recommended reading

What happened to the 2012 tech bubble that never was

Electronic screens show the price of Facebook shares after they began trading Friday, May 18, 2012 in New York.

Electronic screens show the price of Facebook shares after they began trading Friday, May 18, 2012 in New York. // Richard Drew/AP

Turns out Facebook's fizzled IPO was a pretty good microcosm for 2012 in startup land: it was all one big fizzle. The final numbers for last year in venture-capital IPOs and acquisitions are in, and while there was no dot-com-era type of explosion, the much hyped new tech bubble appears to have just... petered out. There remains hope, as always, for the unpredictable year ahead. Here are some key stats from the Thompson Reuters and National Venture Capital Association survey released Wednesday:

  • Venture-backed companies made less money for their investors than they did a year ago. 
  • There is less investment money out there, overall, with investors doling out $6.9 billion last quarter, compared to $10.1 billion the year before and $8.4 billion a quarter before that — a trend that The Wall Street Journal noted back in September, which we speculated may have had something to do with Facebook's IPO fail. 
  • Acquisitions of "venture-backed companies" were also down, totaling $3.52 billion last quarter down from $4.99 the year before, as were acquisitions in general, which totaled $21.5 billion, down 11 percent from $24.09 billion in 2011.
  • The number of companies that opted to IPO fell to eight from 11 the year before.

The most positive figure from the entire report is actually skewed: Those eight companies that did IPO companies raised more money on average, combing out with higher valuations — an average that is weighed down almost entirely by Facebook. But venture-backed companies did raise $21.5 billion (way up from $10.7 billion the year before), which was the strongest annual funding since 2000. 

Read more at The Atlantic Wire

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.