Cisco Blogs


Cisco Blog > Analyst Relations

Cisco completes acquisition of NDS

July 31, 2012 at 5:40 am PST

Cisco today announced it has completed the acquisition of NDS Group Ltd., a leading provider of video software and content security solutions that enable service providers and media companies to securely deliver and monetize new video experiences. NDS, which has approximately 5,000 employees, will become part of Cisco’s Service Provider Video Technology Group (SPVTG), led by Senior Vice President and General Manager Jesper Andersen.

While much has been written about this acquisition since it was announced, there’s plenty of exciting news yet to come. Over the next several months, we will begin to discuss with the industry analyst community the full impact of what it means to put together two market leaders. By combining the strengths of both companies, we have a unique opportunity to serve stakeholder across the video entertainment industry. Stay tuned for more information.

To read the full release, click here. To read Jesper Andersen’s take on the transaction, click here.

Tags: , , ,

Cyberspace – What is it?

Today, the word “cyberspace” is used in many contexts, but it is not always clear what exactly that term describes and what it means. In this post we will compare the definitions of cyberspace from several sources with the purpose of establishing a range of notions as to what cyberspace is and to derive its ontology. Sources are relevant entities like national or regional government, standardization bodies, and dictionary.

The reason why the term “cyberspace” is chosen is that all other terms (e.g., cyber security, cybercrime, cyberwar, cyberterrorism, etc.) are based on, or derived from, cyberspace itself. Therefore, cyber security is security of cyberspace. Cybercrime is crime committed within cyberspace or where elements from/of cyberspace are used as a vehicle to commit a crime, and so on for other derived terms.

Read More »

Tags: ,

Myth vs. Reality: Top “Future” Techs from This Summer’s Blockbusters

Each new innovative technology ups the ante for the next along with our expectations for performance. In fact, I’m reminded of a Louis CK piece from a couple years ago that captures this sentiment exactly. Because of these raised expectations, Hollywood has pushed to up the ante for special effects in movies—to leave any sense of the mundane in the dust. However, when taking a look at this summer’s biggest blockbusters, it seems that reality is quickly catching up to the silver screen’s science fiction and fantasy.

Read More »

Tags: , ,

Can BYOD Be Simple, Affordable, and Secure for the Medium-Business?

Do you have an iPhone,  Android, Samsung , or any other mobile phone? Not surprising since there will be 15 billion networked devices by 20151. With employees (yes, even IT themselves) bringing their mobile phones to work, businesses are seeing at least a doubling of mobile devices per employee; from laptop-only to laptop + mobile phone (+ tablet)2.

The IT department is faced with an increased burden on their existing wireless network, while securing email access from any platform and simultaneously ensuring an optimal, reliable user mobile experience. Offering a reliable, consistent user mobile experience used to be a luxury ask; today, it impacts employee productivity. Mobile employee productivity can range from wireless laptop access from conference rooms to roaming the within the building accessing corporate email from any mobile device. This is true for me (working at a large enterprise) and my husband (working at a medium-sized business).

Read More »

Tags: , , , , , , , , , , , , , , ,

Observations from HIPAA Conference – Time to Act?

On June 6-7, the National Institute of Standards and Technology (NIST) co-hosted a conference focused on HIPAA, the foundational U.S. health care information law. I attended the conference and came away with the sense that a) health care entities have begun to see clarity in the things they must do from an IT perspective to abide by the law’s requirement to protect patient information and b) they are motivated to do so through Federal moves to enforce the law.

The links between vague laws and concrete technical requirements to support them are usually ambiguous because the laws are written by non-technical lawyers and they often turn over implementation details to government departments.

Read More »

Tags: , ,