Feeds

Novell mulls hedge fund takeover

Send in the bankers and lawyers

Mobile application security vulnerability report

Commercial Linux distro and systems software maker Novell said last night, after it had received a takeover deal from a New York hedge fund named Elliott Associates to take Novell private, that it would put out a statement about the proposal. It took nearly four hours to come up with the statement, and the wonder is why.

Here's what Novell said:

Novell, Inc. today confirmed that it has received an unsolicited, conditional proposal from Elliott Associates, L.P. to acquire the Company for $5.75 per share in cash. Novell anticipates that its Board of Directors will review Elliott's proposal in consultation with its financial and legal advisors. J.P. Morgan is serving as financial advisor and Skadden, Arps, Slate, Meagher & Flom LLP is acting as legal counsel to Novell.

As El Reg explained yesterday, when the deal was announced in the wake of Wall Street shutting down trading for the day, the $5.75 per share deal represents a 21 per cent premium over the closing price of $4.75 per share for Novell's stock immediately before the deal was announced.

But when you do the math and take into account the $991.3m in cash and investments that Novell has on hand, what Elliott is really proposing is to take possession of Novell for about $940m, which would pay for the 91.5 per cent of the company that Elliott does not already own itself or control through affiliates. (Elliott said in its takeover proposal to Novell's board that it started buying up shares on January 5 and had amassed an 8.5 per cent stake in the company already.)

In trading this morning, Novell's shares are up 29 per cent to $6.12 a pop, which would seem to imply that Wall Street expects a sweeter bid to be required for a deal to get done, and possibly other suitors to show an interest.

Elliott's move to acquire Novell could set off a bidding war for the firm, with IBM and Citrix Systems potentially joining in, and maybe even application software maker SAP. IBM could use its own Linux distro and x64 hypervisor as well as the systems management and identity management tools that Novell has taken possession of over the years, and it knows how to ride down a legacy software business like NetWare.

Citrix Systems could use its own Linux distro and some of the physical and virtual server management tools Novell has, too. And SAP, which needs to compete with Oracle with a complete stack of software could also make good use of SUSE Linux and start weaving together a software stack of its own that runs on x64, Power, Itanium, and mainframe iron. ®

The Essential Guide to IT Transformation

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.