Feeds

HPcom spells 'IT disaster,' says UK firm

Save the 3Com customers foundation

HP ProLiant Gen8: Integrated lifecycle automation

A UK-based IT service company is warning that HP's acquisition of 3com could "spell IT disaster" for existing 3com customers.

Comtek Network Systems, self-described as "Europe's Largest IT Hardware Repair Service," issued a media alert Thursday to sound the alarm. According to the release, many of 3com's products could be orphaned by the $2.7bn acquisition.

As explained by Comtek CEO Askar Sheibani: "When two major tech companies become one, it generally spells good news from an R&D perspective, but disaster for many of the companies' existing customers."

Sheibani fears that service and support for 3com products will be withdrawn due to significant overlap in the two company's offerings: "IT companies like HP don't want to support multiple products that serve the same purpose," he writes, "which means in the event of an acquisition, some product lines invariably get the axe, leaving those customers facing great pressure to replace their IT equipment, irrespective of its condition or whether there is a genuine need to upgrade."

The alert urges HP to be "as transparent as possible" about its plans for 3com products. HP, Comtek advises, should give customers ample notice of product discontinuances so that the affected customers have plenty of time to enter into service agreements with third-part service and repair companies.

Such as Comtek.

But Sheibani doesn't appear hopeful that his advice will be followed. "Unfortunately," he writes, "too many large IT vendors crave absolute power over their customers - if they don't want customers to use a particular product, they'll withdraw support, withhold technical information and generally make it as difficult as possible for anyone to repair the equipment in question."

Sheibani, of course, is issuing his alert with more than a dollop of self-interest - but he has a point.

HP will almost certainly use its clout to expand its product line into areas where 3com is strong. Sheibani specifically mentions China as one possible target. When they do, both 3com's current customers and the third-party service centers that help them maintain and repair their 3com equipment deserve HP's continuing provision of - at minimum - necessary technical info.

As Sheibani puts it: "We hope that in this case, HP will look to respect the wishes of 3Com customers and help them to make IT decisions that best suit their own specific business needs, rather than bullying everyone into an unnecessary equipment upgrade." ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.