No joy for O2 users
Seems like no Band 20, so you are stuffed if you want 4G on O2
63 posts • joined 20 Oct 2010
Seems like no Band 20, so you are stuffed if you want 4G on O2
Agreed, but digital signage for the open-air (full sunlight) is at stupid pricing, so not needing to do video is fine if they can get the price down to a regular indoor digital signage panel.
The trick is to understand how to align business strategy to security architecture. Unfortunately having a rough idea and using goggle means you end up with a firewall and some boxes that often inhibit the business and security is thus seen as "the boys that say NO"
I'm sorry Trevor; "Proper information security requires defence in depth: layers of technologies, techniques, best practices and incident response woven together into the tapestry of everyday operations" may be correct for some businesses - but for most this approach is old-hat, and means kludging their architectures to take advantage of BYOD, Cloud, IoT and other such technologies that gives them strategic advantage.
The most agile companies are 100% cloud, using Chromebooks and BYOD; where is your need for firewalls, layers of technology etc.?? Then actually you need a CISO that understand Cloud Identity and entitlement, not layers defence.
But then you get what you pay for......
My submissions would be:
This is a great example of why you should ONLY use open formats. MP3 for you Music and e-Pub for your books. Yes, my Nook may only last until it dies, but I will have all my purchased content backed up and ready to port onto my next device. Will Apple be around in 10 or 20 years time? But at least my music (currently on my iPod) will be portable to whatever is around.
So now you will have to log any cash transaction over £5 with your local police station...... or have they forgotten the £63m, the €995bn and the US$1.2 trillion in circulation?
At what point does the CEO actually take responsibility for all this mess and resign?
When will hotels, restaurants and other establishments realise that people want free wi-fi that is truly free - slurping my personal data means it is not free.....
Let's all campaign for the mass adoption for openwirless.org as an SSID and simply let people connect.
Engine software (firmware) development is tightly controlled - to add a "feature" will have been tightly controlled with a specification, writing, testing and QA. All stages will have required approval and sign-off.
Thus is beggars belief it was "just a couple of rogue engineers".
If it really was a rogue addition then you should really worry about the whole production process and the rigour with which VW cars are produced.
I don't understand number 11; "Thou will be sceptical of everything on the Internet"
"We just need a little help about where the lock goes on this chastity bra"
In a very simple way, this neatly sidesteps all the technical arguments about can you put an backdoor into encryption for the "good guys" to use, and provides a really simple example of why ** ITS A REALLY BAD IDEA **
The Which customer satisfaction survey rated EE 2nd to bottom for "Pay monthly" and bottom for Pay as you go".
Lets ignore the real world top 35, and just splash out multi-millions on hardware, software and consultancy to implement a big-data, APT detection solution...... Oh, and lets not forget more billions on a GRC system.... and while we are trying to avoid actually fixing the root cause (at minimal cost) lets implement a "Cyber Threat Intelligence Integration Center" so we can share our woes with everyone else.....
But then we have always lived in an industry that is vendor driven, where common sense and getting the basics right have no part to play.
Why are the "experts" in this area not coming together to define how to work securely on open, public WiFi?
Secure protocols, with tools that switch on certificate pinning and force HTTPs only, and only allow you to connect with trusted sites must be the way to go; rather than needing to buy a VPN service from a company, as this:
a) does not solve the underlying problems, and
b) wont be used my the majority of the public, and
c) it liable to the same interception / attacks by anyone who owns the termination node.
By default, data must be appropriately secured when stored, in transit and in use - Jericho Forum Commandment #11. from 2005
Great shame to see they've forgotten about "when stored" and "when in use" - maybe in another 10 years....
As much I agree with what Which are trying to achieve, the speed is usually governed by physics, namely the length of copper from the exchange (or FTTC box) to the home.
Is not the pragmatic solution to charge for the percentage of actual speed delivered.
This if you advertise 18M for £10/month but I only get 9M then I only get charged £5 / month.
Or is this too simple?
So first, GIF is a global not-for-profit foundation, with matching charitable clauses with a commitment to everything being open source - it's exactly your first comment that means a new structure was needed.
And yes, if you read the original work from Jericho, and the white paper from GIF then you will see embedded the concepts of persona that meet the needs of privacy, primacy and agency.
Can't see why you are getting a blank web site - works for me!
Does not work on Chromebook, go figure..... As a web-based end-point surely this should be an ideal target for this technology - oh wait..... its a laptop that does not support Windows.....
No meaningful response from support whatsoever.
Closed ticket on not being able to send email, can only re-open by emailing from my email address #Doh! #Catch22
If I open new ticket I go the end of a very long queue.
Recommendations for a new domain hosting company please.
... the company will shortly be releasing a companion perpetual motion machine....
What you fail to mention is usability; I have TalkTalk2Go, Viber (horribly insecure) and Skype all as apps on my phone, in addition to the actual (standard) phone.
