Feeds

Sprint eyes T-Mobile, grabs $32 BEELLION from wallet, prepares to SLURP

Values wireless carrier at around $40 a share

Top 5 reasons to deploy VMware with Tegile

The question - not if - but when Sprint would snap up T-Mobile in the US moved one step closer to reality today, after the wireless carrier was reportedly valued at nearly $40 a share.

T-Mobile, according to the Wall Street Journal, has been valued at around $32bn. A merger could be agreed within weeks, people familiar with the matter told the newspaper.

Such an acquisition would consolidate the market, where Sprint and T-Mobile are the third and fourth biggest US mobile carriers behind Verizon Communications and AT&T.

But it's unlikely that such a huge takeover would swerve regulatory scrutiny stateside.

Apparently, insiders have told the WSJ that T-Mobile being wedded to Sprint was a "long-term survival" tactic.

The companies are understood to want to join forces to compete with AT&T and Verizon for spectrum, after the Federal Communications Commission relaxed plans to bar the country's largest carriers from bidding to swallow big gulps of airwaves. ®

Internet Security Threat Report 2014

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.