Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Motorola Targets Corporate Split For 2011

The company says it will cleave itself into two separate entities, one focused on mobile devices for home and SMB users, the other for enterprise.

After its previous attempts to break itself up failed, Motorola has reported that it is "targeting" the first quarter of 2011 to separate the company into two separate publicly traded companies.

One company will consist of Motorola's Mobile Devices and Home businesses while the other will include Motorola's Enterprise Mobility Solutions and Networks businesses. Both companies will carry the Motorola brand, according to Motorola's Thursday announcement.

Attempts to break up the company have failed as Motorola has put the mobile devices operation on the auction block, but no acceptable suitors have materialized.

Motorola then hired Sanjay Jha from Qualcomm to turn around the ailing mobile unit about two years ago. Jha, now chief executive officer of the new Mobile Devices and Home businesses, has turned around the unit to the point where Motorola is confident it can succeed on its own.

Jha has concentrated on Google's Android platform and dropped older platforms. The company has received critical acclaim for its Droid smartphone powered by Android.

The decision to split the company is a victory for Wall Street financier Carl Icahn, who has led a long battle to break up the company, arguing that it is worth more broken up than as a single standalone firm.

"The combination of Mobile Devices and our Home business brings together two highly complementary and innovative organizations," Jha said in a statement. "Together we will be best positioned to lead in the convergence of mobility, media, and the Internet. Our expanding portfolio of smartphones and end-to-end video content delivery capabilities will enable us to provide advanced mobile media solutions and multi-screen experiences for our customers."

Motorola had been seeking buyers for its set-top box operation unsuccessfully, but it decided that the set-top unit would be a good fit for Mobile Devices as mobile and home media increasingly converge.

Greg Brown was named chief executive officer of Motorola's Enterprise Mobility Solutions and Networks businesses. That business includes a wide variety of products and solutions ranging from rugged two-way radios, mobile computers, secure public safety systems, scanning, RFID and wireless network infrastructure.

Brown's operation has a long history of stability and has been devoid of the turbulence experienced by the Mobile Devices operation in recent years. Brown said: "As an independent company, we will continue to build on our long-standing tradition of strong customer relationships, leading-edge product development, quality, thought leadership, and solid financial performance."

The Mobile Devices operation may be on its way to recapturing some of the glamour of the bygone days of the unit, which practically invented the cell phone. It had its last "hit phone" in 2005 with the RAZR handset, which had been developed under the leadership of Christopher Galvin, that last of the Galvin family that founded Motorola in the 1930s.

By concentrating on Android handsets, Jha has already regained some market glamour. Its Cliq and Droid handsets have sold well and Jha said the company plans to release 20 additional handsets this year. Eight are destined for China's burgeoning 3G network. He has told analysts that the Mobile Devices unit will be profitable by the final quarter of 2010.

Motorola carried out another large spin off in 2004 when it sold its Semiconductor Products Sector for several billion dollars.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Microsoft Tops Phishers' Favorite Brands as Facebook Spikes
Kelly Sheridan, Staff Editor, Dark Reading,  8/22/2019
MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online
Kelly Sheridan, Staff Editor, Dark Reading,  8/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-6154
PUBLISHED: 2019-08-23
The authentication applet in Watchguard Fireware 11.11 Operating System has reflected XSS (this can also cause an open redirect).
CVE-2019-5594
PUBLISHED: 2019-08-23
An Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI.
CVE-2019-6695
PUBLISHED: 2019-08-23
Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods.
CVE-2019-12400
PUBLISHED: 2019-08-23
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this im...
CVE-2019-15092
PUBLISHED: 2019-08-23
The webtoffee "WordPress Users & WooCommerce Customers Import Export" plugin 1.3.0 for WordPress allows CSV injection in the user_url, display_name, first_name, and last_name columns in an exported CSV file created by the WF_CustomerImpExpCsv_Exporter class.