Feeds

Data Domain readies de-duping IPO

Rival Quantum hopes to cash in

Internet Security Threat Report 2014

Storage start-up Data Domain filed a registration statement with the SEC for an initial public offering late Friday.

Data Domain listed a proposed maximum offering of $100m but has not revealed a target share price or share number. It will seek a Nasdaq listing under the ticker DDUP.

The company has found a niche in the storage market with a focus on data de-duplication. The process removes redundant information as data is backed up or archived resulting in decreased capacity requirements.

But recently de-duping market has hotted up, and Data Domain faces some heavy-hitters in the field. Early this year Quantum rolled out its de-duping software borged from the ADIC acquisition. EMC and NetApp also have their foot in the door by eating up de-dupe software houses Avamar and Topio late last year.

Data Domain seems to recognize the adversity it faces. Under "risk factors" its listing warns:

"Many of our current or potential competitors have longer operating histories, greater name recognition, larger customer bases and significantly greater financial, technical, sales, marketing and other resources than we have."

Prior to the filing, Data Domain entered into a cross-licensing agreement with its biggest rival, Quantum. Under the terms of the agreement, Quantum received 390,000 shares of Data Domain stock (valued at approximately $3.3m) in exchange for Data Domain using Quantum's variable length de-dup process in its products.

Data Domain said a cross-patent licensing agreement made in March would prevent the company from asserting existing and future patent rights against Quantum.

The company has been growing rapidly but is yet to turn a profit. Data Domain lists its revenue in 2006 at $46.43m — a large jump from $8.12m the previous year. But Data Domain was still in the red by $4.02m in 2006 (although large an improvement from a $14m net loss in '05). ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.