Feeds

IBM handing pink slips to Israel-based Diligent devs - reports

Deduped out of existence, perhaps?

Eight steps to building an HP BladeSystem

Israeli media outlets are reporting that IBM is laying off product developers at its Diligent operation but leaving support staff roles untouched.

According to Israeli biz news site Calcalist, Diligent, XIV, and Storwize – all three Israeli companies acquired by Big Blue – were housed by the firm in the R&D division of its Storage Technologies Group in Haifa, Israel.

Daily paper Haaretz has a similar Diligent story, writing: "IBM plans to shut down its Diligent product line and is expected to lay off its small workforce in Israel, which has been engaged in product development and upgrading."

ProtecTIER

Big Blue has started a round of layoffs as it tries to improve its profitability with a move to higher-value products and services.

This profit drive also prompted the sale of its System x server business to Lenovo. Both the System x servers and Diligent dedupe software are/were in IBM's System and Technology Group (STG).

Diligent was founded by ex-EMC Symmetrix creator Moshe Yanai and Doron Kempel. Yanai also founded XIV, and is now an advisor at Axxana, a data protection startup. Kempel founded and runs converged storage/server system startup Simplivity. There were about 60 staff in Diligent Israel when it was bought by IBM.

IBM bought Diligent for its ProtecTIER deduplication technology in 2008 for around $165m.

Tony Pearson, an IBM master inventor and Senior Managing Consultant for the IBM System Storage product line, has blogged about the restructuring in Israel and ProtecTIER's future.

He says it is not going away, far from it;

ProtecTIER remains IBM's strategic offering for cost-reducing deduplication technology. ... the ProtecTIER development mission has been split between numerous IBM lab facilities around the world for a long period of time. ... ProtecTIER remains IBM's central focus for deduplication and a key part of IBM's strategy for enabling its clients to store more data while lowering costs.

®

Maximizing your infrastructure through virtualization

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.