NTT DOCOMO plans to acquire PacketVideo Corporation, a company that develops multimedia software for mobile phones, the Japanese mobile operator said on Monday. NTT DOCOMO plans to acquire PacketVideo Corporation, a company that develops multimedia software for mobile phones, the Japanese mobile operator said on Monday.On Monday, DOCOMO reached an agreement to acquire the remaining 65 percent of PacketVideo from NextWave Wireless for US$111.6 million. DOCOMO already owns a 35 percent stake in PacketVideo, which it bought from NextWave in July 2009. Today, mobile operators are under pressure to find new ways to make money. DOCOMO plans to use PacketVideo’s technology, which is a software family called Twonky, to develop services that connect users’ mobile handsets with home electronic products to remotely share content, it said in a statement.For example, TwonkyServer Mobile works with Android-based smartphones and lets users share music, photos and video content stored on the phone. Twonky has been shipped and bundled on more than three million products, PacketVideo said in June. If the acquisition is approved, which DOCOMO hopes will happen by the end of September, PacketVideo will become a wholly owned subsidiary of DOCOMO. Besides DOCOMO, PacketVideo’s list of customers includes Verizon Wireless, T-Mobile and Orange. The company was founded in 1998 and has about 400 employees. Send news tips and comments to mikael_ricknas@idg.com Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe