Feeds

Cisco double drops with second social network buy

Burning cash festival

High performance access to file storage

Cisco tossed the market another curve ball over the weekend, when it swooped on Utah Street Networks, the San Francisco-based outfit behind soap dodger-friendly social network Tribe.net.

The deal has baffled many. The New York Times broke the "curious" story on Saturday. Tribe.net is not one of Cisco's "select" cuts which, without disclosing terms, the firm confimed it had bought this morning.

The Utah Street Networks seven-strong team's flagship Tribe.net product has seen its popularity wane as the social networking scene matures and consolidates. It's now mostly used by West Coast alternative types to arrange car shares for the Burning Man festival in the Nevada desert - not a target constituency for most advertisers.

Cisco isn't the first big boy to have a snatch at Tribe.net's undercarriage. NBC was reportedly close to a deal to buy Utah Street Networks technology in July last year, but never consummated the union.

Questions still abound as to what Cisco stands to gain from Utah Street Networks' platform. The booming IP networking banana republic already bought into social networking once this year with the acquistion of Five Across, which Cisco aims to use to provide CIOs at big business customers with proof they're still racing down the information super highway...or something. IBM is doing something similar with Lotusphere.

Once absorbed, both the Five Across and Utah software teams will report to Cisco Media Solutions Group chief Dan Scheinman, but the synergies between the two are far from clear. Social networking business watcher Pete Cashmore asks at Mashable: "Is Tribe’s tech even compatible with that of Five Across?"

One left field possibility is that the survivors of the Tribe.net bunch will focus on providing social networking infrastructure for Cisco's TV effort; the emphasis in today's announcement is towards "digital media content owners". Tacking social networking onto its Scientific-Atlanta set-top box business could send a lot of traffic over Cisco's routers and switches, in theory. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.