Feeds

RealNetworks buys Xing MP3 technology

Encoding, streaming specialist snapped up for $75 million

  • alert
  • submit to reddit

High performance access to file storage

RealNetworks has bought MP3 software developer Xing Technology for up to $75 million worth or RealNetworks stock. The deal gives Real access to Xing's MP3 AudioCatalyst encoding and decoding software and StreamWorks streaming MP3 application, all of which it will use to extend its RealPlayer application to support the MPEG-based format. "With the acquisition of Xing, RealNetworks can now better serve the huge market of new artists choosing to use MP3 to legally distribute their work," said Real's CEO, Rob Glaser. The important part of the sentence is the phrase 'legally distribute'. RealNetworks clearly wants to stay on the right side of the Recording Industry Association of America and its Secure Digital Music Initiative (SDMI), yet it's equally certain that the company reckons that MP3 is going to continue to play an important role in the online music world, whatever specification the SDMI comes up with. Otherwise why not simply wait for the SDMI to issue its final report, which it's due to do later this year, and incorporate that? It's somewhat ironic that Real has chosen to buy an MP3 software company since it always hoped that its own RealAudio format would become the de facto standard for music streamed or downloaded via the Internet. It's a sign, perhaps, of how out of touch RealNetworks has been that it's only now that it has come to consider MP3 a force in what is arguably one of its core markets, and that it feels it lacks the internal resources to add MP3 delivery to RealPlayer. $75 million is, after all, rather a lot to pay for encoding and decoding software based on an open compression standard. Still, since Real is funding the deal with a new share issue, it won't in fact cost it anything. And, to be fair, Xing does come with much expertise in MPEG video transmission and streaming, both core technologies for Real. ® See also RealNetworks backs IBM digital music system a2b unveils latest digital music player, format

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.