Feeds

Network Technology acquires Madge assets

Becomes Lord of the Token Rings

Internet Security Threat Report 2014

Network Technology PLC said today it has bought certain assets of Maidenhead, Berkshire, firm Madge Limited from the receivers.

Network Technology said it has acquired the rights and copyright to Madge’s products, brand and website, as well as the remaining inventory. The assets will be absorbed by Network Technology subsidiary Ringdale Limited, making it the world's largest supplier of Token Ring technology.

The company hopes to provide a seamless transition for remaining Token Ring customers, as well as aiming to transfer them to newer technologies. Network Technology estimates Token Ring's installed base at 15m nodes.

In a statement, Network Technology said: “Madge’s customers will be able to benefit from Ringdale’s consultancy expertise in advising on the transfer to the latest networking technology.”

Despite being a technically superior technology, Token Ring has been unable to withstand the rise of ethernet, and new investment in it is rare. ®

Internet Security Threat Report 2014

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.