Feeds

.mobi domain opens for business

Landrush

Beginner's guide to SSL certificates

The race for securing a slice of the "mobile internet" kicked off today with companies given their first opportunity to register for a new ".mobi" internet domain.

From today, trademark holders from within the mobile industry have the chance to register their trademarks as .mobi domains. From 12 June to 22 August, all trademark holders will be given the opportunity to get their hands on a .mobi domain before the whole thing is thrown open to the world and its dog on 28 August.

The idea behind .mobi is that it will funnel users to sites and services specially designed for mobile devices. According to the experts, it should appeal to phone operators, content providers, service providers, and handset manufacturers.

"Companies need to act quickly to ensure they protect their brands and existing online presence from potential threats," said Jonathan Robinson, coo of domain registrar NetNames. "The new .mobi domain will help make mobile internet addresses easier to market and remember and increase the volume of consumers surfing the web on the move." ®

Remote control for virtualized desktops

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.