Feeds

Broadband minister Hunt LOSES portfolio, takes on national health

Forget about download speed, just try not to kill them

High performance access to file storage

Jeremy Hunt, who is the minister responsible for the government's ambitious faster broadband roll out, has been shifted out of the department for media, culture and sport into a new cabinet role as Health Secretary.

As recently as April this year, the Tory MP and homeopathy fan faced calls from the opposition to stand down after Hunt admitted he was "sympathetic" to Rupert Murdoch's bid to buy out BSkyB.

The minister's special advisor, Adam Smith – with whom Hunt had worked "extremely closely" for six years – quit his post after emails were released that showed in detail the secret talks that went on regarding Murdoch-owned News Corp's move to take over BSkyB.

The media giant eventually ditched the attempted merger at the height of the phone-hacking scandal in July 2011. But it has since emerged that messages between News Corp top flack Frédéric Michel and Smith appeared to strongly indicate that Hunt was backing the corporation's attempt to own BSkyB outright.

Despite that, Prime Minister David Cameron told MPs in April that he was sticking by Hunt.

Months later, the PM is displaying the same commitment to his minister, handing Hunt the job of Health Secretary left vacant by a sacked Andrew Lansley, who becomes Leader of the House of Commons.

Hunt told the BBC this morning that his new job was "the biggest privilege of my life" and added that he was keen to get started.

Number 10 just confirmed that Maria Miller has replaced Hunt. She takes on a broad portfolio that includes the government's revised promise to gift the UK with the "best superfast broadband network in Europe by 2015."

But she doesn't just head up the Ministry of Fun. Miller is also now the Minister for Women & Equalities.

Meanwhile, Ken Clarke learned this morning that he was no longer Justice Secretary and instead bags a wishy-washy role within the Cabinet Office. He was replaced by former work and pensions minister Chris Grayling. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.