Browse Definitions :
Definition

custom domain name suffix (custom TLD)

A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization. The TLD is the last segment of the domain name, the letters – such as com or net  -- immediately following the final dot in a URL. There are currently 22 TLDs.

A custom TLD can be any word or combination of letters. An automobile manufacturer might purchase the .car suffix, for example; a company might purchase its own name as a TLD: Apple.com could become Apple.Apple, or it could register second-level domains (SLD) for business segments separately, so that it had fully qualified domain names (FQDN) like iPad.Apple.

ICANN (Internet Corporation for Assigned Names and Numbers), the organization that governs domain name system (DNS) management, announced that it will accept applications for the first custom TLDs between January 12 and April 12, 2012. The organization expects to approve 1,000 applications per year.

The expectation is that organizations will purchase custom TLDs to increase visibility and branding and, possibly, to increase search engine optimization (SEO), although it is not clear that the suffixes will affect search results in any way.

The application fee for custom TLDs is $185,000, which is only partially refunded in the case of rejection. If approved, a registration will cost about $25,000 per year to maintain.

Given the cost of application, ICANN does not expect that there will be a problem with cybersquatters purchasing custom TLDs hoping to sell them to a legitimate business. Nevertheless, ICANN has established processes to protect the system from abuse. Applicants are required to demonstrate that they have a legitimate claim to the domain name in question. ICANN will also research applicants’ backgrounds. Any history of cybersquatting will result in immediate rejection of the application.

 

See also:  domain, domain name, generic TLD (gTLD), IP address, URL

 

Continue reading about custom domains:

 > ICANN’s applicant guidebook

> Proposed expansion of top-level domains generates security concerns

> Custom domain suffixes are coming: Here’s what you need to know

> Protecting IaaS from domain name system threats

This was last updated in November 2011

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Malwarebytes software

    Malwarebytes is a cross-platform anti-malware program that detects and removes malware and other rogue software.

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close