Feeds

Hynix rejects bid for its non-memory biz

Citigroup offer 'unacceptable'

  • alert
  • submit to reddit

Hynix has rejected the latest offer US banking combine Citigroup has made for its non-memory business as "unacceptable", the South Korean manufacturer said today.

Negotiations between Citigroup Venture Capital (CVC), the bank's seed-investment division, and Hynix began last September after CVC submitted a letter of intent.

Non-memory products are believed to account for around 20 per cent of Hynix' 2002 sales and were worth $600 million.

"We have been engaged in talks for long to sell our non-memory operations to CVC, but we have decided to suspend the negotiations as our creditors have concluded that the terms, including the price, offered by CVC are unacceptable," Hynix said in a statement.

Instead, the company will consider other options, such as spinning the non-memory business off, or presumably finding an alternative buyer. CVC may yet come back with a revised offer, but the stark terms of Hynix' statement suggests that discussions between the two companies have gone as far as they can. ®

Related story

Citigroup wants to buy Hynix' non-memory biz

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.