Feeds

Yahoo! vs Icahn, Yahoo! blinks first

Another proxy emerges and director quits

High performance access to file storage

Yahoo! has delayed its general meeting scheduled for 3 July and is facing another attack on its board. No new date has been set, but the meeting is expected to be held towards the end of July.

Carl Icahn has already proposed ten directors to replace the current board. Now another rebel is proposing a slate of nine directors to the board, and two Yahoo! shareholders have nominated themselves for election.

Yahoo! has also informed the Securities and Exchange Commission that Edward Kozel has resigned from the board of directors in order to spend more time with his family. Apparently he really does wish to spend more time with his family and "focus on personal matters, including moving his family to Europe this summer". Yahoo! is reducing the size of the board from ten seats to nine seats as a result.

Icahn's attempted takeover of Yahoo! might not be popular with technologists but it is winning over the markets - lots of short-term investors are now buying up Yahoo! shares in the hope the deal does go through.

Opponents of the takeover can only hope that Jerry Yang and the other Yahoos can use the extra time before the meeting to pull together some kind of a deal with Microsoft. The two companies have confirmed that they are in talks about some kind of partnership but not a full takeover. Speculation is that this will involve some kind of merging of their search business. If Yang can present such a deal to the shareholders meeting he may have some chance of fending off Icahn.

Yahoo!'s management is still urging shareholders to ignore Icahn, the other un-named proxy and the two shareholders, and vote in support of the existing board which decided against being bought by Microsoft.

Ballmer's contribution today, fresh from dodging eggs in Hungary, was to say the Yahoo! takeover was "never strategic".

Ballmer said that "Yahoo was never the strategy we were pursuing", according to Reuters. "We will spend money on some acquisitions," he said. "You can do a whole lot of things with 50 billion dollars."

How the hell you can try and spend $50bn on something which is outwith your company's strategy the monkey dance man did not make clear. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.