WD storage technology exec defects to rivals Seagate

Takes advantage of California's dim view of non-competes

Matt Rutledge, WD’s now former SVP for storage technology, has defected to Seagate, having left his position at WD in June, and joined Seagate in August to become its SVP for client HDD, said a source familiar with the circumstances.

He is a 20-year WD veteran, having joined in November 1995.

As such, he has lived thought WD's acquisition of HGST and the ascension of HGST boss Steve Milligan to head the whole Western Digital business, which includes WD and HGST.


Matt Rutledge

At Seagate, he will oversee the client component HDD businesses, including: desktop, notebook, gaming, surveillance, set-top, and NAS.

At these businesses he will have responsibility for the business P&L, roadmap, product positioning and preference, along with market research and demand planning.

Rutledge will be able to say hello to fellow WD-vet Jim Morris, who joined Seagate in May this year to become its EVP for product lines, quality and market operations.

It’s notable that California, where Rutledge worked for WD and now works for Seagate, does not allow non-compete clauses in employment contracts.

That's just as well. He was WD’s general manager for client storage from June 2011 to November 2013, so he has a substantial amount of relevant experience.

Recruiting him is a big win for Seagate boss Steve Luczo and a poke in the eye for Western Digital head Steve Milligan. ®

Other stories you might like

  • Western Digital open to spinning out flash, hard disk businesses
    Messrs Elliott strike again

    Western Digital has confirmed the board is considering "strategic alternatives" for the storage supplier, including spinning out its flash and hard disk businesses.

    This follows calls last month by activist investor Elliott Management, which has amassed a $1 billion investment in WD equating to a six percent share stake, for a "full separation" based on those product lines.

    In a statement, CEO David Goeckeler said: "The board is aligned in the belief that maximizing value creation warrants a comprehensive assessment of strategic alternatives focused on structural options for the company's Flash and HDD businesses.

    Continue reading
  • Elliott Management to WDC board: Spin out or sell flash biz
    HDD and NAND memory maker has 'underperformed by any objective measure'

    Updated Activist investor Elliott Management is pushing for Western Digital Corporation's board to break the business in two by splitting the hard disk drive and NAND flash divisions into separately traded entities.

    In an open letter to the board [PDF], Elliott – which has over time invested roughly $1 billion in WDC, representing about a 6 percent stake – says it is almost six years since WD bought SanDisk for $19 billion, scooping up its NAND memory biz.

    At the time, this purchase was "nothing less than transformative", the letter adds, propelling five-decade-old WDC beyond HDDs into one of the biggest players in flash. Synergies, a better strategic position, and enhanced financial profile were among the rationale for the deal, says Elliott.

    Continue reading
  • Western Digital tells EdgeRover users to patch app again
    Critical vulnerability may have allowed an attacker to escalate local privileges

    Users of Western Digital's EdgeRover app for Windows and Mac are advised to download an updated version to avoid a security flaw that might allow an attacker unauthorized access to directories and files.

    The flaw, which was given the CVE identification number CVE-2022-22988, carries a Common Vulnerability Scoring System (CVSS) severity rating of 9.1, making it a critical weakness. It has now been addressed, however, with a modification to the way EdgeRover handles file and directory permissions.

    According to Western Digital, the flaw meant that EdgeRover was subject to a directory traversal vulnerability, which may have allowed an attacker to carry out a local privilege escalation and bypass file system sandboxing. If successfully exploited, this could lead to the disclosure of sensitive information or even a potential denial-of-service attack, the firm said.

    Continue reading

Biting the hand that feeds IT © 1998–2022