Feeds

Yahoo! enters! last! chance! saloon!

... through the revolving door

3 Big data security analytics techniques

The lazy reaction to Yahoo!‘s latest attempt at revival is cynicism, but a closer examination suggests it is playing a mixed hand of cards as well as it can. As we all know Yahoo! lost the search wars to Google, as did a bunch of other vendors that appeared well placed at the time. One of them, Alta Vista, ended up being acquired by Yahoo, which has never entirely given up on its original core business.

But that was a decade ago, and since then Yahoo! has appeared to limp on like a white dwarf star, still alive but no longer a blazing member of the internet firmament it once was. This is perhaps a slightly unfair metaphor, since Yahoo! has at least partly reinvented itself as a digital publisher, with a reasonable presence in online news and associated content, and this has saved it from the oblivion that once threatened.

But the strategy of trading revenue for profit, in the hope that when the opportunities came along it would at least be in a position to seize them, appeared to have come rather unstuck by the end of 2011. Net income for the year was actually down at $1.062bn compared with $1.244bn a year earlier, on revenues reduced from $6.3bn to $4.98bn. These are worrying figures and explain Yahoo!‘s decision to cut its workforce by 2,000 from its 14,000 total in early 2012, but at least it is still substantially profitable.

The most notable manifestation of this strategy during 2011 was in Yahoo!‘s partnership with Microsoft, a company that tried to take it over back in 2008. This partnership involved use of Microsoft‘s Bing search engine to run the ads and back-end on Yahoo! search. Microsoft in return received 12 per cent of the generated ad revenue, equating to around $36m per quarter, denting Yahoo!‘s revenue. But at the same time it reduced costs, because it slashed Yahoo!‘s search development expenses. This was not before time, but has freed up resources for investment in Yahoo‘s video based news and entertainment ventures, including its TV companion App for iOS devices called IntoNow. This provides synchronised news headlines, sports stats, and tweets, and is currently available in the US with European launches expected later in 2012.

Copyright © 2012, Faultline

Faultline is published by Rethink Research, a London-based publishing and consulting firm. This weekly newsletter is an assessment of the impact of the week's events in the world of digital media. Faultline is where media meets technology. Subscription details here.

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.