Feeds

Autonomy to HP: bollocks

‘We have been ambushed’

Seven Steps to Software Security

The HP-Autonomy spat has, predictably, turned into a high-profile slanging match, with Autonomy founder Mike Lynch firing back at Meg Whitman via the Wall Street Journal.

Hewlett-Packard has sensationally written down the value of the software company it acquired last year by nearly $US9 billion, and blamed Autonomy for “misrepresenting” its value during the Leo Apotheker-era $US10.7 billion acquisition.

Lynch’s furious response is that he and the other former owners of Autonomy have been “ambushed”. In the question-and-answer interview, here, Lynch fires both barrels, reloads, and fires again.

Since HP has owned the business for four quarters, he asserted, it must have known what was in those books before now. “The figures are just mad,” he told the WSJ, and in a due diligence that involved “300 people” in which HP “threw everything at it … how could you possibly not spot it?”

“It does seem to be coincident with them releasing the worst set of results in their 70 year company history”, he notes. Reloading yet again, Lynch then listed some of HP’s prior performance in acquisitions: EDS and Palm, both of which resulted in write-downs.

He blames internal HP politics for the disaster, saying that in the inter-divisional war between hardware and software, “Autonomy was at odds with the divisions that were in power”. After Apotheker’s departure, he claims, “hundreds of talented people” were lost, hamstringing the operation.

As soon as “there is some flesh put on the bones” of HP’s allegations, he said, “we will show they are not true”.

With the SEC called in by HP, El Reg reckons this will keep popcorn-sellers in business for some time to come. ®

Boost IT visibility and business value

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
Price cuts, new features coming for Office 365 small biz customers
New plans for companies with up to 300 staff to launch in fall
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.