Barney's Blog

Blog archive

Microsoft Acquisition Ups and Downs

Microsoft doesn't make the kind of blockbuster acquisitions Oracle and HP are famous for. Instead, Redmond focuses on more tactical buys.

Writer and former analyst Matt Rosoff looked at 15 companies Microsoft bought since 1992 to see what happened afterwards.

Some, like WebTV, saw its technology simply overtaken for much cooler stuff. Others, like Groove, didn't turn into much besides the spending $100 million to get Microsoft a Bill Gates replacement for about five years.

Here are the three best buys in my mind: Hotmail is a worthy competitor to Gmail, and as far as I know, doesn't invade one's privacy like Google does (correct me if I'm wrong at Great Plains gave Microsoft its first foot in the ERP door, and Navision gave it a second. Both products are maturing and popular in the mid-market.

Microsoft is sitting on about $40 billion in cash, so it can do almost anything it wants. Who should Ballmer buy and why? Vote at

Posted by Doug Barney on 03/14/2011 at 1:18 PM


  • Microsoft Publishes Windows Deadlines on Upgrading to SHA-2

    Microsoft on Friday described its 2019 timeline for when it will start distrusting Shell Hashing Algorithm-1 (SHA-1) in supported Windows systems, as well as in the Windows Server Update Services 3.0 Service Pack 2 management product.

  • Performing a Storage Refresh on Windows Server 2016, Part 1

    To spruce up some aging lab hardware, Brien decided to make the jump to all-flash storage. Here's a walk-through of the first half of the process.

  • Datacenters Are Cooling Down as Buildouts Heat Up

    Tech giants Google, Apple and others are expanding their datacenter footprints at a rapid rate, and it's pushing the industry to find better ways to power all that infrastructure.

  • Vendors Issue Patches for Linux Container Runtime Flaw Enabling Host Attacks

    This week, the National Institute of Standards and Technology (NIST) described a high-risk security vulnerability (CVE-2019-5736) for organizations using containers that could lead to compromised host systems.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.