Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Motorola Targets Corporate Split For 2011

The company says it will cleave itself into two separate entities, one focused on mobile devices for home and SMB users, the other for enterprise.

After its previous attempts to break itself up failed, Motorola has reported that it is "targeting" the first quarter of 2011 to separate the company into two separate publicly traded companies.

One company will consist of Motorola's Mobile Devices and Home businesses while the other will include Motorola's Enterprise Mobility Solutions and Networks businesses. Both companies will carry the Motorola brand, according to Motorola's Thursday announcement.

Attempts to break up the company have failed as Motorola has put the mobile devices operation on the auction block, but no acceptable suitors have materialized.

Motorola then hired Sanjay Jha from Qualcomm to turn around the ailing mobile unit about two years ago. Jha, now chief executive officer of the new Mobile Devices and Home businesses, has turned around the unit to the point where Motorola is confident it can succeed on its own.

Jha has concentrated on Google's Android platform and dropped older platforms. The company has received critical acclaim for its Droid smartphone powered by Android.

The decision to split the company is a victory for Wall Street financier Carl Icahn, who has led a long battle to break up the company, arguing that it is worth more broken up than as a single standalone firm.

"The combination of Mobile Devices and our Home business brings together two highly complementary and innovative organizations," Jha said in a statement. "Together we will be best positioned to lead in the convergence of mobility, media, and the Internet. Our expanding portfolio of smartphones and end-to-end video content delivery capabilities will enable us to provide advanced mobile media solutions and multi-screen experiences for our customers."

Motorola had been seeking buyers for its set-top box operation unsuccessfully, but it decided that the set-top unit would be a good fit for Mobile Devices as mobile and home media increasingly converge.

Greg Brown was named chief executive officer of Motorola's Enterprise Mobility Solutions and Networks businesses. That business includes a wide variety of products and solutions ranging from rugged two-way radios, mobile computers, secure public safety systems, scanning, RFID and wireless network infrastructure.

Brown's operation has a long history of stability and has been devoid of the turbulence experienced by the Mobile Devices operation in recent years. Brown said: "As an independent company, we will continue to build on our long-standing tradition of strong customer relationships, leading-edge product development, quality, thought leadership, and solid financial performance."

The Mobile Devices operation may be on its way to recapturing some of the glamour of the bygone days of the unit, which practically invented the cell phone. It had its last "hit phone" in 2005 with the RAZR handset, which had been developed under the leadership of Christopher Galvin, that last of the Galvin family that founded Motorola in the 1930s.

By concentrating on Android handsets, Jha has already regained some market glamour. Its Cliq and Droid handsets have sold well and Jha said the company plans to release 20 additional handsets this year. Eight are destined for China's burgeoning 3G network. He has told analysts that the Mobile Devices unit will be profitable by the final quarter of 2010.

Motorola carried out another large spin off in 2004 when it sold its Semiconductor Products Sector for several billion dollars.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Lessons from COVID-19 Cyberattacks: Where Do We Go Next?
Derek Manky, Chief of Security Insights and Global Threat Alliances, FortiGuard Labs,  7/2/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-08
Buffer overflow exists in Geovision Door Access Control device family, an unauthenticated remote attacker can execute arbitrary command.
PUBLISHED: 2020-07-07
An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password.
PUBLISHED: 2020-07-07
Victor CMS through 2019-02-28 allows XSS via the register.php user_firstname or user_lastname field.
PUBLISHED: 2020-07-07
A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the service (DoS). We recommend updating, or to res...
PUBLISHED: 2020-07-07
Gossipsub 1.0 does not properly resist invalid message spam, such as an eclipse attack or a sybil attack.