Feeds

Emulex says Broadcom unfit to take it over

Alleged cokehound ex-CEO allegedly still influential

Beginner's guide to SSL certificates

Emulex has filed a law suit alleging that Broadcom is unfit to take it over because a still influential former Broadcom CEO faces federal drug charges.

Emulex is citing the charges in an application for an injunction to prevent the takeover.

Broadcom is trying to take over Emulex with a $9.25/share $764m offer. It wants to gain access to Fibre Channel over Ethernet (FCoE) technology which applies to server adapters (CNAs) and to Ethernet switches. The data centre market is consolidating onto Ethernet as the fundamental networking transport. Emulex is one of three Fibre Channel networking companies with FCoE technology in active development, the others being Brocade and QLogic.

The lawsuit was filed in California's Orange County Superior Court on Friday 29th May with case number 30-2009-00123829-CU-BT-CJC.

According to the Wall Street Journal, Broadcom co-founder and ex-CEO Henry T. Nicholas III faces federal drug-taking charges and sex-lair-related lawsuits. Lurid aspects of the allegations have been aired, including cocaine and Ecstasy addiction and an obsession with prostitutes.

Emulex' court filing says Nicholas is still very influential at Broadcom and was involved in hiring the current CEO, Scott McGregor, who joined Broadcom in 2005. Nicholas left Broadcom in 2003. Another Broadcom co-founder, Henry Samueli, is accused with Williams in the backdating of stock options. He has pleaded guilty and sentencing is awaited.

Emulex says Broadcom is not an honest enterprise, because it has not revealed this pertinent information. They suggest that fraud and permanent injury to Emulex may be the outcome if the takeover is successful.

The WSJ quotes a Broadcom response to this suit which talks of mud-slinging and scorched earth tactics, and the assertion that none of this is relevant to the takeover offer.

It now looks less likely that Emulex wants Broadcom to come back with a better takeover offer. Each side's senior management antipathy to the other has just been raised way beyond the level at which post-takeover co-operation is possible. This lawsuit could be considered a contested takeover ritual, and not to be considered personal at all.

On the other hand, accusing the company behind a takeover of being influenced behind the scenes by a stock options-backdating cokehound and sex addict seems to go slightly beyond the normal bounds of acceptable corporate critical behaviour. ®

Intelligent flash storage arrays

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.