Feeds

Cisco borgs Navini Networks

All-devouring switch firm makes its WiMAX move

Choosing a cloud hosting partner with confidence

Cisco is buying a plot in the WiMAX space with the $330m cash purchase of Navini Networks.

Navini brings a portfolio of "Smart WiMAX" products and technologies, such as subscriber modems, base stations, adaptive antenna arrays and management systems.

WiMAX is a wireless-internet technology with a far greater range than Wi-Fi. Cisco expects it to play a key role in its "Connected Life" vision to bring ubiquitous service to any device over a network. WiMAX also has promise to bring the internet to emerging markets, where little to no network infrastructure exists.

Rumors had been circulating for some time that Cisco was getting serious about making a WiMAX infrastructure acquisition, with Navini among the top choices of likely buys. While the startup lacks the substantial proprietary customer base of some other WiMAX vendors, the acquisition has the potential to give Cisco a headstart in emerging platforms embraced by Navini, such as MIMO, beamforming and mobile IP.

Navini's employees and assets will be consumed into its Wireless Networking Business Unit. The WNBU is currently home to Cisco's Wi-Fi operations, led by the Linksys Wi-Fi portfolio.

Under the agreement, Cisco will pay approximately $330m in cash and assumed options. The deal is expected to close in the second quarter of Cisco's 2008 fiscal year.

For those keeping score, the Navini purchase is acquisition number 124 for Cisco. ®

(An actually informative) Bootnote

Multiple-input and multiple-output (MIMO) is a technology that uses multiple antennas at the transmitter and receiver to improve performance.

Beamforming is a signal processing technique that can increase a receiver's sensitivity in the direction of wanted signals, and decrease the sensitivity in the direction of interference.

Mobile IP allows a mobile device to move from one network to another while maintaining a permanent IP address.

Internet Security Threat Report 2014

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.