Feeds

Cisco borgs Navini Networks

All-devouring switch firm makes its WiMAX move

Internet Security Threat Report 2014

Cisco is buying a plot in the WiMAX space with the $330m cash purchase of Navini Networks.

Navini brings a portfolio of "Smart WiMAX" products and technologies, such as subscriber modems, base stations, adaptive antenna arrays and management systems.

WiMAX is a wireless-internet technology with a far greater range than Wi-Fi. Cisco expects it to play a key role in its "Connected Life" vision to bring ubiquitous service to any device over a network. WiMAX also has promise to bring the internet to emerging markets, where little to no network infrastructure exists.

Rumors had been circulating for some time that Cisco was getting serious about making a WiMAX infrastructure acquisition, with Navini among the top choices of likely buys. While the startup lacks the substantial proprietary customer base of some other WiMAX vendors, the acquisition has the potential to give Cisco a headstart in emerging platforms embraced by Navini, such as MIMO, beamforming and mobile IP.

Navini's employees and assets will be consumed into its Wireless Networking Business Unit. The WNBU is currently home to Cisco's Wi-Fi operations, led by the Linksys Wi-Fi portfolio.

Under the agreement, Cisco will pay approximately $330m in cash and assumed options. The deal is expected to close in the second quarter of Cisco's 2008 fiscal year.

For those keeping score, the Navini purchase is acquisition number 124 for Cisco. ®

(An actually informative) Bootnote

Multiple-input and multiple-output (MIMO) is a technology that uses multiple antennas at the transmitter and receiver to improve performance.

Beamforming is a signal processing technique that can increase a receiver's sensitivity in the direction of wanted signals, and decrease the sensitivity in the direction of interference.

Mobile IP allows a mobile device to move from one network to another while maintaining a permanent IP address.

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.