Microsoft's Yahoo! takeover faces technical challenges

Different platforms, different cultures


Microsoft is in no hurry to integrate the technology and culture of Yahoo! should the aggressive takeover go ahead.

The comments might seem a little premature, but differences in culture and technology have already arisen as possible barriers to the deal. Of course, there are other more pertinent barriers too - like Yahoo!'s board of directors.

Microsoft chief software architect Ray Ozzie told the Financial Times last week that he would not rush to merge the technology backbones of the two, even if this meant delaying some of the benefits of combining the two firms.

Ozzie said: "I'm not in any way unrealistic about the challenges that would confront us. They have a number of different types of technologies. They have their own corporate culture."

Yahoo! is a mixed bag of technology with a large proportion of its systems running open source or Unix software. Microsoft is, of course, mostly a Microsoft shop.

Ozzie told the paper he remained optimistic about the benefits of the deal.

Ray Ozzie was one of the creators of Lotus Notes, which was bought by IBM in 1995. He said he had learnt lessons from going through that process. He joined Microsoft three years ago.

Microsoft has mostly grown organically rather than by acquistion. It has never paid as much for a company as it is trying to pay for Yahoo!. Nor, arguably, has a previous purchase played such a central strategic role.

Ozzie also talked about the challenges of getting Microsoft to offer its technologies as online services using data centres. Most recently it began offering online versions of Sharepoint and Exchange for US customers - it hopes to start charging for the service, currently in beta, later this year. The company is also picking up data centres to support this push.

More from the FT here. ®


Other stories you might like

  • The future: Windows streaming through notched Apple screens

    Choice is the word for Jamf's Dean Hager

    Interview As Apple's devices continue to find favour with enterprise users, the fortress that is Windows appears to be under attack in the corporate world.

    Speaking to The Register as the Jamf Nation User Conference wound down, the software firm's CEO, Dean Hager, is - unsurprisingly - ebullient when it comes to the prospects for Apple gear in the world of suits.

    Jamf specialises in device management and authentication, and has long been associated with managing Apple hardware in business and education environments. In recent years it has begun connecting its products with services such as Microsoft's Azure Active Directory as administrators face up to a hybrid working future.

    Continue reading
  • There’s a wave of ransomware coming down the pipeline. What can you do about it?

    AI can help. Here’s how…

    Sponsored The Colonial Pipeline attack earlier this year showed just how devastating a ransomware attack is when it is targeted at critical infrastructure.

    It also illustrated how traditional security techniques are increasingly struggling to keep pace with determined cyber attackers, whether their aim is exfiltrating data, extorting organisations, or simply causing chaos. Or, indeed an unpleasant combination of all three.

    So, what are your options? More people looking for more flaws isn’t going to be enough – there simply aren’t enough skilled people, there are too many bugs, and there are way too many attackers. So, it’s clear that smart cyber defenders need to be supplemented by even smarter technology incorporating AI. You can learn what this looks like by checking out this upcoming Regcast, “Securing Critical Infrastructure from Cyber-attack” on October 28 at 5pm.

    Continue reading
  • Ransomware criminals have feelings too: BlackMatter abuse caused crims to shut down negotiation portal

    Or so says infsec outfit Emsisoft

    Hurling online abuse at ransomware gangs may have contributed to a hardline policy of dumping victims' data online, according to counter-ransomware company Emsisoft.

    Earlier this month, the Conti ransomware gang declared it would publish victims' data and break off ransom negotiations if anyone other than "respected journalist and researcher personalities" [sic] dared publish snippets of ransomware negotiations, amid a general hardening of attitudes among ransomware gangs.

    Typically these conversation snippets make it into the public domain because curious people log into ransomware negotiation portals hosted by the criminals. The BlackMatter (aka DarkSide) gang's portal credentials (detailed in a ransom note) became exposed to the wider world, however, and the resulting wave of furious abuse hurled at the crims prompted them to pull up the virtual drawbridge.

    Continue reading

Biting the hand that feeds IT © 1998–2021