Feeds

Cisco snaps up Linksys in home networking assault

Stake in ground

  • alert
  • submit to reddit

High performance access to file storage

Cisco Systems has made a major expansion into the home networking market with the acquisition today of Linksys in a $500 million all stock deal.

Linksys makes a broad line of broadband access and wireless LAN products targeted at consumers and SOHO (small office/home office) users.

Cisco said the acquisition represents its entry into the consumer/SOHO networking market, which is expected to grow from $3.7 billion in 2002 to $7.5 billion in 2006 worldwide, according to research from Dell'Oro Group and Synergy.

Under the terms of the agreement, Cisco will issue common stock with an aggregate value of approximately $500 million to acquire the Linksys business and to assume all outstanding employee stock options. Privately-held Linksys has 308 employees.

The acquisition of Linksys (which has been approved by the board of directors of each company) is expected to close in the fourth quarter of Cisco's fiscal year 2003.

Upon closing of the acquisition, Linksys' business will operate as a division of Cisco but its products will continue to be sold under the Linksys brand through its existing retail, distributor and ecommerce channels. In addition, Linksys gains access to Cisco's sales force.

Linksys' product line for home networking, includes more than 70 products including wireless routers and access points for simultaneous sharing of broadband Internet connections, wireless network adapters and wireless print servers. It also includes traditional wired products such as Ethernet routers and cable modems, unmanaged switches and hubs, print servers and network attached storage for easy sharing of digital music, photo and video media files.

Cisco executives praised the easy-to-use features of the Linksys product line and talked of creating "next-generation home networking solutions".

We're not sure what this means. Cisco's statementon the acquisition doesn't say either.

Along with the usual marketing blurb Cisco's statement talks about typical home networking applications such as "sharing broadband Internet connection among several users", "interconnecting computers to share files such as photos, music" and "sharing resources" over either wired or wireless networks.

Which is nice. ®

High performance access to file storage

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.