostname issues can look surprisingly serious in practice, even though the term itself sounds simple.

What are the limits of the term hostname?

The word hostname is widely used, but it is not always used with perfect precision. In some conversations it means any DNS name. In others it means specifically the name of one host or one service endpoint. In still other cases, people loosely use it where they really mean a full domain or even a full URL.

That does not make the term useless. It simply means the context matters. In technical work, it is usually best to treat a hostname as the specific DNS name that identifies the host or service being discussed.

What are the limits of the term hostname? It is a very practical word, but not always used with the same level of precision in every context. In technical DNS and hosting work, the safest interpretation is the specific name used to identify one host or service endpoint.

Why this term is worth understanding even outside technical roles

Hostname is a useful concept because it sits exactly between human-friendly naming and real technical infrastructure. It is one of the clearest examples of how internet services are identified in practice.

If you understand what a hostname is, it becomes much easier to understand why a service can have one visible web address, another API address and another mail-related address, all under the same wider domain. It also becomes easier to understand why DNS settings, SSL certificates and hosting changes often refer to one hostname rather than to “the whole website” in a vague sense.

That is why the term matters outside purely technical professions too. Website owners, marketers, founders and content managers often work with hostnames even when they do not call them that. Once the concept is clear, many DNS and hosting discussions become much easier to follow.

Related terms

  • DNS – hostname resolution only makes full sense in the wider context of DNS.
  • Domain – the wider naming space a hostname belongs to.
  • Subdomain – often the practical form a hostname takes when identifying a specific service under a main domain.
  • FQDN – a fully qualified domain name, which is the complete DNS name of a host or endpoint.
  • IP address – the network address a hostname is often resolved to through DNS.
  • A record – maps a hostname to an IPv4 address.
  • AAAA record – maps a hostname to an IPv6 address.
  • CNAME – makes one hostname an alias of another hostname.
  • TXT record – may publish verification or policy data on a hostname or on the root domain, depending on the use case.
  • Nameservers – the authoritative servers that publish the DNS records connected to the hostname.