AP II 2012.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

AP II 2012.Pdf We’re there for you NEW NEWTEC M6100 BROADCAST SATELLITE MODULATOR TECHNOLOGIES THAT HELP YOU GO FURTHER Newtec technologies allow billions of people to connect to the world, their families and each other. You can find our innovations and technologies anywhere. Whether we work for government agencies or private companies, we always see innovation as a way to reduce your costs and optimize your efficiency. Our global experience in multiple markets helps us in achieving our ultimate goal: taking care of your satellite communications while you can focus on your core activities. We’re there for you. Always and everywhere. Visit us at www.newtec.eu BELGIUM – USA – SINGAPORE – DUBAI – CHINA – BRAZIL BROADCAST GOVERNMENT AND DEFENCE IP TRUNKING BUSINESS AND CONSUMER VSAT All articles are available for download at www.connect-world.com CONTENTS Cloud opportunities Improving business fluidity with the Cloud 5 by Andrew Dobbins, Verizon’s vice president of Asia-Pacific 5 7 10 12 From video-communication to machine-to-machine - Cloud turns to business 7 by Karim Taga, managing partner and global practice leader, TIME, Arthur D. Little Enterprise adoption of Cloud computing: The next five years for IT 10 15 17 19 22 by Bernard Golden, CEO, HyperStratus Shore to shore: IT, the fifth utility 12 by Jim Fagan, VP and managing director, Rackspace Asia-Pacific Cloud security 24 26 29 31 Spear phishing in the Cloud 15 by GOH Hock Beng, vice president, Channel Sales Asia, TrustSphere Who Owns Security In The Cloud? 17 by Jim Reavis, founder and executive director, Cloud security Alliance; and Dave 33 36 39 42 Asprey, vice president of Cloud security, Trend Micro Data breach and risk in the Cloud - the legal response 19 by Thomas J. Shaw, Esq, attorney at law, and CEO, CloudRisk Asia Pragmatic tradeoffs in enterprise adoption of public Cloud 22 44 46 by Dr Steve Hodgkinson, research director - public sector, Ovum Australia and New Zealand Special Cloud applications Asia: leaders in technology adoption 24 by Matthew Tonkin, area vice president, Asia-Pacific, Sybase 365 Connections Social care in the Cloud 26 From the Editor’s desk 2 by Dennis Juul Poulsen, CEO, Tweakker by Rebecca Copeland Online video monetisation made simple 29 Imprint 2 by Dennis Rose, vice president, APAC, Brightcove Advertorial The benefits of using Cloud computing in VoIP 31; ALOE Systems 3 Cloud services: a minor technological advancement, a revolution for VoIP wholesale business Advertisements by Konstantin Nikashov, CEO, ALOE SystemsCorporation Newtec IFC DragonWave 4 Cloud implementation CommunicAsia 9 Head for the Cloud - see the reality 33 by Alastair McAulay, IT expert, PA Consulting Group ITU World 2012 14 SMAU Expocomm 21 Cloudonomics: achieving cost-efficiency and agility through Futurecom 28 Broadband World Forum hybridization 36 35 by Raj Dutt, senior vice president of technology, Internap IBC 38 Connect-World 41 Open Cloud for open business 39 O3B Networks IBC by Dirk-Peter van Leeuwen, vice president & general manager, Red Hat, Asia-Pacific Ericsson OBC Building the right Cloud for your business 42 by Chip Salyards, vice president Asia-Pacific, BMC Software Federating interworking Clouds Opening up the federated Cloud in Asia 44 by Ditlev Bredahl, CEO, OnApp Examining the Asia Cloud 46 by Samuel Lee, president, Equinix Asia-Pacific CONNECTIONS Connections It is time to get our heads out of the Clearly, security versus convenience is a question of trade-offs and hype Cloud and examine the reality. balances, which the IT department needs to define in their new In this edition, we look at Cloud role in the Cloud-era. In fact, free from the cumbersome in-house opportunities and applications, Cloud infrastructure management, the world of IT is promising to blossom, implementation issues, Cloud value exploiting the new possibilities opened up by the Cloud accessibility, chain and business models and we even the richness of components and the speed to launch services. dream future blue-sky Cloud offerings... The idea of the hosted services is not Cloud seems to offer something for everybody. IT global players, new and the technology is already there, Telcos, wholesale service providers, application integrators and but somehow everything has come OTT startups - they all see opportunities for new business. In the together now: smarter devices, faster APAC region, local Cloud providers are now emerging. They need fixed and mobile pipes, easier mobility, to collaborate in order to match the global coverage and the range of global business and most of all - users’ offerings of the IT giants. This is achieved by the federation of smaller determination to communicate Internet-style at Internet-speed. Cloud providers that pool together ‘ideal’ headroom capacity to facilitate global reach, thus forming a viable alternative. The consumer in us all is already ‘spoilt’ by ready Internet services wherever we are. Now