Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Lenovo says $2.1 billion IBM x86 server deal to close on Wednesday

29/09/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmtevndmvnzuvzmlszsjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

Lenovo Group Ltd. will close its acquisition of International Business Machines Corp's (IBM) (IBM.N) x86 server division on Oct 1 for $2.1 billion, giving the Chinese tech firm the firepower to win business clients from U.S. rivals.

The closing purchase price is lower than the $2.3 billion announced in January because of a change in the valuation of inventory and deferred revenue liability, Lenovo said. Roughly $1.8 billion will be paid in cash and the remainder in stock.

The purchase is Lenovo's latest since overtaking Hewlett-Packard Co (HP) (HPQ.N) as the world's top personal computer (PC) maker last year, in its quest to diversify away from a steadily shrinking PC market. Earlier this year, Lenovo also said it would pay $2.9 billion for Google Inc's (GOOG.O) Motorola smartphone unit.

In an interview, Lenovo Chief Executive Yang Yuanqing said the IBM deal opened a new "growth engine" for his company. He said he expected the x86 unit to bring in $5 billion in its first year and deliver margins higher than the 4 percent of Lenovo's PC business.

"In the large and medium enterprise space we can now fully leverage IBM technology to compete with brands like HP and Dell," Yang said by telephone. "We can combine this good technology with Lenovo's efficient operations."

IBM's x86 server business has trailed those of HP and Dell Inc [DI.UL] in market share. But Yang said Lenovo has expertise competing in markets with razor-thin margins, gained during its journey to becoming the world's largest PC maker.

Lenovo currently sells a line of low-end servers under the ThinkServer brand, but the company pursued IBM's x86 portfolio because its higher-end machines can perform more complex analytics and database-related functions.

The x86 server team will continue to be led by former IBM executive Adalio Sanchez, who will report to Gerry Smith, president of Lenovo's enterprise business group, Lenovo said in a statement announcing the deal's impending closure.

This article has been extracted from http://uk.reuters.com/, please click on this link to read the article in full http://uk.reuters.com/article/2014/09/29/us-lenovo-ibm-deals-idUKKCN0HO08N20140929

Montash is a multi-award winning, global technology recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...