Google Buying Motorola for Products, Patents and More

By

To break new ground for the Android ecosystem while protecting it from anti-competitive threats from Microsoft, Apple and others, search engine giant Google announced plans last month to acquire Motorola Mobility Holding s for $12.5 billion. The search engine giant said that this acquisition will also strengthen its product portfolio, including patents, to make it a strong competitor in the marketplace. Motorola is one of 39 manufacturers of handsets that use Google’s Android operating system (OS).

According to Bloomberg Businessweek, Google bought Motorola Mobility to acquire its products and not just patents. Speaking to Salesforce.com’s chief executive officer Marc Benioff,

Google ‘s chairman Eric Schmidt said, “We did it for more than just patents,” as per Bloomberg Businessweek’s report. He added, “The Motorola team has some amazing products.”

The Bloomberg Businessweek report indicates that this deal will aid the search engine giant expand in smartphones to be a strong competitor to rival Apple, the iPhone maker. Bloomberg Businessweek’s reporter Aaron Ricadela wrote that the deal will bring over 17,000 patents that Google can utilize to protect its Android OS.

Further continuing his talk with Salesforce.com’s Benioff, Schmidt praised former Apple CEO Steve Jobs, who stepped down last week, and said that “He’s ‘proud’ of his stint as an Apple director,” wrote Ricadela.

“It’s certainly the best performance of a CEO in 50 years,” Schmidt told Benioff. “We’ve all benefited from the tremendous innovation at Apple. And I say this as a very proud former board member at Apple,” Schmidt commented, as per Bloomberg’s report.

Schmidt was elected to Apple’s board of directors on August 28, 2006. In August, 2009, Schmidt resigned from the board of directors at Apple due to conflict of interests amid the growing competition between Google and Apple.

Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO West 2011, taking place Sept. 13-15, 2011, in Austin, Texas. ITEXPO offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations. It's also where service providers learn how to profitably roll out the services their subscribers are clamoring for – and where resellers can learn about new growth opportunities. To register, click here.


Ashok Bindra is a veteran writer and editor with more than 25 years of editorial experience covering RF/wireless technologies, semiconductors and power electronics. To read more of his articles, please visit his columnist page.

Edited by Rich Steeves
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

TechZone360 Contributor

SHARE THIS ARTICLE
Related Articles

Shabodi Accelerates Adoption of Network-Aware Applications with CAMARA API Enterprise Reference Implementation

By: Special Guest    2/16/2024

Shabodi, an Application Enablement Platform (AEP) provider unleashing advanced network capabilities in LTE, 5G, 6G, and Wi-Fi 6, announced they have l…

Read More

How Much Does Endpoint Protection Cost? Comparing 3 Popular Solutions

By: Contributing Writer    2/2/2024

Endpoint protection, also known as endpoint security, is a cybersecurity approach focused on defending computers, mobile devices, servers, and other e…

Read More

What Is Databricks? Simplifying Your Data Transformation

By: Contributing Writer    2/2/2024

Databricks is an innovative data analytics platform designed to simplify the process of building big data and artificial intelligence (AI) solutions. …

Read More

What Is Blue/Green deployment?

By: Contributing Writer    1/17/2024

Blue/green deployment is a software release management strategy that aims to reduce downtime and risk by running two identical production environments…

Read More

The Threat of Lateral Movement and 5 Ways to Prevent It

By: Contributing Writer    1/17/2024

Lateral movement is a term used in cybersecurity to describe the techniques that cyber attackers use to progressively move through a network in search…

Read More