Bloomingdale's major gift card glitch illustrated two huge retail IT security issues. First, human approval of gift cards can avoid some big problems. Second, chains have almost no meaningful system for dealing with such glitches.
Stories by Evan Schuman
Printed coupons and mobile devices are as far apart as Bitcoins and silver dollars. One company that's been specializing in bridging the gap sees the answer in not looking at any one element and instead layering.
IT's relationship with privacy is delicate. Corporate IT needs to take privacy fears very seriously, but if IT jumps and shouts at every tiny possible privacy invasion, we'll have the Bot That Cried Wolf. Put another way, the best way to weaken privacy protections is to embrace so many privacy problems that none have any significance.
Two prominent appellate courts have ruled in two unrelated privacy cases and dealt dual blows to privacy. A New York state appeals court said that Facebook had no right to resist coughing up extensive details about what its users are saying, while a federal appeals court said that anyone who unintentionally telephones someone -- a pocket-dial, sometimes known a bit more impolitely -- can't expect the listener to not listen and use the information.
Sometimes, emotions make it difficult to see the most effective way of accomplishing an objective. And emotions can definitely arise when the subject is underage cyberthieves.
Most companies' social media policies, if they exist at all, are highly inadequate, outdated or both.
Yahoo, the once-mighty search-engine company, executed some remarkably graceless legal pirouettes as it tried to defend its invasive email scanning practices -- scanning of emails not sent by Yahoo Mail customers who had signed off on the terms of service, but the emails of people who had sent email to Yahoo users. All to no avail. Last week (May 26), a federal judge approved a class-action lawsuit against Yahoo. But a review of the arguments that Yahoo tried in court is rather entertaining.
Some things are just so predictable. A retailer is told about a mobile security hole and dismisses it, saying it could never happen in real life -- and then it happens. A manufacturer of passenger jets ridicules the risk posed by a wireless security hole in its aircraft, saying defensive mechanisms wouldn't let it happen -- and then it happens.
Every now and then, a product comes along that is either genius-level brilliant or celestially clueless. To get the CC award, product designers must force themselves to not only ignore the bad ways the product could be used or to naively believe that minimal safeguards would prevent them. For your consideration: the GeniCan, which scans and otherwise figures out almost everything you are throwing away or recycling and wirelessly transmits that data back to the mother ship.
In retail -- and especially in e-commerce -- there's a nuanced distinction between having a very popular sale and arranging for far too little merchandise. It's like those hold recordings that say the lengthy hold time is because of high customer call volume, prompting most people to mumble, "That and the fact that you're too cheap to hire enough call center operators."
Sony is reliving the nightmare that <a href="http://www.computerworld.com/article/2858358/fbi-calls-sony-hack-organized-but-declines-to-name-source-or-finger-north-korea.html">its hacked databases</a> gave rise to late last year, now that <a href="http://www.computerworld.com/article/2910891/wikileaks-publishes-searchable-database-of-hacked-sony-docs.html">Wikileaks has thoughtfully published all of the leaked documents in a searchable database</a>. Really, they are the most courteous hoodlums ever.
I've been using email longer than most people (more than a quarter of a century), so I think I have the credibility to say it's overdue for an overhaul.
It's a time-honored tradition: U.S. businesses find ways to skirt inconvenient or expensive laws by moving operations to other countries. Thus we have had U.S. corporations operating overseas to exploit child labor, run sweatshops or avoid taxes and rigorous health and safety inspections. Now the U.S. government says something similar is happening in regards to email.
This week, shortly after former U.S. Secretary of State Hillary Clinton became the poster child for enterprise BYOD issues, she held a news conference to explain and justify her convenience-oriented defense. During that briefing, she said that her private email server "was set up for President Clinton's office. And it had numerous safeguards. It was on property guarded by the Secret Service. And there were no security breaches."