Feeds

RIM, Juniper, and VMware on Oracle's Borg 14 list

Post-Sun blockbuster deals foretold

Top 5 reasons to deploy VMware with Tegile

What connects Research in Motion, VMware and Juniper Networks?

They're on a list of 14 companies Larry Ellison's M&A behemoth Oracle could Borg next, according to Software Advice - a company that claims to match software buyers to the right products.

Crazy thinking? The 14 companies do, after all, lie just outside of Oracle's traditional enterprise software market.

But then, so did Sun Microsystems. That was a deal that took Oracle from the familiar world of digesting rival software providers like PeopleSoft and BEA Systems and into server and storage hardware.

Software Advice has said it's no longer so crazy to think in such narrow terms and the road to similar blockbuster deals lies wide open.

The company has grouped its 14 into four categories of deal: fairly straightforward, messy but potentially profitable, bold moves into the network layer, and pricey buys in hot markets.

Virtualization giant VMware is in pricey but hot along with Ellison-investment Salesforce.com, Juniper and RIM would be a bold move taking Oracle into the network – not so crazy when you consider network giant Cisco Systems moved into servers with its Unified Communications Server.

Messy but profitable could see Oracle buy Computer Associates but if Larry's got enough on his plate, and – that's OK, we understand – Tibco or Teradata would count as "straightforward".

According to Software Advice, these companies meet four criteria: they lead in an enterprise technology market, they are relevant to Oracle's stack, and satisfy on financial performance and valuation in relation to Oracle's size.

Off the list are SAP and IBM - two companies Larry fixates on - Hewlett-Packard and Cisco. They are considered too big, although it is worth noting Microsoft and SAP discussed a potential merger in 2003, proving size might not prove a barrier for some with ambitious thinking.

Software Advice has invited you to vote on which of the 14 you think Larry will assimilate next, here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.