Feeds

Lucent unveils IP strategy targeted at telcos

Plays catch-up on Cisco, Juniper

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Lucent Technologies has revamped its range of carrier-grade networking kit in an attempt to make it easier for service providers to provide value-added Internet services for businesses.

Last week, Lucent announced plans to cut 16,000 jobs worldwide in an effort to save $2 billion and turnaround its business through a seven-point restructuring plan, which may include pruning its product portfolio. Announcement of the job cuts came when it announced a first quarter net loss of $395 million on sales of $5.84 billion.

Despite a slowdown in demand in the telecommunications market of late, largely caused by reorganisation among US telcos, Lucent has high hopes for growth in this area.

Today it introduced the Spring Tide 7000, an extension of its 5000 switch, which can handle 192,000 concurrent users sessions instead of 64,000. According to Lucent, the main differentiator for the product compared to Nortel, Cisco and Juniper who are also active in this market, is the ability to support Virtual Private Networks (VPNs) over MPLS (Multi Protocol Label Switching). In other words it allows a telco's customer to easily set up encrypted sessions over networks which are optimised for high-speed delivery of traffic.

This is not much of an edge, particularly when you consider Cisco's had MPLS technology for at least two years and with Juniper Networks, and Nortel Networks, has already staked out its territory in the telco space - leaving slim pickings for an old-world product manufacturer like Lucent.

Lucent's revamped IP strategy, which draws heavily on technology acquired from last years $1.3 billion purchase of start-up Spring Tide Networks and its $20 billion buy-up of Ascend Communications in 1999, doesn't appear to move it from reliance on older technologies fast enough. ®

Related Stories

Lucent to restate sales and cut 10,000 jobs

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.