Mike Wheatley
Latest from Mike Wheatley
Will Anyone Else Still Want To Use Windows Phone?
With Microsoft snatching up Nokia’s mobile phone business in a stunning $7.17 billion acquisition, it’s a clear sign that the Redmond firm believes it can fight against Android and iOS dominance alone. But even though Microsoft itself has now become the largest single maker of devices running its Windows Phone OS, the company insists that ...
Microsoft Gobbles Up Nokia In Massive $7.17B Acquisition
Whatever your feelings about Microsoft’s Steve Ballmer, the guy deserves credit for making one hell of an exit. Just days after announcing his intention to step down as Microsoft’s CEO, he goes and sanctions what could well be the most important acquisition in the software giant’s history to date – the massive $7.17 billion takeover ...
Not Everyone Hates Windows 8 As Market Share Soars To 7.4%
Summer time might be winding down but things are looking a bit more radiant for Microsoft and Windows 8, after its much maligned operating system’s market share surged forward significantly over the last few months. Windows 7 remains by far the most popular operating system – and it’s likely to remain so for some time ...
Number of Tor Client Users Explodes Overnight – But Why?
So it appears that people do care about their privacy after all. What with the never-ending revelations of US government spying and various other security concerns over the last few months, people could be forgiven for becoming a bit complacent over it all, but apparently that’s not the case. The evidence? The number of people ...
Apple MAC OS X Clock Vulnerability Grants Time Travelling Hackers Full Access
If you’re still clinging to the myth that just because you’re using an Apple Mac, your data is safe from hackers… Well, stop it. Fact is, Apple’s Mac OS X is no better than any other operating system – no matter if you’re running Windows, Linux or anything else, there are dozens of security weaknesses ...
Quantum Cryptology: The Holy Grail of Data Encryption?
With stories of new cyberattacks hitting the headlines every other day, not too mention the fact that the NSA seems to have the ability to help itself to whatever data it wants, more advanced encryption techniques can’t come soon enough. Which is why a team of British physicists’ research into an encryption method called quantum ...
“Other” Server Makers Gain Ground As IBM, HP, Oracle All Struggle
The global server market continues to suffer in the face of threats from cloud computing and virtualization, forcing OEMs to look for an escape avenue in emerging new areas such as converged solutions and hyperscale environments. That the server is slowly losing its grip is actually a blessing in disguise for some systems makers. Dell ...
Building Big Data: How Data Centers are Going Green
Few people are likely to have heard of Yerington, Nevada. The town, with a population of just 3,048 according to Wikipedia, doesn’t often hit the headlines, but that doesn’t mean it hasn’t caught the attention of others. Apple for example, is paying a lot of attention to Yerington, where it’s just opened up a brand ...
Twitter + New York Times Hacked by Syrian Electronic Army
As the US cranks up its war machine ahead of a possible air strike against Syria, that country’s cyberterrorist defenders, the Syrian Electronic Army, hit back with a number of notable scalps yesterday. In a series of high profile hacks, the Pro-Bashar Assad group took control of the New York Times, numerous Twitter domains, and ...
NSA’s UN Hacking Raises Yet More Questions: Is Nothing Left Sacred?
Last weekend, German newspaper Der Spiegal revealed the rather unsurprising news that the NSA had successfully bugged both the UN and a number of European countries’ US embassies, and also hacked into the UN’s video conferencing software in order to access any and all calls using it. Such is the extent of the NSA’s pervasive ...