the enterprise is set to succumb. IT departments These Cloud connectivity solutions are generally described as IaaS usually resist this loss of control, but they must act before business lines (Infrastructure as a Service), and they leverage the existing infrastructure simply bypass them and go to the public Cloud anyway. It is better for the of service providers and network carriers. There is also a whole range of IT departments to investigate the real requirements, wisely select Cloud SaaS (Software as a Service) spawned by the Cloud, offering on-tap open partners and carefully assess what can benefit from the open Cloud and software applications or carefully crafted, fully integrated, multi-tenanted what should remain protected within the private domain. For this to work packages of functionality that most enterprises want to have, at a lower efficiently, hybrid solutions are now proposed that enable internal systems cost than can be achieved in-house. The Cloud is enticing in its elastic to operate alongside applications on the public Cloud. This provides capacity, ubiquity and resilience through distributed architecture. In this better utilisation of existing assets and a smoother transition. edition, you can read about offered Cloud IPX, Cloud CRM and self-care, mCommerce assistance, video advertising via Cloud delivery and even Much of the enterprise resistance to the public Cloud is to do with security. Cloud-based VoIP softswitch. Some argue that the risks of Clouds are exaggerated, and can be mitigated by choosing a trustworthy provider who will not jeopardise its reputation Best of all, analysts expect that Cloud will not just be a delivery with bad service. They also argue that the main risks, such as fraud and DoS mechanism for cheaper Internet applications on multiple devices, but a attacks, exist anyway, and what is needed is implementation of adequate vehicle for innovative services that were not practical before, not cost- security measures, whether the perimeter is within the enterprise or on the effective before or simply not conceived of before. Cloud platform. Cloud providers need to respond to these requirements. Enterprises need greater visibility of who is accessing its data and need to improve authentication control. Data must be fully secure when it is encrypted ‘at rest’ as well as ‘in motion’. If security breaches do occur, the enterprise must be prepared to comply with notification rules and regulations. Rebecca Copeland, However, the levels of security should match the type of activity and the Editor, sensitivity of the data, at the discretion of the IT management. Connect-World [email protected] Editor-in-Chief: Fredric J. Morris [email protected] Publisher: David Nunes [email protected] Editorial Department: [email protected] Production Department: [email protected] Connect-World is published under licence by INFOCOMMS MEDIA LTD Sales Department: [email protected] email: [email protected] Administration Department: [email protected] URL: www.connect-world.com All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means elec- tronical, mechanical, photocopying, recording or otherwise, without prior permission from the publishers. The content of this publication is-based on best knowledge and information available at the time of publication. No responsibility for any injury, death, loss, damage or delay, however caused, resulting from the use of the material can be accepted by the publishers or others associated with its preparation. The publishers neither accept responsibility for, nor necessarily agree with, the views expressed by contributors. ISSN 1462-2939 2 n Asia-Pacific II 2012 ALOE Systems Profit Protection and Security for Wholesale VoIP Carriers The VoIP wholesale market is developing fast and has expanded in independent, carriers can benefit from renting the switch to size greatly over the last years. ALOE Systems is a VoIP network other providers. For start-ups, MVTS II is a cost-effective way software vendor that has been in the market for over 10 years. How to enter the VoIP wholesale market is ALOE Systems different from other vendors? The company has • Route quality control - if route quality falls below a certain rich experience of customizing products to meet the needs of a point, the route can be blocked and reconfigured to guarantee particular carrier; however, the key advantage of ALOE Systems is SLA parameters to end clients the company’s unique know-how - Profit Protection. With this feature • Distributed modular architecture of the system allows easy carriers can route traffic literally in any way they want, assuring set scalability of the system and its overall flexibility along with profit margins. high levels of fault tolerance and network redundancy • Integrated prepaid/postpaid billing helps the carriers manage MVTS II is a four-in-one platform for running VoIP wholesale finances more efficiently business, combining switching, routing, billing, and border-control functionality.