What I want, (and I think most people want,) is a ** SINGLE ** phone interface that works seamlessly whether on 3G, 4G or Wi-Fi.
If you suitcase is locked they will ask politely (demand) that you open it - What is the difference?
Don't carry anything through a border that you don't want to be subject to search - saying "electronic" is different is muddying the waters.
The more interesting case comes where if you are carrying a device that has encrypted material for which you do not hold the key (for example it's a corporate laptop used by multiple people one of which has received an encrypted file).
Take a look at the "acid tests" for a decent identity ecosystem, remembering business and e-commerce is global and "Verifiy" fails on all accounts.
Let's be clear, when no signal is available from my operator my phone will make call using any operator on the 999/112 number - and I believe even if no SIM is actually present?
Once you have started the call with a roaming operator then all cell handover will need to be done with that operator - big deal I can live with that restriction.
Simply mandate roaming; and Offcom can ensure that your provider pays a sensible surcharge to the roaming provider (at no additional cost to the user) - so when the usage gets too high in a particular area your provider has the ROI to upgrade, in-fill or provide new infrastructure in that area.
Market forces should take care of the rest!
The biggest advantage I can see in having an Android based UI - assuming it works this way - it that I do not need be be tied to the media sources that the TV manufacturer wants to give me and give long term support to.
Want ITV player - get it from the Playstore, want Plex again go to the store etc.
Need that latest version, no need to wait for a manufacturer supported version simply update it from the "standard" Playstore version.
If it really does work this way, then I for one, will be making my TV choice based on whether it has Android or not.
Note to the manufacture: locking me out of PlayStore and not letting me use Standard android media player apps will mean I will vote with my wallet!
If privacy is outlawed, only outlaws will have privacy.
Philip R. Zimmermann, June 1991
and it's corollary;
If encryption is outlawed, only outlaws will have encryption.
Thus if I encrypt, does that make me a bad guy, or just someone that wants to protect my privacy.
This is the start of a very slippy legal slope.
I'm running 5.0.0 on a UK Nexus 4 with no problems. Chose to do a full install from scratch. New OS is great - with some fantastic features. Minor niggles - Photosheres will not play (they just error) and the promised integration with my Chromebook has not materialised - (may be a Chromebook issue though).
Couple it with Snapgragon's BatteryGuru and the batter life is very acceptable given it's two years old.
Love the open to application from notifications on lock screen, and the ability to not lock then connected to a trusted device - car BT or BT headset.
All in all a must have.
Critical mass on content (apps) is critical, which is why there are only two OS players in town, Android and IOS. Outside of the emerging markets, no one will buy a high end phone unless it runs all the apps they want. So in the west it's all Marketing, marketing and more marketing either to pay a huge premium for an apple badge, or to differentiate my Android from their android.
Based on the iPhone 6 launch, it will be a 4:3 format service with 500 lines and only 4 channels available, but people will still be queueing around the block to but it.
Just use the Google authenticator app......
When will businesses (who want to leverage my information to make money) understand that the only person I want to be in control of my information is ME (Primacy) and that I want to be able to define who then has access to it (Agency).
See the original work out the Jericho Forum on Identity, and now being moved forward by the Global Identity Foundation (www.globalidentityfoundation.org)
The chromebook advantage is not only about cost - my 11in laptop with 9hrs usable battery life, instant on, 7 seconds boot, automatic updating, no additional costs for Office, AV, etc.
Performance - fantastic, browser faster than my BIG windows desktop, just plays 1080p video without problem etc. etc.
Yes the cost is significantly less.
Looking forward to the next generation of 13in 1080 screens, still with 9hrs battery!
Personal Data has value, thus any "Free" WI-Fi that asks for personal information is by definition NOT free and should be prosecuted under the trades descriptions act.
IMHO a good reason to support openwireless.org
An Acer C720 was my Christmas "experiment" - to see if I could live with this rather than my "full-fat" Windows 7 Toshiba. The answer is YES, including giving conference "powerpoint" presentations in off-line mode.
I only needed to buy an HDMI to VGA converter dongle for a couple of quid on e-bay.
Apart from that, the ability to just plug in my Android phone and get (configuration free) network connection means working on the road is now simple and instantaneous.
Add to that instant-on when I lift the lid, and a 7 second boot from cold, and a battery lifetime of 9 hours that means I really can do a whole day in London in meetings without needing to carry a charger brick with me.
Configuration free with no updates to manage.....
Close the lid, it sleeps, lift the lid it is ready to go; No more worrying of "will it resume"
The only thing missing is the ability to mount Windows file shares, but it looks like this will be here very soon.
Not only that, the reason for many people to replace the standard box supplied by the ISP is additional flexibility required, my list of things I need a router to do includes;
* VLAN Isolation
* Ability to configure "openwireless.org" and isolate from home traffic
* Ability to stream Linear IPTV
* USB Dongle for 4G Auto-failover
* (Nicety) Ability to directly support Fibre (FTTC)
Hence the use of a Draytek, however I would be interested how many more routers support configuration at this more advanced level.
