Article

Quick Takes: Wounded telecoms likely to tank, study finds

Jim Rendon, News Writer

Telecoms' financial troubles may lead to failure

The Meta Group released a report predicting that most telecommunications companies currently under chapter 11 bankruptcy protection will not survive. According to the Stamford, Conn.-based research firm, 65% of companies that have had to restructure will be forced back into bankruptcy again by 2005. As a result, Meta Group recommend that businesses buying telecommunications services should focus on the carriers' financial viability before making a decision.

    Requires Free Membership to View

Meta Group

WAN emulator

Shunra Software announced the release of its IP WAN emulation software. The New York-based WAN simulation company's new Cloud4.0 allows users to test the performance any application or service in an emulation of a point to point WAN, testing for latency, packet loss and jitter and other problems.

Shunra Software

New WAN analyzer

This week, Network Instruments announced the release of a WAN analyzer. This adds to the Minneapolis-based network management company's existing line of protocol analysis and monitoring tools. The entire line allows networks managers to troubleshoot a broad range of network problems from a single console, the company said.

Network Instruments

Embedded wireless

Ember Corp., a Boston, Mass., wireless sensing company, announced this week the release of its EmberNet product suite. The wireless system is designed for remote monitoring and sensing. The company has developed products that use a mesh network that is more resilient than the architecture used by the prevalent short-range wireless standard 802.11b, the company said. The products are designed to work in rugged environments.

Ember

Beefed up wireless security

Interlink Networks announced this week the release of its new wireless security product that adheres to the more stringent 802.1x wireless security standard. The system from the Ann Arbor, Mich.-based security company requires user authentication and it creates unique encryption keys for each user session making the system harder to compromise.

Interlink Networks

 

To include your announcement in Quick Takes, e-mail News Writer Jim Rendon.


Join the conversationComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.