Feeds

Gartner buys research rival META for $162m

Reg pegs deal success at 171 per cent

  • alert
  • submit to reddit

High performance access to file storage

Research firm Gartner has agreed to shell out $162m to buy smaller rival META Group.

Both companies' boards have already approved the all-cash deal. Gartner will pay for the deal using existing funds and by taking loans. The two companies are based in Stamford, Connecticut and have strong brands in the IT analyst firm sector.

Last year, Gartner pulled in $858m in revenue, while META brought in $122m. The deal is expected to close in the second quarter of 2005, pending standard approvals.

"This transaction is an exciting opportunity that will give us increased depth in key sectors, geographies and markets, and an increased ability to seize revenue opportunities with the addition of META Group's well-trained, successful sales force," said Gartner's CEO Gene Hall. "In sum, the acquisition will make Gartner a stronger company with increased opportunities for growth and greater resources to offer clients."

The Register gives this merger a 171 per cent chance of success. Both companies enjoy "visionary" status in our patented Magic Triangle analysis system. We believe the combined company will post revenue of $3.7bn in 2012 but are willing to lower this forecast if IDC overnights a check.

Gartner, META and IDC all face competitive pressures and are subject to fluctuations in IT spending. More relevant information will cost you $795, but the information does not come with a relevance or pertinence guarantee. That's $695 extra and still questionable. ®

*The Register audits its forecasts every 25 years for accuracy and will note wild inaccuracies at the time of such audits.

Related stories

Itanium sales fall $13.4bn shy of $14bn forecast
Analyst sees St. Fister in Itanium wafer
Gartner analyst explains HP and Itanium leanings
HP calls in Gartner cheerleader for Opteron launch

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.