Feeds

TechExtreme has new owner

NewsFactor swallows hardware site

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

A couple of weeks ago, my inbox received a blizzard of emails, courtesy of the Sircam virus. Not so far behind was a stream of exhortations to read/link to stuff on Tech Extreme, an hyperactive hardware site which today celebrates its second birthday. Today it also becomes part of the Newsfactor network, a news aggregator-cum-producer of its own original IT-related content.

Tech Extreme, in which Newsfactor is taking a majority stake, will add 200K highly-targeted pairs of eyeballs a month to its new owner, which crows that it is expanding, while companies such as CNET are cutting back.

This is a fairly meaningless comparison - it's like The Reg boasting that our ad sales are increasing, while Yahoo!'s are falling. Yes, we're both online - but there's a huge difference in scale. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
BIG FAT Lies: Porky Pies about obesity
What really shortens lives? Reading this sort of crap in the papers
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.