Language Selection

English French German Italian Portuguese Spanish

Why is the SA Deputy President signing deals with M$?

Filed under
Microsoft

Steve Ballmer is in town. For those of you who don't know, he is the CEO of Microsoft.

Ballmer is apparently here to sign a memorandum of understanding with the Deputy President Phumzile Mlambo-Ngcuka and the Universal Services Agency(USA). It is a deal in which Microsoft is committing to give software to telecentres and community centres in poor areas, and assist them with training (the specifics of the deal are not that clear and Tectonic didn't get invited to the signing so we have to rely on what we've gleaned from a few reliable sources.)

So why is this important?

For a start it is important because Steve Ballmer is not only the second-in-command at the world's largest proprietary software company but he is also a man who has been widely quoted as labelling Linux as a "cancer".

It is important because South Africa's second-in-command (our deputy president) is signing deals with Microsoft's number two and yet the South African government has a Cabinet-level strategy to use free and open source software.

Full Story.



Elsewhere on Tectonic: Open source software is locally relevant, globally competitive and can make good business sense. That was the message from some of South Africa's top open source
pioneers at the African Computing & Telecommunications Summit in Johannesburg yesterday.

Open source high on agenda at ACT Summit.

More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News