Feeds

Xpress yourself: Quark sold to M&A outfit

Desktop publishing: It's the future! Insert fondleslab here...

Secure remote control for conventional and virtual desktops

Desktop publishing software maker Quark has been acquired by Platinum Equity for an undisclosed sum.

The Denver, Colorado-based vendor, whose most popular product was QuarkXpress back in the mid-'90s, was bought by the Ebrahimi family in 2000 from the company's founder Tim Gill, according to MacWorld.

In contrast to recent trendy software companies such as LinkedIn and Groupon, Quark never sought an IPO, instead remaining a privately held outfit since it was created in 1981 primarily aiming its products at designers running Apple Macs – the original fanbois.

QuarkXpress landed in 1987, but its popularity only sprouted between 1990 and 1997, when it became, according to Quark anyway, "the world's most widely used professional page-layout software" used by publishers.

It first went "collaborative" way back in 1992 with the launch of the Quark Publishing System, by combining client and server-based publishing software to allow designers, writers and editors to connect workflows.

Raymond Schiavone has been at the helm of the company since 2006.

Arguably, Adobe's rival DTP package InDesign has put a dent in Quark's previous prowess among designers.

Ironically, Quark once bid to buy Adobe, which even in 1998 was a much a bigger firm than the QuarkXpress maker. That merger plan was quickly ditched, after hostility from the company's userbase and a general consensus that such a buyout simply wasn't credible.

Fast-forward 13 years, and Quark has now been scraped under the wing of Platinum Equity – an LA-based Merger & Acquisitions firm.

“Quark is committed to its loyal and dedicated userbase and we are enthusiastic about the company's new products which are gaining traction and generating positive reviews," said Platinum Equity's partner Brian Wall.

"We believe that with their expertise and innovative software, Quark has the potential to revolutionise publishing again.”

Indeed, like many software players, Quark has been working on products that are compatible with e-readers, tablets and mobile gizmos including Apple's iPad.

So a renewed hunt for fanboi-love might again be on the cards for Quark.

With its new suitor, Quark is also soon to be on the look-out for new companies to expand its current portfolio. ®

Internet Security Threat Report 2014

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.