IDG News Service - Web site operators will be able to register domain names written entirely in Chinese characters, including the final characters to the right of the last dot, in a matter of months.
Until now, site operators could register Web sites in the Chinese country-code top-level domain (ccTLD) using Chinese characters for all except the final ".cn".
The board of the Internet Corporation for Assigned Names and Numbers (ICANN) granted approval to three different organizations -- China Internet Network Information Center, Hong Kong Internet Registration Corporation and Taiwan Network Information Center -- to create Chinese-language top-level domains (TLDs). ICANN controls the creation of new Internet TLDs.
"One in five people on the planet will directly benefit from this work," ICANN CEO Rod Beckstrom said in a news conference Friday afternoon.
The changes will also affect application software developers and those who maintain whitelists or blacklists of domain names for Web filters or antiphishing tools, as they will have to update their code and filters.
The Chinese-language TLDs will be created within two to three months, he said.
China uses a script that represents words as one or more ideograms, but the DNS (Domain Name System) infrastructure stores domain names using the "Latin" alphabet, the 26 letters from A to Z. That suits Internet users in English-speaking countries, but poses problems in countries for which the official language is written using other scripts, such as Chinese ideograms, Arabic script or the Cyrillic characters used in Russian. European countries such as Österreich (Austria) or España (Spain) also have problems with the Latin alphabet, as they use accented characters to spell their official name in their own language.
The Chinese-language internationationalized domain names (IDNs) are not the first IDNs that ICANN has approved. In April it allowed Egypt, Russia, Saudi Arabia and the United Arab Emirates to create country-code top-level domain names in their own script.
There are many more applications for IDNs pending, Beckstrom said, including requests from Tunisia, Qatar, Jordan and the Occupied Palestinian Territory for the creation of IDNs in Arabic, from Sri Lanka for names in Sinhalese and Tamil, and from Thailand to add its name in Thai.
The technical underpinnings were developed not by ICANN but by the Internet Engineering Task Force, who worked for many years on the project, Beckstrom said.
The IDNs, regardless of the script or language they represent, will all be stored as a series of Latin characters beginning xn -- followed by an encoded sequence representing the name. Thus, the IDN for China will be stored as xn -- fiqs8S (in simplified Chinese script) or xn--fiqz9S (in traditional Chinese script), while that for Taiwan will be xn -- kpry57d or xn -- kprw13d. Converting the underlying TLD into the appropriate script for display will be left to the browser or other client software. ICANN hosts a test page to find out whether a browser can already do this.
Peter Sayer covers open source software, European intellectual property legislation and general technology breaking news for IDG News Service. Send comments and news tips to Peter at email@example.com.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts