Microsoft’s TikTok deal: bargain of the decade or a $50bn blunder? | The Guardian

Jury is out on whether video-sharing site could make Microsoft a social media giantAs the clock ticks on Microsoft’s fast-track talks to buy TikTok the jury is out on whether it marks a unique opportunity to become a global social media giant overnight, or a $50bn (£38bn) geopolitically fuelled business blunder.Donald Trump’s trade war with China has forced ByteDance, the privately owned Beijing-based parent of the video-sharing site TikTok, to pursue a sale of its US business after the president signed an executive order last week that could shut it down on 15 September. Continue reading…

Jury is out on whether video-sharing site could make Microsoft a social media giant

As the clock ticks on Microsoft’s fast-track talks to buy TikTok the jury is out on whether it marks a unique opportunity to become a global social media giant overnight, or a $50bn (£38bn) geopolitically fuelled business blunder.

Donald Trump’s trade war with China has forced ByteDance, the privately owned Beijing-based parent of the video-sharing site TikTok, to pursue a sale of its US business after the president signed an executive order last week that could shut it down on 15 September.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more