Feeds

First, the bad news: EA bags Star Wars games rights

Still waiting for the good news

High performance access to file storage

Disney has made good on its promise to farm out future Star Wars games to an outside developer after scrapping LucasArts - and picked much-loved EA.

Electronic Arts will be able to build on its Jedi-inspired online multiplayer game Star Wars: The Old Republic now that the two entertainment giants have signed a multi-year licensing deal for Star Wars-themed mobile, PC and console titles.

Disney will also develop related games for the web and smartphones, the companies said.

"Like hundreds of millions of people, I am a true believer – someone who can’t get enough of the story, the culture, and the ethos of Star Wars," EA Labels president Frank Gibeau gushed.

"The magic of Star Wars is interwoven into the worlds, characters, planets and amazing battles. It is a universe that lends itself perfectly to gaming. Our agreement unlocks a whole new future of Star Wars games that will span consoles, PCs, tablets, mobile and more."

Despite Gibeau's enthusiasm, EA's previous foray into Star Wars gaming hasn't been a clear win. The developer spent between an estimated $100m and $300m on its online multiplayer game, but its dreams of competing with the most popular MMO, World of Warcraft, haven't come true. To get players into the game, EA released 15 levels for free in June last year and then in November, launched a free-to-play version of the game.

Disney Interactive co-president John Pleasants was upbeat however, talking about the "amazing portfolio of new Star Wars titles" the developer would be publishing for core gamers.

The Mouse got its hands on the Star Wars franchise by slurping Lucasfilm for $4.05bn in October last year, but while it immediately started talk of further movies, it shut down games division LucasArts last month, laying off 200 people.

"After evaluating our position in the games market, we've decided to shift LucasArts from an internal development to a licensing model, minimising the company's risk while achieving a broader portfolio of quality Star Wars games," the company said at the time. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.