editor's blog
Subscribe Now

The Veil is Lifted on Methodics.Com

You may remember something of a kerfuffle about Methodics, which uses the methodics-da.com domain, finding that a page at methodics.com that said that Methodics was out of business, pointing them to IC Manage instead.

While it was all suspicion at the time, it turns out that Methodics did a Uniform Domain Name Resolution complaint. This process is used when someone has a domain that infringes someone else’s trademark for less than honorable purposes.  According to the policy, there are three things that must be demonstrated:

“(i) your domain name is identical or confusingly similar to a trademark or service mark in which the complainant has rights; and

 (ii) you have no rights or legitimate interests in respect of the domain name; and

 (iii) your domain name has been registered and is being used in bad faith.”

Presumably, saying that the company is out of business when, in fact, it isn’t, might qualify under the third item, but then again, I shouldn’t presuppose that: the matter is still being adjudicated.

However, in the process, the owner of the domain was revealed: Shiv Sikand, VP of Engineering at IC Manage. I did my own “whois” and confirmed the same. Frankly, I should have thought to do that before; I don’t know if that’s only recently been visible. UPDATE: Turns out, it was originally registered anonymously through a third-party proxy, so an earlier “whois” wouldn’t have worked. The investigation revealed the owner.

I checked with IC Manage, and got the following comment from Shiv Sikand:

“I acquired the Methodics.com domain name in mid-June 2011 for a nominal sum at a domain name auction. There are at least two companies using the name Methodics. I have since offered it to Methodics LLC, which currently uses methodics-da.com, for the same price I paid for it.”

I’ve checked with Methodics to see if they are going to bite; no response on that yet. UPDATE: They “… do plan to recover the domain from Sikand however there are some legal issues that do need to be addressed as part of that process.”

So there it is, the obvious is now confirmed. I can’t help but qualify this as a cheap trick. I suppose someone might think it’s clever in a “whatever it takes to win” mode, but, were it successful, it certainly wouldn’t be a demonstration of better technology.

Leave a Reply

featured blogs
Sep 23, 2020
The great canning lid shortage of 75, the great storm of 87, the great snow of 54, the great freeze of 48... will we one day be talking about the great toilet roll shortage of 2020?...
Sep 23, 2020
CadenceLIVE 2020 India, our first digital conference held on 9-10 September and what an event it was! With 75 technical paper presentations, four keynotes, a virtual exhibition area, and fun... [[ Click on the title to access the full blog on the Cadence Community site. ]]...
Sep 22, 2020
I am a child of the 80s.  I grew up when the idea of home computing was very new.  My first experience of any kind of computer was an Apple II that my Dad brought home from work. It was the only computer his company possessed, and every few weeks he would need to cr...
Sep 18, 2020
[From the last episode: We put the various pieces of a memory together to show the whole thing.] Before we finally turn our memory discussion into an AI discussion, let'€™s take on one annoying little detail that I'€™ve referred to a few times, but have kept putting off. ...

Featured Video

Four Ways to Improve Verification Performance and Throughput

Sponsored by Cadence Design Systems

Learn how to address your growing verification needs. Hear how Cadence Xcelium™ Logic Simulation improves your design’s performance and throughput: improving single-core engine performance, leveraging multi-core simulation, new features, and machine learning-optimized regression technology for up to 5X faster regressions.

Click here for more information about Xcelium Logic Simulation

Featured Paper

The Cryptography Handbook

Sponsored by Maxim Integrated

The Cryptography Handbook is designed to be a quick study guide for a product development engineer, taking an engineering rather than theoretical approach. In this series, we start with a general overview and then define the characteristics of a secure cryptographic system. We then describe various cryptographic concepts and provide an implementation-centric explanation of physically unclonable function (PUF) technology. We hope that this approach will give the busy engineer a quick understanding of the basic concepts of cryptography and provide a relatively fast way to integrate security in his/her design.

Click here to download the whitepaper

Featured Chalk Talk

Cloud Computing for Electronic Design (Are We There Yet?)

Sponsored by Cadence Design Systems

When your project is at crunch time, a shortage of server capacity can bring your schedule to a crawl. But, the rest of the year, having a bunch of extra servers sitting around idle can be extremely expensive. Cloud-based EDA lets you have exactly the compute resources you need, when you need them. In this episode of Chalk Talk, Amelia Dalton chats with Craig Johnson of Cadence Design Systems about Cadence’s cloud-based EDA solutions.

More information about the Cadence Cloud Portfolio