Feeds

Intel re-opens wallet – rapacious moths fly out

Buys another company as IXA mycelium spreads

  • alert
  • submit to reddit

Bridging the IT gap between rising business demands and ageing tools

Another piece of the complex jigsaw puzzle that Intel is using to build its IXA networking strategy has snapped into place. The firm said late yesterday it had opened its wallet and paid cash for a telephony solutions firm Picazo Comms, which will be used to bolster it and its Dialogic subsidiary. Intel said that the acquisition of Picazo will supply intellectual property, sales skills and engineers to the CT Media server software it is developing. The IXA jigsaw that Intel is putting together is part of a complex plan to create so called "building blocks" for the Internet, with lucrative telco and other infrastructure providers using its knowhow to build the networks of the future. CT Media will focus on the converging voice and data media market, but it's not just all about software. On the back of this initiative Intel hopes to sell servers and goodness knows what sort of other widgets, as it uses its deep pockets to diversify its business away from being just a microprocessor company. Pizaco, based in San Jose, will be merged into Intel's rapidly growing Communications Product Group. Although it is thrifty with its money, Intel is prepared to open its wallet and release rapacious killer vampire moths to stake its future claim in Internet infrastructure. If you want to download all the current pieces of the IXA jigsaw and see which of those pesky blue bits are missing, you can get a heap of Adobe PDF files from this Intel place. ® Related Stories Analysis: Intel's cunning network plan Intel mycelium: the spores bud Intel acquires another firm as IXA mycelium spreads

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.