Recommended publications
  • Fact Sheet: Designation of Election Infrastructure As Critical Infrastructure
    Fact Sheet: Designation of Election Infrastructure as Critical Infrastructure Consistent with Presidential Policy Directive (PPD) 21, the Secretary of Homeland Security has established Election Infrastructure as a critical infrastructure subsector within the Government Facilities Sector. Election infrastructure includes a diverse set of assets, systems, and networks critical to the administration of the election process. When we use the term “election infrastrucure,” we mean the key parts of the assets, systems, and networks most critical to the security and resilience of the election process, both physical locations and information and communication technology. Specficially, we mean at least the information, capabilities, physical assets, and technologies which enable the registration and validation of voters; the casting, transmission, tabulation, and reporting of votes; and the certification, auditing, and verification of elections. Components of election infrastructure include, but are not limited to: • Physical locations: o Storage facilities, which may be located on public or private property that may be used to store election and voting system infrastructure before Election Day. o Polling places (including early voting locations), which may be physically located on public or private property, and may face physical and cyber threats to their normal operations on Election Day. o Centralized vote tabulation locations, which are used by some states and localities to process absentee and Election Day voting materials. • Information
    [Show full text]
  • May 2017 M&A and Investment Summary
    May 2017 M&A and Investment Summary Table of Contents 1 Overview of Monthly M&A and Investment Activity 3 2 Monthly M&A and Investment Activity by Industry Segment 8 3 Additional Monthly M&A and Investment Activity Data 42 4 About Petsky Prunier 55 Securities offered through Petsky Prunier Securities, LLC, member of FINRA. This M&A and Investment Summary has been prepared by and is being distributed in the United States by Petsky Prunier, a broker dealer registered with the U.S. SEC and a member of FINRA. 2 | M&A and Investment Summary May 2017 M&A and Investment Summary for All Segments Transaction Distribution . A total of 520 deals were announced in May 2017, of which 323 were worth $44.6 billion in aggregate reported value . Software was the most active segment with 189 deals announced — 123 of these transactions reported $10.0 billion in value . Digital Media/Commerce was also active with 117 transactions announced, of which 94 were worth a reported $14.1 billion in value . Strategic buyers announced 203 deals (49 reported $14.9 billion in value) . VC/Growth Capital investors announced 291 transactions (262 reported $15.7 billion in value) . Private Equity investors announced 26 deals during the month (12 reported $13.9 billion in value) May 2017 BUYER/INVESTOR BREAKDOWN Transactions Reported Value Strategic Buyout Venture/Growth Capital # % $MM % # $MM # $MM # $MM Software 189 36% $9,977.8 22% 59 $2,328.8 10 $4,845.0 120 $2,804.0 Digital Media/Commerce 117 23% 14,126.0 32% 36 2,027.4 2 1,500.0 79 10,598.6 Marketing Technology 85
    [Show full text]
  • Registry Operator Monthly Report
    Monthly Report for February 2009 Registry Operator Monthly Report .Jobs February 2009 Employ Media LLC 3029 Prospect Avenue Cleveland, OH 44115 1‐216‐426‐1500 www.goto.jobs 1 Monthly Report for February 2009 This report provides an overview of .jobs TLD activity through the end of the reporting month. The information is primarily presented in table and chart format with text explanations as deemed necessary. Table of Contents 1. Accredited Registrar Status 2. SLA Performance 3. Zone File Activity 4. Major Software Releases 5. WHOIS Service Activity 6. Total Number of Transactions by Sub-Category 7. Daily Transaction Range 8. Per-Registrar Activity 1. Accredited Registrar Status Status No. of Registrars Operational 37 Ramp Up 0 Pre-Ramp Up 0 2. SLA Performance SLR Actual DNS Service Availability 100% Available Name Server