Feeds

Liberty does German u-turn

Wooing the regulators

  • alert
  • submit to reddit

Boost IT visibility and business value

ComputerWire: IT Industry Intelligence

Liberty Media Corp has made a surprise U-turn in order to get regulatory approval for its 5.5bn euro ($4.8bn) acquisition of six cable TV networks from Deutsche Telekom AG.

The Englewood, California-based operator had originally refused regulators'insistences that it invest heavily on bringing the cable TV networks up to date to provide high-speed internet and telephone services. But yesterday in a press conference it revealed an offer to invest $8.3bn ($7.2bn) through 2010.

Previous to the change of heart, it had seemed that the German regulators would make a final refusal at the end of this month, and that Liberty's hopes of completing the deal rested with a possible overturn of the decision by the German government. Now it seems likely the deal will go ahead.

It is possible that Liberty was bounced into making the assurances after Compere Associates, a London, UK-based private equity firm repeated its intention to step in if regulators blocked the deal. If the German government believed that Telekom would struggle to find another buyer, it may have been tempted to ensure the Liberty deal went through, as the German incumbent desperately needs to reduce its debts and proceed with the IPOs of spin-offs, most notably that of T-Mobile. Compere's overtures could have convinced Liberty that it had to make concessions to get the deal through.

Liberty's European expansion plans are currently in full swing. It already has a 25% stake in Telewest Communications Plc, the UK number-two cable operator, and is currently weighing up the possibility of investing in the UK number one, NTL Inc, which could lead to an eventual merger. Earlier this month it increased its control of European cable operator United Pan-Europe Communications after the Amsterdam, Netherlands-based company defaulted on debt payments.

© ComputerWire.com. All rights reserved.

The essential guide to IT transformation

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
PwC says US biz lagging in Internet of Things
Grass is greener in Asia, say the sensors
Ofcom sees RISE OF THE MACHINE-to-machine cell comms
Study spots 9% growth in IoT m2m mobile data connections
O2 vs Vodafone: Mobe firms grab for GCHQ, gov.uk security badge
No, the spooks love US best, say rival firms
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.