Feeds

EMC boosts revenues 20% in Q3

Storage slugger reports kick-ass results

Internet Security Threat Report 2014

EMC is experiencing storming business results with 20 per cent revenue growth and a 58 per cent rise in profits in its third 2010 quarter.

Total revenues came in at $4.21bn, while net income was $472.5m. On a non-GAAP basis, net income was $649.4m, up 35 per cent on the year.

There was 23 per cent year-on-year growth in Symmetrix revenues and 22 per cent growth in what EMC calls its mid-tier portfolio, comprising CLARiiON, Celerra, Centera, Data Domain, Avamar and Atmos. This is such a mixed bag of products that one or two might not have actually grown at 22 per cent, particularly given Data Domain's habit of growing faster than that.

Stifel Nicolaus analyst Aaron Rakers said EMC reported mid-tier growth of 33 per cent year-on-year in its second 2010 quarter. He estimated $175m of that was Data Domain revenue, implying only seven per cent growth for the other products in the mid-tier. EMC would have had to do something dramatic to get that seven per cent up to the 20- 22 per cent level in its third quarter.

VMware revenues just flew, increasing 46 per cent. The RSA business also grew strongly, registering a 22 per cent increase on the year-ago quarter. It seems likely that the Content Management business under-performed by these standards as EMC did not spell out its double-digit growth or any other growth number.

Rakers said EMC's information storage business revenues on their own increased 16 per cent compared to the third quarter of 2009. The overall gross margin of 60.5 per cent was 3.2 per cent higher than a year ago.

CFO David Goulden said EMC increased market share and profitability. He mentioned that North American revenues increased 21 per cent. Outside America the Latin America region grew revenues by 23 percent, Asia Pacific by 28 per cent with Europe, the Middle East and Africa lagging behind at a mere 14 per cent.

So VMware carries on rocketing up, Symmetrix is enjoying the V-Max effect; the mid-range is growing overall, although there might be a dog or two hidden behind the successful Data Domain beast; RSA is growing well and so is everywhere on Earth, except EMEA. ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.