Feeds

Microsoft hits DHL with $2m lost Xbox action

Crash 'N' Burn

Internet Security Threat Report 2014

Microsoft is suing courier DHL for $2m after more than 21,000 Xboxes were damaged and looted during a train derailment last year.

The company has lodged the action (PDF) claiming breach of contact over the accident, near Duke, Texas, in October 2007, and for DHL allegedly refusing to provide any compensation.

The incident saw 12 containers in DHL's charge, which contained 21,600 Xbox units of two different models and that were destined for Hong Kong, go off the rails.

Microsoft is claiming impact damage, wetting, pilferage and shortage allegedly as a result of the train derailment. Microsoft said the amount of damage was in excess of $2m.

According to Microsoft's filing in the US District Court for the Western District of Washington, DHL: "Negligently breached its duties as common carrier, handler, bailee". Also: "At no time has plaintiff been compensated for its damages, as alleged above, by defendant, despite demands made therefor. Defendant has refused and continues to refuse to pay plaintiff's damages." ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.