Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Motorola Targets Corporate Split For 2011

The company says it will cleave itself into two separate entities, one focused on mobile devices for home and SMB users, the other for enterprise.

After its previous attempts to break itself up failed, Motorola has reported that it is "targeting" the first quarter of 2011 to separate the company into two separate publicly traded companies.

One company will consist of Motorola's Mobile Devices and Home businesses while the other will include Motorola's Enterprise Mobility Solutions and Networks businesses. Both companies will carry the Motorola brand, according to Motorola's Thursday announcement.

Attempts to break up the company have failed as Motorola has put the mobile devices operation on the auction block, but no acceptable suitors have materialized.

Motorola then hired Sanjay Jha from Qualcomm to turn around the ailing mobile unit about two years ago. Jha, now chief executive officer of the new Mobile Devices and Home businesses, has turned around the unit to the point where Motorola is confident it can succeed on its own.

Jha has concentrated on Google's Android platform and dropped older platforms. The company has received critical acclaim for its Droid smartphone powered by Android.

The decision to split the company is a victory for Wall Street financier Carl Icahn, who has led a long battle to break up the company, arguing that it is worth more broken up than as a single standalone firm.

"The combination of Mobile Devices and our Home business brings together two highly complementary and innovative organizations," Jha said in a statement. "Together we will be best positioned to lead in the convergence of mobility, media, and the Internet. Our expanding portfolio of smartphones and end-to-end video content delivery capabilities will enable us to provide advanced mobile media solutions and multi-screen experiences for our customers."

Motorola had been seeking buyers for its set-top box operation unsuccessfully, but it decided that the set-top unit would be a good fit for Mobile Devices as mobile and home media increasingly converge.

Greg Brown was named chief executive officer of Motorola's Enterprise Mobility Solutions and Networks businesses. That business includes a wide variety of products and solutions ranging from rugged two-way radios, mobile computers, secure public safety systems, scanning, RFID and wireless network infrastructure.

Brown's operation has a long history of stability and has been devoid of the turbulence experienced by the Mobile Devices operation in recent years. Brown said: "As an independent company, we will continue to build on our long-standing tradition of strong customer relationships, leading-edge product development, quality, thought leadership, and solid financial performance."

The Mobile Devices operation may be on its way to recapturing some of the glamour of the bygone days of the unit, which practically invented the cell phone. It had its last "hit phone" in 2005 with the RAZR handset, which had been developed under the leadership of Christopher Galvin, that last of the Galvin family that founded Motorola in the 1930s.

By concentrating on Android handsets, Jha has already regained some market glamour. Its Cliq and Droid handsets have sold well and Jha said the company plans to release 20 additional handsets this year. Eight are destined for China's burgeoning 3G network. He has told analysts that the Mobile Devices unit will be profitable by the final quarter of 2010.

Motorola carried out another large spin off in 2004 when it sold its Semiconductor Products Sector for several billion dollars.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...