Feeds

Who is on EMC's shopping list?

The software challenge

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

The stock markets of the world are still suffering as the majority of technology related share prices continue to trade at extremely low values. However, there are still organisations around who have cash sitting in the bank, and with interest rates for savings at near record lows, speculation is rife that this summer will witness a rash of takeovers, buyouts and mergers. Last week, storage heavyweight EMC became the latest company to openly discuss acquiring companies in order to drive up its margins.

EMC, along with many IT vendors, has struggled over the last twelve months to maintain its revenue streams and keep making money. The company has lead the storage hardware market in many key areas for much of the recent past but over the last year has seen its major competitors, such as IBM and Hitachi Data Systems, become increasingly competitive.

At the same time, end users have started to search for management tools to help in the ever-growing task of administering heterogeneous storage infrastructures. All of the storage vendors have reacted to this challenge and have announced plans to create sophisticated management structures capable of running across multiple storage platforms.

EMC has stated that its development plans require it to make thirty percent of its revenue from software. At a meeting last week in the US, EMC's CEO Joe Tucci stated that in order to reach this ambitious target the company would be looking to acquire a number of software companies. It is estimated by some analysts that EMC may have a war chest of way over a billion dollars at its disposal.

As might be expected, Tucci did not give away any details on potential acquisition targets but did mention that data replication and mobility along with 'monitoring' were areas in which the company was keen to expand its capabilities. He said: "If you look where the highest growth areas in software are, backup grew about nineteen percent, monitoring up about thirty percent and replication up about thirty-five percent. You can expect us to go after one of those high growth areas."

EMC is still heavily promoting the AutoIS storage management architecture as a way for organisations to manage their heterogeneous storage systems and is investing significant Research and Development money into the project. It will be an interesting spectacle to witness how the parallel software 'acquire' and 'develop' tracks evolve and to watch the reactions of the market.

The software challenge will clearly modify the way that EMC operates and sells its services.

© IT-Analysis.com.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.