Feeds

iiNet turns brand into global domain

$US200k starter bid for GTLD

Beginner's guide to SSL certificates

ISP iiNet is pursuing the costly application process for a coveted new generic top-level domain (gTLD), for the .iiNet moniker.

Under the procedure applicants invest an initial fee of around $US200,000 for the pleasure, which includes a non-refundable evaluation fee of $US185,000 and $US5,000 deposit fee per requested application slot when registering. Once approved the annual ICANN fee starts at $US25,000.

Other fees may also apply depending on the specific application path.

iiNet claims that is the first company in Australia to commit to the gTLD program.

“We are the first company in Australia to publicly say so and join the likes of the New South Wales and Victorian governments who are applying for .Sydney and .Melbourne, and the AFL sports body who are applying for .AFL,“ the ISP said on its company blog.

Applications for the new domain close mid-April and the laborious process actually takes anywhere between 9-18 months before applicants know if they have been successful or not. iiNet forecasts that once it attains approval it is looking at implementation around 2013 – 2014.

“It gives us incredible flexibility with our domain name strategies keeping in mind the domain name is a significant part of our online identity. It cements our position as an innovator in the digital world plus it’s kinda cool that we will have our own corner of the internet, iiNet will be recognised as a registry on the global stage and will join the ranks of a handful of other registries like Verisign (who runs .com and .net),” iinet said. ®

Remote control for virtualized desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.