Search My Blog

Thursday, January 12, 2012

Internet Opens Up to All Names

Internet Opens Up to All Names

A historical day dawns as the formal process that will expand the number of top level domains available on the Internet begins.

By Sean Michael Kerner | Jan 12, 2012

Every since the very beginning of the Internet, new top level domains (TLD) have been added incrementally. Currently the number of TLDs stands at 22, but thanks to a process that begins today that number could be over 1,000 by this time next year.

The new TLDs are known as generic top level domains (gTLD) and can potentially be any word, in nearly any type of human language script. The current pool of TLDs are entirely in Latin script and include among others: .com, .net, .org and country codes TLDs (ccTLDs) like .de (Germany) and .cn (China).

"This is the first time in the history of the Internet that generic top level domains can be created in non-Latin characters," Rod Beckstrom, CEO of ICANN said during a press conference announcing the start of the gTLD program.

Non-Latin characters had previously only been available as part of internationalized domain names (IDNs) for country code TLDs (ccTLD). The IDN process officially approved the first non-Lation IDN ccTLDs in 2010.

The path to today's historic milestone comes after over six years of debate and discussion. The gTLD program was officially approved by ICANN as a program to implement in a meeting in Singapore in June of 2010.

"We think the world is ready for this innovation," Beckstrom said. "We believe that this program will do what it is designed to do, which is open up the Internet domain name system to further innovation."

Read More...
http://www.enterprisenetworkingplanet.com/datacenter/internet-opens-up-to-all-names.html

So, what will I still have to come up with $185,000 to start selling my own ".don" Domains??? "Applicants are required to pay a fee of $185,000 to even be considered."

Don

Helpful Links
  • Yankee Group Mobile WAN Optimization Report

    Mobile work continues to evolve. Your organization must keep up with the demands of its mobile workforce. This report introduces the concept of mobile WAN optimization and provides three case studies including RCM, PRTM and Einstein that highlight how this emerging technology can help IT departments achieve what previously appeared to be conflicting goals. Read >

  • Network Security Resources

    More threats than ever before pose a danger to today's enterprise network. Get the latest tips and intel on the newest risks in our guide to network security resources. Read >

  • Extreme Savings: Cutting Costs with WAN Optimization

    Did you know it's possible to cut IT costs without impacting day-to-day IT operations? In fact, when you download this whitepaper from Riverbed on cost-savings through WAN optimization, you'll discover how businesses of all different sizes have realized a return on investment in just a few months through significant hard cost savings in areas such as bandwidth reduction and IT consolidation. It's called Extreme Savings and its only from Riverbed. Read >

Resources
  • Mastering Network Protocols

    To be an effective network engineer or administrator, you need to understand the blocks on which all networks are built. In most cases, that means a thorough understanding of IP addresses, subnets, CIDR, and TCP protocol. Download this free guide now and learn in-depth concepts covering the foundation of networking. Read more

  • Getting the Most from Your WAN

    It's important that employees have access to the data and applications they need over a wide area network as if they were on the local area network. Using application acceleration, wide area file services (WAFS), and WAN optimization, businesses can increase productivity and save money by reducing server and storage sprawl and the number of necessary software licenses. Read more

  • Protecting Your Network with Intrusion Detection and Prevention System

    An intrusion detection system (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. The term IDS actually covers a large variety of products that all detect intrusions. An IDS solution can come in the form of cheaper shareware or freely distributed open source programs, to a much more expensive and secure vendor software solution. Read more

No comments: