I used to work in support at Rackspace and was fortunate enough to work on 2 presidential candidates and be the lead tech on another. I learned a ton.<p>The way they raise funds and advance through primaries made scaling out the infrastructure pretty interesting. It was basically, "If we make it through X with a big enough lead deploy gear by next Tuesday if not wait". Would have been a lot easier now that using "the cloud" is an option.
I ran those sites through the Sitetruth.com business legitimacy checker. The results are amusing.<p>hillaryclinton.com - no street address on web site. SSL cert is domain control only validated. Known to Open Directory, so it gets a medium rating of a yellow circle.<p>tedcruz.org - the robots.txt file redirects to the robots.txt file at "www.tedcruz.org". We interpret this as "robots go away", which is perhaps too strict. The SSL cert is domain control only validated. The site is known to Open Directory as non-commercial, so it gets the grey non-commercial neutral rating.<p>marcorubio.com - the robots.txt file redirects to the main page, which was interpreted as "robots go away". The SSL cert is one of the low-end Cloudflare certs with a long list of unrelated domains, so that's useless. Known to Open Directory from an old Senate campaign, and Open Directory says it's non-commercial, so it gets the grey non-commercial neutral rating.<p>randpaul.com - no street address on web site. SSL cert is domain control only validated. Not in Open Directory. No way to validate site ownership, so it gets the red do-not-enter symbol.<p>Paul's US Senate site, "www.paul.senate.gov", is much better. The U.S. Senate has a good Organization Validated SSL cert with full address info. (Our address parser couldn't parse "The Capitol" as a street address, so there's no map.) Amusingly, the SSL cert covers the sites of a number of senators of both parties. That site gets a green checkmark.<p>There's also "jebbushforpresident.com" and "jebbushforpresident.net". Both are bogus sites, not from the candidate. No street address, bad SSL certs, not in Open Directory. They get red "do not enter" symbols.<p>Not one of the candidate sites has a street address, or an SSL cert better than the low end "domain control only" validated certs. None of them except the U.S. Senate site match anything in our business directories, but one would not expect that for sites like these. The SiteTruth engine did properly identify the fake Jeb Bush sites as less than legitimate.
Have you thought about adding fields for design/consulting firm and CRM? Looks like Hillary is on Salesforce and Cruz is using (and probably overpaying) for Marketo.<p>The consultants are almost more interesting if you know the industry though. It looks like all the candidates built their sites internally, except for Rubio who is using Push Digital. Will be interesting to see which strategy works better.
I think it's a stretch to assume that the way a presidential candidate's campaign webmaster chooses to configure a website will be any indication of how the candidate would lead the executive branch of government. It's probably better to look at the candidate's previous leadership performance and his or her positions (as indicated by voting records, not campaign rhetoric) on policy issues.
This is probably a relevant XKCD:<p><a href="https://xkcd.com/932/" rel="nofollow">https://xkcd.com/932/</a><p>Campaign websites, especially at this point in the race, are as cheap and fast and possible. The tech that will win a presidency will be almost entirely behind the scenes--data collection, email segmenting, volunteer coordinating, etc.
Presidential campaigns have most definitely gone very high-tech. The Obama campaign was run by some really smart guys (<a href="http://en.wikipedia.org/wiki/Harper_Reed" rel="nofollow">http://en.wikipedia.org/wiki/Harper_Reed</a>) using lots of services on AWS. Check out their infrastructure diagram (heads-up its 60MB).<p><a href="https://dl.dropboxusercontent.com/u/14405212/AWSOFA-Print-27x240.pdf" rel="nofollow">https://dl.dropboxusercontent.com/u/14405212/AWSOFA-Print-27...</a><p>Finally, here is a great tech talk video by the Obama for America tech team lead by CTO Harper Reed.<p><a href="https://www.youtube.com/watch?v=X1tJAT7ioEg" rel="nofollow">https://www.youtube.com/watch?v=X1tJAT7ioEg</a>
3 out of 4 candidate website do not support winxp. Wonder if this finally means that winxp compatibility is no longer worth the extra trouble from a business perspective.
I have no idea how to read the table on that site.<p>What is the difference between a red check mark and a green check mark?<p>What is the difference between a red X and a green X?
This reminds when the Joe Lieberman campaign said their site was hacked when it was really just cheap setup.<p><a href="http://empirezone.blogs.nytimes.com/2006/12/21/finding-lieberman-site-wasnt-hacked/comment-page-1/?_r=0" rel="nofollow">http://empirezone.blogs.nytimes.com/2006/12/21/finding-liebe...</a>
I am surprised that only hillaryclinton.com has public whois data. IMHO, hidding behind a proxy is not a good cue for trust. Three among four are very slow to load on my PC. I think this very good article should also compare the performances of the websites.
This chart might be incorrect for <a href="https://www.hillaryclinton.com" rel="nofollow">https://www.hillaryclinton.com</a>, BuiltWith shows it is using:<p>- Microsoft IIS 8 for a server<p>- ASP.NET<p><a href="https://builtwith.com/hillaryclinton.com" rel="nofollow">https://builtwith.com/hillaryclinton.com</a><p>No mention of python.
It's bemusing that we are to assume this is the USA presidential candidate - neither of the strings 'usa' or 'america' appear on the page. Other countires that have presidents presumably need to identify themselves so as to not confuse (other) people.
All but Marco Rubio have wildcard certificates without an apparent use for them. It looks like whoever built their websites was keen on using all the budget they were alloted.
Ah, but <i>their</i> sites are using encryption. What's more important is what they think about <i>everyone else</i> using encryption - and whether they should be using "golden split key front doors" or not. Do a chart for that next.