Performance Level 100% Available WHOIS Service Availability 100% Available WHOIS Service Performance Level Meets Requirement WHOIS Service Response Time Meets Requirement WHOIS Service Updates At least Daily 3. Zone File Activity This section states the total number of zone file access passwords granted Month-Year Passwords February ‘09 0 2 Monthly Report for February 2009 4. Major Software Releases None 5. WHOIS Service Activity Month-Year Queries February ‘09 89,667 6. Total Number of Transactions By Sub‐Category Transaction Sub-Category February ‘09 Check 1925579 Create 126 Delete 37 Domain Info 6139 Renew 1614 Transfer 15 Update 704 7. Daily Transaction Range Month-Year High Low Average February ‘09 79925 0 69194 3
    [Show full text]
  • Global Phishing Survey: Period July - Trends and Domain December 2011 Name Use in 2H2011
    Global Phishing Survey: Period July - Trends and Domain December 2011 Name Use in 2H2011 Unifying the Global Response To Cybercrime An Published April 2012 APWG Industry An APWG Industry Advisory Advisory1 http://www.apwg.org ● [email protected] PMB 246, 405 Waltham Street, Lexington MA USA 02421 Published April 26, 2012 Authors: Greg Aaron, Afilias <gaaron at afilias.info> and Rod Rasmussen, Internet Identity <rod.rasmussen at internetidentity.com> Research, Analysis Support, and Graphics: Aaron Routt, Internet Identity Table of Contents TABLE OF CONTENTS .......................................................................................................... 2 OVERVIEW ............................................................................................................................ 3 BASIC STATISTICS ................................................................................................................ 3 SHIFTING TARGETS .............................................................................................................. 5 PHISHING BY UPTIME ......................................................................................................... 8 PREVALENCE OF PHISHING BY TOP-LEVEL DOMAIN (TLD) ..................................... 10 COMPROMISED DOMAINS VS. MALICIOUS REGISTRATIONS ................................ 12 REGISTRARS USED FOR MALICIOUS DOMAIN REGISTRATIONS ............................. 13 USE OF SUBDOMAIN SERVICES FOR PHISHING ......................................................... 14 SHARED VIRTUAL
    [Show full text]
  • Name June 2008 Monthly Report
    ICANN Monthly Report for JUNE 2008 Global Name Registry Limited (Company Number – 4076112) Suite K7, Floor 3, Cumbrian House, Meridian Gate, 217 Marsh Wall, London, E14 9FJ. UK. The Global Name Registry, Limited Monthly Operator Report June 2008 As required by the Registry Agreement between the Internet Corporation for Assigned Names and Numbers (“ICANN”) and The Global Name Registry, Limited (“Global Name Registry”) (the “Registry Agreement”), this report provides an overview of Global Name Registry activity through the end of the reporting month. The information is primarily presented in table and chart format with explanations as deemed necessary. Information is provided in the order as set forth in Appendix 4 of the Registry Agreement. 1 – Accredited Registrar Status: June 2008 Table 1 states the number of registrars for whom Global Name Registry has received accreditation notification from ICANN at the end of the reporting month, grouped into the three categories set forth in Table 1. Status # of Registrars Operational Registrars 137 Registrars in Ramp-Up Period 18 Registrars in pre-Ramp-Up Period 341 Total 496 2 – Service Level Agreement Performance: June 2008 Table 2 compares Service Level Agreement (“SLA”) requirements with actual performance for the reporting month. As required by the Registry Agreement, Global Name Registry is committed to provide service levels as specified in Appendix 7 and to comply with the requirements of the SLA in Appendix 10 of the Registry Agreement. The SLA is incorporated into the Global Name Registry Registry/Registrar Agreement that is executed with all operational registrars. Note: The SLA permits two 12-hour windows per year to perform major upgrades.
