IBM’s Low-end Server Business Acquired For $2.3 Billion

IBM’s Low-end Server Business Acquired For $2.3 Billion

IBM_logo

Lenovo has finally acquired IBM’s low-end server business, after a deal spanning over a year has finally come to a close. The final acquisition price came to $2.3 billion, making it the largest tech server acquisition by a Chinese company.

IBM has been trying to shift its x86 server business for a few years now, with more companies switching to cloud computing technology from traditional server-side infrastructure. IBM is looking to invest more money in high-margin servers, which still generate impressive revenue.

Lenovo has more reason to own low-end x86 servers, given their high reputation in China, it will be easier for the company to sell their servers to Chinese companies, who are looking to nationalize their servers with the recent U.S. surveillance outbreak. Lenovo may be able to boost revenues and margins on the x86 servers if they invest heavily in China. Most Western companies are now either moving to high-end servers, their own or cloud based infrastructure, adding more benefits to the user.

IBM has been a stepping stone for Lenovo’s success before, in 2005 the Chinese company acquired IBM’s ThinkPad PC business for $1.75 billion, bolstering their position in the PC market from unknown to first place.  This is not the first time Lenovo has tried to purchase the business, last year IBM offered it out to the company for $6 billion, but Lenovo declined. In one straight year, the price has dropped by more than half, analysts believe this is due to higher grossing cloud computing firms and more companies looking to newer and faster technologies.

Hewlett Packard is currently the major player in the x86 server business with IBM second, although their position may drop due to this large scale acquisition. Lenovo is currently not in the top five, but given the amount they are prepared to invest, we could see a repeat of the PC market battle.

Analysts predict the x86 servers bring in around $4 billion in revenue annually. As the PC market dwindles, Lenovo is looking to invest more in back-end technology and mobile, making sure they have their backs covered when the PC dies.

By Walter Bailey

Sorry, comments are closed for this post.

Comics
Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…