Feeds

Dell nabs HP notebook exec

HP counters with Gateway ex

  • alert
  • submit to reddit

Dell has poached a longtime Compaq/HP PC executive in a bid to boost its notebook and consumer electronics divisions.

Alex Gruzen resigned from HP on Monday, leaving his post as SVP of the mobile computing global business unit. In Round Rock, he will head up Dell's strong notebook business and oversee Dell's fledgling effort in the consumer electronics market where it sells TVs and MP3 players among other things. Gruzen had served HP and Compaq for a total of eight years.

HP spokespeople were quoted in numerous publications saying the company "had taken steps to protect our confidential information." While it's unclear what this means, it can be assumed that Gruzen's mind has been erased of all iPod rebadging techniques and the location of HP's Asian design teams, expect in those cases where the design teams also work for Dell.

Shortly after word of Gruzen's departure broke, HP said that it has hired T. Scott Edwards to be SVP of consumer marketing. Edwards previously worked as an EVP at Gateway but left after it purchased eMachines. ®

Related stories

Dell offers 64-bit Pentium 4 workstations
UK resellers go for growth
Euro notebook sales slowdown signals end of boom
HP extends PDA lead

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.