    [Show full text]
  • Verisign, Inc. Registry Sensitive Information
    Registry Operator’s MONTHLY REPORT .COM/.NET October 2008 Prepared: November 13, 2008 VeriSign, Inc. 21345 Ridgetop Circle Dulles, VA 20166-6503 VeriSign Registry Monthly Report – October 2008 As required by the ICANN/VeriSign Registry Agreements (Section 3.1(c)(iv)), this report provides an overview of VeriSign Registry activity through the end of the reporting month. The information is primarily presented in table and chart format with text explanations as deemed necessary. The information is provided to satisfy requirements listed in Appendix 4 of the .com and .net Registry Agreements. Pursuant to the agreements, “ICANN shall use reasonable commercial efforts to preserve the confidentiality of the information reported until three months after the end of the month to which the report relates". It has been agreed by ICANN that some information required under the .com and .net Registry Agreements, Appendix 4, Item 8 will be provided either quarterly and/or monthly as specified below. Information is organized as follows: 1. Accredited Registrar Status (Appendix 4, Item 1)..................................................................3 Table 1 – Accredited Registrar Status – October 2008.....................................................3 2. Service Level Agreement Performance (Appendix 4, Item 2) ...............................................3 Table 2.1 – .com Service Level Agreement Performance – October 2008 ......................4 Table 2.2 – .net Service Level Agreement Performance – October 2008 ........................4 3.
    [Show full text]
  • ORG-2009-06-01-To-2009-06-30
    ORG - ICANN Transactional Data Monthly Report for 2009-06-01 to 2009-06-30 Registrar Name IANA-ID total-domains total-nameservers net-adds-1-yr net-adds-2-yr net-adds-3-yr net-adds-4-yr net-adds-5-yr net-adds-6-yr net-adds-7-yr net-adds-8-yr net-adds-9-yr net-adds-10-yr net-renews-1-yr net-renews-2-yr Korea Information Certification Authority Inc. 449 924 26 18 000000000 471 Domain Registration Services, Inc. dba dotEarth.com 64 2,271 184 17 700100000 6221 Xin Net Technology Corporation 120 30,292 579 1,889 38 35 1 15 0000280545 Register.com Inc. 9 197,313 5,496 978 205 122 0 66 0000365,217 617 Baronofdomains.com LLC 1161 156 3 8000000000 91 Compuglobalhypermega.com LLC 1170 169 0 13 000000000 70 Gabia Inc. 244 7,021 888 94 35 6020100020844 Enet Registry, Inc. 608 18 1 0000000000 00 HyperStreet.com, Inc. 817 225 0 1000100000 31 DomainMarketPlace.ca Inc. 691 179 0 9000000000 210 R Lee Chambers Co. LLC 475 69 2 0000000000 41 Interdominios, Inc. 818 231 19 9000000000 110 Nordreg AB 638 445 10 4500000000 251 DomainInfo AB 73 4,426 122 0 42 10000000 7237 PrimeDomain.ca Inc. 688 98 0 1000000000 20 NameSecure, L.L.C. 30 26,369 214 295 32 16 0 26 0000567664 Address Creation, LLC 270 603 40 0000000000 182 azprivatez, LLC 1392 12 0 0000000000 00 Omnis Network LLC 143 9,547 351 146 16 7070000327429 http.net Internet GmbH 976 3,340 34 42 0000000002070 ASCIO Technologies, Inc.
