Feeds

EA to buy 20% of Ubisoft - report

Consolidation comes to games publishing biz

  • alert
  • submit to reddit

High performance access to file storage

Electronic Arts is to buy a big chunk of Ubisoft, paying $85-100m for a 20 per cent stake in the French games publisher.

So says today's Wall Street Journal, though neither company has yet to comment formally on the claim.

Earlier this year, EA CEO Larry Probst forecast the games industry would see further consolidation over the next three to five years, though at the time - May 2004 - he was quick to point out that EA wasn't going to be a big buyer of companies.

If the deal with Ubisoft goes ahead, it would appear that Probst has changed his mind. In August 2004, UK publisher Eidos confirmed that it is in talks with one or more other publishers about a possible merger or acquisition of Eidos' business.

Curiously, Ubisoft was one of the names most frequently bandied about when Eidos' plan was made public, though the publisher itself has sternly refused to name names. Ubisoft's president, Yves Guillemot, has expressed an interest in acquiring Eidos, but that was a couple of years ago.

Consolidation of the games publishing business will surely attract the closer attention of the world's trade regulators - indeed, any deal between EA and Ubisoft will need to win US government approval before it can go ahead. However, with regulators on both sides of the Atlantic approving the merger of Sony and BMG earlier this year, taking the number of major recording companies from five to four, games publishers no doubt feel they have some way to go before regulators will begin to worry that too much market power is being placed in too few hands. ®

Related stories

Eidos does due diligence on would-be buyers
Graphics patent holder sues Sony, MS, Nintendo
Game makers hit with graphics patent violation suit
Harry Potter games outfit loses its magic
Eidos plunges into red
Eidos confirms takeover talks
EA swallows Criterion Software
Eidos issues profit warning
Eidos snaps up IO Interactive

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.