Jordan Novet,
Jordan Novet is a technology reporter for CNBC.com who covers cloud computing, artificial intelligence, Microsoft and other enterprise software companies from the San Francisco bureau. He joined CNBC in 2017 after reporting on venture capital and startups at VentureBeat and writing about tech trends at SiliconANGLE. Novet has a master's degree in journalism from Columbia University and a bachelor's degree in history from the University of California, Berkeley.
52%
The Daily's Verdict
This author has a mixed reputation for journalistic standards. It is advisable to fact-check, scrutinize for bias, and check for conflicts of interest before relying on the author's reporting.
Bias
60%
Examples:
- The author tends to present Microsoft and its products in a positive light, without mentioning any potential drawbacks or criticisms.
Conflicts of Interest
40%
Examples:
- The author does not provide any clear evidence of conflicts of interest between Microsoft and other entities or individuals in the articles provided.
Contradictions
75%
Examples:
- The author contradicts himself by providing different information about Mustafa Suleyman's departure from DeepMind and his involvement with Inflection AI.
Deceptions
50%
Examples:
- The author uses vague terms such as 'hacked by Russian intelligence group' to describe the breach caused by Nobelium without providing any specific details or sources.
Recent Articles
Microsoft Hires Mustafa Suleyman to Lead Consumer AI Efforts, Forms New Group Called Microsoft AI
Broke On: Tuesday, 19 March 2024Microsoft has hired Mustafa Suleyman, co-founder of DeepMind and Inflection AI, to lead its consumer artificial intelligence (AI) efforts. The new Microsoft AI group will focus on Copilot products and other consumer AI initiatives. Microsoft Senior Leadership Team and Employees' Email Accounts Compromised by Russian Hackers in Cybersecurity, Legal Functions and Other Areas
Broke On: Wednesday, 31 January 2024Microsoft announced that state-backed Russian hackers accessed the email accounts of some senior leadership team and employees in cybersecurity, legal functions, and other areas. The attack was detected on January 12th by Microsoft's security response center. The threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain access to corporate email accounts including members of the senior leadership team exfiltrated some emails attached documents.