Feeds

Pipex plotting carve-up for Tiscali deal

Sale to be announced in weeks

High performance access to file storage

Exclusive The breakup of Pipex and sale of its residential broadband customer base to Tiscali is looking increasingly certain.

Insiders at the takeover target say the terms of the deal will be announced in four to eight weeks.

In the meantime, managers are working out the personnel carve-up, with employees destinations in the split already decided.

Tiscali's poor reputation for customer service, worsened by its response to a recent extended email outage, is said to have set some Pipex staff against the sale.

The Register also understands that Pipex's WiMax licence, which complicated speculations over the UBS-brokered auction of the firm, will remain with the rest of Pipex, concentrated on business customers.

As part of the deal, Tiscali will provide the refocused ISP with access to its unbundled network, which is one of the most extensive in the UK and should lower its costs in providing broadband. Tiscali has unbundled more than 400 exchanges, compared to Pipex's 100.

Pipex has about 570,000 customers across its broadband brands, which include Toucan and Bulldog. Each of the big players in the dog-eat-dog communications market - Virgin Media, BT, Sky, Carphone Warehouse - have been linked with a bid for the firm, but have all fallen by the wayside amid rumours of an over-ambitious valuation and concerns over its diverse interests.

Italy-based Tiscali, which has almost 1.5 million subscribers in the UK, stepped into the spotlight in the middle of May when it confirmed it was in early discussions with Pipex.

Back then, Goldman Sachs analysts valued Pipex's telecoms business at £211m and the hosting and network services at £178m.

As middleweights lacking profile and resources compared to the bundling frontrunners, Tiscali and Pipex have similar problems in attracting residential customers.

Jonathan Coham, a broadband analyst at Ovum said: "This is an interesting move, but Tiscali needs more than just subscribers to maintain its position. They've typically been a low-spending broadband provider, with limited additional services...they'll need to follow this up."

Tiscali and Pipex refused to comment on this story. ®

High performance access to file storage

More from The Register

next story
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.