Feeds

Invisible Networks confirms restructuring

'Changing demands of projects' to blame for job cuts

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Invisible Networks - the Cambridge-based wireless networks outfit that helps bring broadband to rural areas - claims it was forced to lay-off staff because of the "changing demands of projects" it was working on.

In a statement issued on Friday, the company said that the restructuring has enabled it to "refocus its expertise" and that it is now in a "strong position to grow and move forward in a fast-expanding industry".

And in a bid to reassure its existing punters the company said: "Existing networks will not be affected by the restructuring, with the 3 networks of the Cambridge Ring continuing in to be supported and incremental growth to these networks in areas where it is cost-effective to build."

The Register reported last week that Invisible Networks had made a number of people redundant.

According to sources, around 22 people worked at the company before the redundancies. Now there are just a dozen or so. ®

Related Stories

Invisible Networks confirms job losses

Internet Security Threat Report 2014

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.