Feeds

HP throws scandal-dogged Peregrine a future

$425m buy-out

High performance access to file storage

"If the corporate culture is so infected with problems that they have not yet been solved and if they are selling a product that is suspect on its face, then maybe society is better off if Peregrine Systems is laid to rest." So wrote Penn State ethics professor J Edward Katz last December, in one of the most damning judgments ever passed on a software company.

Today Peregrine's future is looking a lot brighter, after its management agreed to a $425 million acquisition by Hewlett Packard.

Peregrine hit the headlines three years ago, and eleven officials were eventually indicted on fraud and conspiracy charges including its CEO and CFO were eventually indicted on fraud and conspiracy charges by the Securities and Exchange Commission and the DoJ. The company filed for Chapter 11 bankruptcy protection in 2002, and was obliged to restate earnings for 2000, 2001 and the first three quarters of 2002. Peregrine admitted it had exaggerated earnings by over $500 million.

"Peregrine management engaged in a myriad of deceptive sales and accounting practices to create the illusion of growth, including secretly adding material sales contingencies to what appeared on heir face to be binding contracts," SEC officials discovered.

Peregrine's external auditor at Arthur Andersen was also indicted for conspiring with the management.

HP is paying a considerable premium for Peregrine: the cash deal values the software house at 36 per cent more than its public stock market valuation.

Professor Katz was prompted to write by an October SEC filing by Peregrine which admitted its internal controls were still ineffective - a warning that Peregrine still makes today. In its most recent recorded quarter (ending March) Peregrine lost $8.4 million on sales of $47.7 million.

VP Ann Livermore explained that HP will integrate Peregrine's asset management and service management software into its OpenView suite.

HP also announced its intention to acquire 130-strong storage software company AppIQ for an undisclosed sum today. ®

High performance access to file storage

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.