“I think we can take lessons from how physical security has been mounted historically: something as simple as a castle didn’t have just one wall. There were layers of walls and eventually a redoubt within which the most precious items were kept,” Woodward says.
And how many working, walled cities are there in the world right now? Look at the history, the merchants and the people were too contained by the walls and simply bypassed them, making them obsolete, so now they are simply tourist attractions.
Fast forward to today, and if you put (more) security in the way of businesses (friction) then they simply go BYoD, Cloud. Parallel IT etc.
The Jericho Forum outlined this over 10 years ago and also gave you better models to implement.
But those who don't learn from history are doomed to repeat it (or be out of a job).
Works just fine, boot 6.5 seconds from cold, instant on from standby and I can work a whole day without needing to carry a charger.
Can produce documents and have done conference presentations from it - no it's not full blown windows but then E-mail, Word Processing, Spreadsheets and Presentations are fine.
OS is getting the API's added (not quite there) for mounting Windows Server File Shares - then we will see fuller corporate SOHO adoption.
Brought it as an experiment to see if it was usable when out and about - and it's been real success.
Only downside - Google Docs, import and export of Word, but then Libre Office on a PC also suffers, but then the blame should rest squarely with MS and their "open standard" docx format.
Really nice, 3CX Voice-mail will mail you a copy of the voice-mail left. However, it still (despite many requests and much grumbling on the bulletin board) support MP3, so it's a full-fat WAV file - not great over a poor (or mobile) e-mail link.
Other than that - probably the best SIP exchange for SOHO/SME. IMHO
Notwithstanding the date....
£10000 for a backup contract vs £10 for a subject access request - no contest!
Well not that I could find, so rather pointless, view it but need to find a PC to print it out??
Good but no banana!
The failed ERP implementation at the Quest division which resulted in the share price diving resulting in dropping outside the FTST 100 for the first time in its history. First the Quest CEO and then the ICI CEO (yes CEO not CIO) fell on their swords to placate the city - and ultimately (many think) this led to demise / sale / break-up of ICI.
Oft quoted as #1 in all time IT failures!
1. Buy from e-bay or similar a USB to SATA adaptor, then remove your hard disk and connect it to a second (clean) computer with this adaptor. Now run your scans and tests without any root kit being able to easily hide itself.
2. Put in your diary a reminder, every two weeks to run backup. Use the Microsoft "Backup" (Create System Image) - to snapshot your C: drive, along with a daily or real-time data backup program.
"Non-strategic business" (Areas we’ve failed in)
"Non-core business" (Areas we make no money from)
As an owner of a Chromebook (which I love) the biggest barrier to getting the Chrome OS into the corporate environment is an inability to mount Windows File Shares or Print to Printer Shares.
Fine is you want to go HTML for all your apps, but GoogleDrive and CloudPrint is not a prime-time solution for 99% of Corporates!
SoHo users in a greenfield environment maybe.......
The last 30 years of the PC revolution is littered with the need to upgrade or lose you Data.
The "standard" for desktop publishing was Xerox Ventura - I cant read or translate any of those files now.
How about DAT backup - loads of those tapes - little chance of reading them.
ARC compression - spend a day translating them to ZIP
I've lost count of obsolete programs and file formats I've either had to move from or that are unreadable.
Remember: in computing, if you can buy it - it's obsolete! (and plan accordingly).
In cloud: cloud is outsourcing - and any good business school will tell you the first rule of outsourcing is "understand your exit strategy".
Got one for Christmas;
* 6.5 second boot to log-on, instant sleep and restore with no worries about will it make it or not that you get with Windows.
* Instant browser, and gmail just works.
* Plugging in a USB to my Android phone and tethering just worked.
* (claimed) 9 hours on battery - the promise of a whole day on the move without a charger
* Size & weight
* Screen - good and resolution on this size screen more than adequate.
* Feed HD videos on the SD card - just works
* No Bluetooth tethering
* No SMB mounts to allow access to Windows file servers.
But where are the keys held? If you hold the keys good - if they hold the keys then the encryption is about as much good as a chocolate teapot. (Patriot Act request for Data AND Keys and you know will nothing about it).
If you hold the keys then at least a legal request needs to come to you asking for the keys, and then you can make a decision about what to do (comply or fight) - and if you comply then at least you know that the spooks have which bits of your data.
This could solve both coverage and reliability issues. If every-time there is no signal from your provider your phone is allowed to roam and ** your provider ** picks up the ** full cost ** of you having to roam to another provider, then market forces will quickly ensure coverage in those black-spots and also ensure a reliable network.
Or is this too simple?
+1 for Carbonite, similar solution here, with just over 1TB hosted at Carbonite, 20 years of home video and 40 years of photos.
Had to do a full restore when two disks in my RAID failed (large power glitch) and got everything back!