Feeds

Micron to Hynix: you don't call, you don't write

Will a megaphone do?

  • alert
  • submit to reddit
ComputerWire: IT Industry Intelligence

The Korean government is banking on Micron Technology Inc as the most likely white knight for faltering memory vendor Hynix Semiconductor Inc.

However, the Boise, Idaho has yet to saddle up its charger, because no one from Korea has actually been in touch with it yet.

Korean reports on Friday quoted government officials who said they believe Micron was interested in restarting negotiations to buy out troubled Hynix' memory operations. An earlier memorandum of understanding expired in May, following disagreement between Hynix's board and its creditors. However, the creditors are now in the driving seat, and seem to think the best hope for the company is a sales of the DRAM arm to Micron.

However, it appears that while the Korean government would like to draw Micron back into the fray, it has yet to actually get in touch with the American firm.

On Friday a Micron spokesman said that despite the noise coming out of Korea, no discussions were occurring between the two companies.

Even if Micron was going to re-enter negotiations, the company could hardly be expected to initiate proceedings itself. After its last round of talks collapsed because of dissent in the Korean camp, it will no doubt want Hynix, its creditors, and the Korean government to start singing from the same hymnbook before it even begins to listen to what they have to say.

© ComputerWire

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.