    [Show full text]
  • Afilias Limited Monthly Operator Report
    REGISTRY OPERATOR’S REPORT August 2008 Public Interest Registry 1775 Wiehle Avenue, Suite 102A Reston, VA 20190 www.pir.org Public Interest Registry Monthly Report – August 2008 As required by the ICANN/ PIR Registry Agreement (Section 3.1(c)(iv)) this report provides an overview of PIR activity through the end of the reporting month. The information is primarily presented in table and chart format with text explanations as deemed necessary. Information is provided in order as listed in Appendix 4 of the Registry Agreement. Report Index Section 1 Accredited Registrar Status Section 2 Service Level Agreement Performance Section 3 ORG Zone File Access Activity Section 4 Completed SRS/System Software Releases Section 5 WhoIs Service Activity Section 6 Total Number of Transactions by Subcategory by Month Section 7 Daily Transaction Range Copyright © 2004-2008 Public Interest Registry Page 2 of 9 Public Interest Registry Monthly Report – August 2008 Section 1 – Accredited Registrar Status The following table displays the current number and status of the ICANN accredited registrars. The registrars are grouped into three categories: 1. Operational registrars: Those who have authorized access into the system for processing domain name registrations. 2. Registrars in the Ramp-up Period: Those who have received a password to the PIR Operational Test and Evaluation (OT&E) environment. The OT&E environment is provided to allow registrars to develop and test their systems with the PIR Shared Registration System (SRS). 3. Registrars in the Pre-Ramp-up Period: Those who have been sent a welcome letter from PIR, but have not yet executed the Registry Confidentiality Agreement and/or have not yet submitted a completed Registrar Information Sheet.
    [Show full text]
  • Reseller Domain Registration Product Agreement Extension
    RESELLER DOMAIN REGISTRATION PRODUCT AGREEMENT EXTENSION SPARK I/T Services (hereinafter referred to as "Parent") AND you (hereinafter referred to as "Reseller") HAVE entered into a Reseller Master Agreement ("Agreement") effective from July 16, 2014 of which this "Domain Registration Product Agreement Extension" is a part. WHEREAS, Parent is authorized to provide Internet registration and management services for domain names, for the list of TLDs mentioned within APPENDIX 'B'; WHEREAS, the Reseller intends to provide Registration and/or Management and/or Renewal and/or Transfer for the list of TLDs mentioned within APPENDIX 'B' through Parent; WHEREAS, Parent provides Domain Name Privacy Protection Services for a select set of Top Level Domains registered through Parent; WHEREAS, Reseller also intends to provide Domain Name Privacy Protection Services to Customers through Parent; NOW, THEREFORE, for and in consideration of the mutual promises, benefits and covenants contained herein and for other good and valuable consideration, the receipt, adequacy and sufficiency of which are hereby acknowledged, Parent and the Reseller, intending to be legally bound, hereby agree as follows: 1. DEFINITIONS (1) "TLD" refers to .COM, .NET, .ORG, .BIZ, .INFO, .NAME, .US, .IN, .EU, .UK, .TRAVEL, .WS, .COOP, CentralNIC, .MOBI, .ASIA, .ME, .TEL, .MN, .BZ, .CC, .TV, .CN, .NZ, .CO, .CA, .DE, .ES, .AU, .XXX, .RU, .PRO, .SX, .PW, .IN.NET, .CO.DE, .LA, Donuts, .CLUB, .UNO, .MENU and .BUZZ (2) "gTLD" refers to .COM, .NET, .ORG, .BIZ, .INFO, .NAME, .TRAVEL, .COOP, .MOBI, .ASIA, .TEL, .XXX, .PRO, Donuts, .CLUB .UNO, .MENU and .BUZZ (3) "Domain Order" refers to an Order fulfilled by the Reseller through the Parent under this Domain Registration Product Agreement Extension.
