63542235
submission
onehitwonder writes:
WSJ looks at the cantankerous rivalry between two popular ride-sharing companies, Uber and Lyft, and the dirty tactics each employs to weaken its opponent. Lyft, for example, alleges that representives from Uber frequently order short rides from Lyft just to slow down Lyft's service and to try to poach its drivers. WSJ points out that the rivalry is more than just a made-for-TV competition: "It's a battle for a key role in the future of urban transportation."
52627981
submission
onehitwonder writes:
In short, they build it themselves. When Tesla Motors needed to improve the back-end software that runs its business, CEO Elon Musk decided not to upgrade the company's SAP system. Instead, he told his CIO, Jay Vijayan, to have the IT organization build a new back-end system, according to The Wall Street Journal. The company's team of 25 software engineers developed the new system in about four months, and it provided the company with speed and agility at a time when it was experiencing costly delivery delays on its all-electric Model S.
50482497
submission
onehitwonder writes:
Newly released documents reveal how the government uses border crossings to seize and examine travelers’ electronic devices instead of obtaining a search warrant to take them, according to The New York Times' Susan Stellin. The documents reveal what had been a mostly secretive process that allows the government to create a travel alert for a person (regardless of whether they're a suspect in an investigation), then detain that individual at a border crossing and confiscate or copy any electronic devices that person is carrying. The documents come courtesy of David House, a fund-raiser for the legal defense of Chelsea Manning, formerly known as Pfc. Bradley Manning.
49835447
submission
onehitwonder writes:
Lawrence Lessig has teamed with the Electronic Frontier Foundation to sue Liberation Music, which recently demanded that YouTube take down a lecture Lessig had posted that features clips from the song "Lisztomania" by the French band Phoenix (on Liberation Music's label). Liberation claimed copyright infringement as the reason it demanded the takedown, but in his countersuit, Lessig is claiming Liberation's "overly aggressive takedown violates the DMCA and that it should be made to pay damages," according to Ars Technica.
49801551
submission
onehitwonder writes:
The race to build out advanced cellphone networks in the U.S. has contributed to a spike in deaths among tower workers, making this one of the industry’s deadliest years and drawing fresh scrutiny from federal regulators, according to The Wall Street Journal. At least 10 workers have died in falls from communication towers so far this year, and three more were seriously injured. The accidents, nine of which were related to cellphone network work, come during one of the biggest building booms in years, as Sprint Corp. and T-Mobile US Inc. ramp up major network upgrades in an attempt to catch up with Verizon Wireless and AT&T Inc.
49191359
submission
onehitwonder writes:
A recent article in The Wall Street Journal’s CIO Journal argues in favor of the benefits of cyber liability insurance—policies designed to help companies cover costs they incur in the aftermath of data breaches (whether for investigation, remediation, customer notification, regulatory fines or legal settlements). Two Deloitte consultants interviewed for the article argue that cyber insurance can help companies offset the increasingly staggering costs of a data breach. (Several of the biggest data breaches in recent history, including Heartland and TJX, have cost those companies hundreds of millions of dollars. A Mizuho Investors Securities analyst estimated the total cost of the 2011 Sony data breaches at $1.25 billion.)
The question is, will insurance providers really come through when companies begin filing claims on their cyber liability policies, or will they find ways out? A 2011 article from Computerworld notes that even though a growing number of companies have been purchasing cyber insurance, it's hard to find examples where one of those policies has actually covered the costs of a data breach. Moreover, the Computerworld article points out that many cyber insurance policies cover only the cost of re-creating whatever data may have been lost during the breach--not notification costs, legal costs or other related expenses.
46943583
submission
onehitwonder writes:
Long Island's North Shore University Hospital is using sensors and video cameras to make sure employees wash their hands, according to an article in today's New York Times. Motion sensors detect when hospital staff enter an intensive care unit, and the sensors trigger a video camera. Feeds from the video camera are transmitted to India, where workers there check to make sure staff are washing their hands. The NYT article notes that hospital workers wash their hands as little as 30 percent of the time that they interact with patients. The Big Brother like system is intended to reduce transmission of infections as well as the costs associated with treating them.