NordVPN Promotion

Home / Blogs

A Look at Closed vs. Open New gTLDs

Protect your privacy:  Get NordVPN  [ Deal: 73% off 2-year plans + 3 extra months ]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

The essay analyzes some of the strengths and weaknesses of closed and open new gTLDs. The success of the gTLD to a large degree rests on the successful design and implementation of an effective digital business model.

A closed gTLD is one whose owner uses it for exclusive content—for example, the use of .book exclusively for Amazon books. Conversely, if Amazon opens up .book, other book sellers and libraries would be able to set up sub-domains, sites where they controlled content.

ICANN has given closed gTLDs the go-ahead, and we will find out whether or not they cause harm to the Internet. If a new gTLD does cause harm as a byproduct (externality) dumped on the ecosystem, ICANN should require the owner to compensate the Internet community.

One criticism of closed gTLDs is that they will add to the age-old Internet problem of content confusion. A visitor can type .com instead of .net, or somebody looking for a selection of blogs can land on .blog and get forwarded by Google to its Blogger service. It would be as if the owner of blog.com ran it as an open environment or forwarded traffic to Blogger.com.

Is a closed gTLD less valuable than an open one? That’s decided case by case, and the bidder for a new gTLD has to decide for him- or herself. The calculus should include the value of an option to switch between the two. Moreover, there is synergy value (economies of scale) in running more than one open gTLD for a company’s different product lines, such as Amazon’s bid for .book and .video. The synergies are driven by a coherent business model whose components are outlined below.

Running a successful gTLD depends to a large extent on developing and maintaining the entity’s digital business model. From a business model perspective, closed and open both have their strengths and weaknesses. Research (see, Peter Weill and Stephanie L. Woerner, Optimizing Your Digital Business Model, MIT Sloan Management Review) suggests that the success of a business model is driven by content, customer experience, and platform.

Whether a site is closed or open, content will probably be biased in favor of the creator/owner. The owner can also bet that sub-domains, for the most part, will be kept up to the mark because of the self-interest of their managers. Only for the most part, of course—there remains the chance that one of the sub-domain owners won’t take advantage of available features. And some domain owners might not provide the most competitive platforms. But in the end, self-interest drives both sides to get the most out of each other.

One advantage of a closed environment is that content can be presented in a coherent format that transforms the customer experience. With control of the entire system, a closed environment can provide a better experience, a change in mode that goes beyond content.

Platforms have internal components and external ones. Internally, a platform is busy collecting data and analyzing it, as with traffic analyses. Externally, a platform presents visitors with the screen hardware they need to perform desired functions (for example, Amazon’s e-book readers), and with a network of partnership to improve customer experience (Amazon’s alliances with various couriers). Competitive closed gTLD environments yield a much stronger control over internal and external platforms and thus, superior user experience.

In conclusion, it is easier to control the business risk of a closed gTLD. However, less risk does not imply higher value. Looking at an open gTLD, the owner should think about the risks-profits balance and set up a solid digital business model ready for implementation.

By Alex Tajirian, CEO at DomainMart

Filed Under

Comments

Where is the 'go ahead'? Thomas A Gilles  –  Aug 12, 2013 5:21 PM

“ICANN has given closed gTLDs the go-ahead, and we will find out whether or not they cause harm to the Internet.”

When? Where?

Last I heard, closed generics are frozen, no contracts to be signed.

This issue is still being debated, most recently at ICANN 47 and in October at the IGF. Likely not to resolve before ICANN Buenos Aires.

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

NordVPN Promotion