Feeds

Cisco mobilizes US Olympics audience

AT&T's network quivers in fear

High performance access to file storage

Cisco is teaming up with US broadcaster NBC to make mobile phone network providers like AT&T squat and receive an HD Olympics video enema.

The network equipment giant said Wednesday it has expanded its partnership with NBC as the broadcaster's official network infrastructure provider for the 2010 Vancouver Olympic Winter Games this February to allow US viewers access play-on-demand video coverage catered to mobile devices.

NBC has exclusive rights to cover Olympics ballyhoo in the US up until London hosts the Summer games in 2012. The peacock network has provided broadband Olympics coverage in past events using a specially designed Cisco network — but this time round will include HD content that can be beamed to handhelds.

"We've done part of this at the Beijing Olympics," Suraj Shetty, veep of Service Provider Marketing at Cisco told El Reg. "Now we're taking it to a whole different level by bringing this sort of experience to all the screens."

NBC also plans to provide athletes with Cisco's Flip video cameras to capture their own "gold, silver, and bronze metal moments" for NBCOlypics.com. To provide for all the video bandwidth streaming out of the games, Cisco will help roll out a media data center and test its Unified Computing system at the International Broadcast Center in Vancouver.

When asked if there's any concern that hundreds of thousands of Americans simultaneously receiving HD video over mobile devices would ravage (already strained) mobile service provider networks over the 17-day event, Shetty said compression should ease much of the bandwidth requirements. He added that whether more viewers will actually tune into the games with a mobile option as opposed to the same sized Olympics audience choosing new was to digest the games is something Cisco will talk about after the games have ended. ®

Clarification

Athletes will only use the Flip cameras in sanctioned areas at the Olympics. See our story here for details.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.