    [Show full text]
  • Program Index
    Program Index Welcome .................................................... Page 03 Overview ..................................................... Page 04 Your Hosts ................................................... Page 06 hosting.FAIR ................................................ Page 08 Register ....................................................... Page 10 Attractions / Internet Lounge ....................... Page 12 Site Plan ...................................................... Page 14 VIP Advantages ........................................... Page 16 Emerging Markets ....................................... Page 17 Partners ....................................................... Page 26 Part 1 Agenda Tuesday, March 15th ................................... Page 18 Wednesday, March 16th ............................. Page 20 Thursday, March 17th ................................. Page 24 side.SESSIONS ........................................... Page 26 Part 2 Speakers Enrichment Tracks, March 15th .................. Page 30 Tuesday, March 15th ................................... Page 32 Open-Xchange night.TALK ......................... Page 42 Enrichment Tracks, March 16th .................. Page 46 Wednesday, March 16th ............................. Page 50 Acronis night.TALK ...................................... Page 60 Enrichment Tracks, March 17th .................. Page 64 Thursday, March 17th ................................. Page 68 Social Events .............................................. Page 78 Part 3 Partners Diamond
    [Show full text]
  • Verisign, Inc. Registry Sensitive Information
    Registry Operator’s MONTHLY REPORT COM/NET September 2008 Prepared: October 14, 2008 VeriSign, Inc. 21345 Ridgetop Circle Dulles, VA 20166-6503 VeriSign Registry Monthly Report – September 2008 As required by the ICANN/VeriSign Registry Agreements (Section 3.1(c)(iv)), this report provides an overview of VeriSign Registry activity through the end of the reporting month. The information is primarily presented in table and chart format with text explanations as deemed necessary. The information is provided to satisfy requirements listed in Appendix 4 of the .com and .net Registry Agreements. Pursuant to the agreements, “ICANN shall use reasonable commercial efforts to preserve the confidentiality of the information reported until three months after the end of the month to which the report relates". It has been agreed by ICANN that some information required under the .com and .net Registry Agreements, Appendix 4, Item 8 will be provided either quarterly and/or monthly as specified below. Information is organized as follows: 1. Accredited Registrar Status (Appendix 4, Item 1) .............................................................................. 3 Table 1 – Accredited Registrar Status – September 2008 ................................................3 2. Service Level Agreement Performance (Appendix 4, Item 2)............................................................ 3 Table 2.1 – .com Service Level Agreement Performance – September 2008 ..................4 Table 2.2 – .net Service Level Agreement Performance – September 2008 ....................4
    [Show full text]
  • Miss Group Acquires Hemsida24 & HEYMO BGF-Backed Miss Group
    Miss Group acquires Hemsida24 & HEYMO BGF-backed Miss Group has acquired Hemsida24 along with its sub-brand HEYMO. Hemsida24 is an internet-based sitebuilder for websites and e-commerce and has delivered solutions for small and medium-sized businesses in Scandinavia since 2008. The strategic acquisition consolidates Miss Group’s position as one of the leading web hosting provider for SMB companies in Scandinavia. “I have been following Hemsida24 AB for many years and are impressed by their organic growth and simple and user friendly sitebuilder. With this acquisition we are adding 14 000 paying customers and now exceeds 80 000 customers in Miss Group. Hemsida24 also contributes with an EBITDA of 1 million Euros” said Mattias Kaneteg, founder and CEO at Miss Group Ludvig Granberg, Co-founder & CEO at Hemsida24 added: “When we started Hemsida24 ten years ago I could never imagine that we would have more than 14,000 customers and such a great team. To continue to grow from here Hemsida24 and Heymo needs to be part of something bigger and this is where Miss Group comes in. I’m truly impressed with their expertise in marketing, sales and growth and I’m confident that Hemsida24 and Miss Group will continue to grow into something much larger.” About Miss Group Founded in 2014, Miss Group is an International Web Hosting Group that offers a range of Hosting related services at favorable prices such as Web Hosting, Domain Registration, VPS, Dedicated Servers, Sitebuilder, SSL-Certificate, SEO Tools, Web Security and Domain Management. Miss Hosting is also an ICANN-accredited Domain Name registrar via NameISP.
    [Show full text]