News Stay informed about the latest enterprise technology news and product updates.

Conglomeration conga


Whether Sun and IBM ever actually do tie the knot, the M&A craziness will continue.  It’s interesting to parse reactions to this possible deal. For IT shops, there’s angst because some Sun partisans hate IBM and people with religious devotion to IBM won’t touch Sun. If those two data center giants converge, the fear is less competition and higher prices.


VARs are acutely interested in this because a vendor they may have been selling against may soon magically morph into their vendor.  This raises interesting channel conflict issues. Despite its well-documented troubles, Sun has gotten good reviews for its channel management by a handful of its elite partners. They’re not eager to be thrown into the IBM pot.



Many VARs and others see more buyouts on the horizon. Some cite Cisco’s bold move into servers—where it will compete with former best buds like Hewlett-Packard—as a motivating factor for those companies to bulk up.


Oracle is (or was) on the hunt for Virtual Iron and whatever other company ain’t nailed down. Nearly everyone seem to be circling VMware, which is still majority owned by EMC. And some even see EMC as a possible buyout candidate. HP, no slouch when it comes to buying companies, has been awfully tight with EMC lately. Illuminata’s Gordon Haff said HP and EMC have been so cozy lately they should “get a room.”


Don’t know about that, but with the economy as it is, and small companies struggling for survival, wait for more buyouts by the big boys in tech.


Join the conversation


Send me notifications when other members comment.

Please create a username to comment.

The military-industrial complex seems so vulnerable. Is an unhackable system connected to the Internet even possible?
Every system is hackable. Only requirement is time available. Every secret has a life. A time expired secret has no value. If the technical secret or innovation can be protected with in its useful life then the security has been ensured. It is a question of cost and benefit. All machines can be hacked provided time is available> stand alone machines can also be hacked!
Possible make the admin account password long and complicated enough Monitor all incoming network traffic to the administrative files monitor local file changes especially ones that have commands validate all user input s guaranteed to be safe
this sounds really ominous #hackers
As long as there is a human component of our systems, nothing will be "unhackable" - for example, does the phrase Social Engineering ring any bells?
When companies get large it is hard to manage the details. Taking care of the details is what prevents someone from being hacked. The other part is human factors - humans want to minimize the number details to get their tasks done including disciplined use of computer resources.