Feeds

Cisco scarfed up the most venture-backed firms over 10 years

Having munchies in the Noughties

Build a business case: developing custom apps

VentureSource, the venture capital service owned by Dow Jones and part of the Fox empire, has put out its rankings of the most acquisitive companies in the past decade, and wouldn't you know it, all of the top ten are in the IT racket.

The VentureSource deal rankings, which you can see here, look at the number of deals that companies do as they eat venture-backed firms, not at the aggregate value of those deals.

If you subscribe to the VentureSource service, you can probably get your hands on that data, although much of the data would have to be based on estimates, since financial details on many deals are not disclosed.

According to VentureSource's survey of a decades' worth deals, Cisco Systems came out on top, with a stunning 48 deals done between 2000 and 2009. IBM had the second-largest appetite for venture-backed firms, snapping up 35 companies, and was followed by Microsoft, with 30, and EMC, with 25.

Oracle, which has made some of the largest acquisitions of public companies in the past decade - PeopleSoft, JD Edwards, WebLogic, and the pending Sun Microsystems - has been no slouch when it comes to buying venture-backed companies, with 23 deals.

Broadcom, Symantec, and Hewlett-Packard did 18 deals each in the past decade, followed by Google with 17 deals and Sun Microsystems with 16. If you add Oracle and Sun numbers together, the combined company bests Big Blue and approaches the acquisitiveness of Cisco.

Despite the awful economy in 2009 and the fact that venture capital was hard to come by and some VCs must have been sorely tempted to cash out, the number of acquisitions involving venture-backed companies was relatively small. Oracle, which topped the 2009 list, did five deals, and EMC came in second, with four deals. Thomson Reuters, IBM, and Google had three deals, and a slew of other vendors - mostly in IT, but some in the medical industry - did two deals. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Ballmer leaves Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Online tat bazaar eBay coughs to YET ANOTHER outage
Web-based flea market struck dumb by size and scale of fail
Amazon takes swipe at PayPal, Square with card reader for mobes
Etailer plans to undercut rivals with low transaction fee offer
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.