NBN Co technicians miss 469 appointments a day
said that between 1 July 2018 and 20 February this year, the total number of missed technician appointments was 114,093 – a shade under 470 a day.
NBN Co classifies as a missed appointment a situation where the technician doesn’t attend the premises within an agreed window of time.
These windows are broad – between 4.5 hours and 5 hours – and retail service providers say installation could take up to eight hours.
Though the actual number of missed appointments rose, the ratio of kept to missed appointments remains the same – essentially “91 percent of appointments were not missed”.
NBN Co will pay a $25 rebate for missed appointments “automatically … without RSPs needing to claim,” the network operator said in a statement. 12/09/18
Telstra is dragging its public payphones into the 21st century
owns more than 16,000 payphones across the country, and despite the increasing use of mobile devices, there were 13 million calls made from payphones last year, 200,000 of which were Triple Zero calls.
already started upgrading 1800 payphones in metropolitan areas, the first major redesign since 1983.
So far, 34 digital payphones have been installed in Melbourne. Telstra acknowledged that there were concerns about the size of the new payphones, which are 15cm wider than the classic booths. Manwaring said the larger size was to accommodate for fibre connections and equipment, and that they would only be installed in non-pedestrian thoroughfares.
He added that more advanced digital payphones are expected to rollout in 2020.
it is envisaged that over time the new payphones will provide a number of additional services for the community, including mobile phone charging, wi-fi access, as well as providing a space for communicating everything from emergency alerts to a range of content services such as public transport information to city maps, weather, tourist advice, information on nearby cultural attractions and the ability to promote the work of charitable organisations
AWS drops cloud storage price to $2/terabyte/month
as introduced a new tier of cloud storage that will store a terabyte of data for about $2.00 per month, or $0.002 a gigabyte.
You read that right. One terabyte. Two Australian dollars. Or about $1.40 if you store it in one of Amazon’s US data centres, where the price is just US$0.00099 per gigbayte.
The new tier is called “Glacier Deep Archive” and is aimed at data that’s “collected and immediately processed, then stored for years or decades just in case there’s a need for further processing or analysis.” AWS suggests financial services companies might fancy the service for long-term storage of transaction data, and that it’s a fine way to store security camera footage.
retrieving your data can be achieved “in 12 hours or less.” So this is not a service for those with short recovery time objectives. It’s also pricey to retrieve data: $0.024 per gigabyte on top of AWS transfer fees of at least $0.11 per gigabyte.
Glacier Deep Archive is already available in Australia: AWS’ pricing page lists the service as live in the Asia Pacific (Sydney) region.
Kogan again tops consumer complaints list
New South Wales Department of Fair Trading has again named Kogan the State’s most complained-about company on its new monthly Complaints Register for February 2018.
Kogan produced 17.5 percent of all complaints.
registered 72 complaints in February 2019
Apple (36)
and Samsung (43)
JB HiFi and LG Electronics scored 16 apiece
A score of 70 or 72, Kogan’s January and February marks, are seldom achieved by any company.
Google shuts failed social network Google+
Google+ was launched as an invite-only platform in June 2011, before opening up to the public later in the year.
It had many of the features typical of social networks, with the ability to post photos and status updates on individual feeds.
The consumer version of Google+ currently has low usage and engagement – 90% of Google+ user sessions are less than five seconds,
The Google Cemetery site was created by Naeem Nur “to make my friends keep on working on their new ideas, even if they fail”.
Google begins shutting down its failed Google+ social network
https://www.theverge.com/2019/4/2/18290637/google-plus-shutdown-consumer-personal-account-delete
and
https://www.theverge.com/2019/1/24/18194474/how-to-download-google-plus-data
- Google has officially started the process of shutting down and deleting all consumer accounts on its Google+ social network platform as of 2 days ago.
- The reason Google+ is being phased out is due to “low usage” and because it has turned into something of a security liability for Google. The company has disclosed two significant data leaks that could have exposed information for tens of millions of Google+ users to outside developers.
- The first vulnerability, which was kept secret for months, prompted Google to decide it was time to close Google+ for good, and the second led to the company accelerating those shutdown plans by four months, meaning the service will meet its end in April instead of August.
- In both cases, Google said there’s been no evidence that developers were aware of these bugs or that they took advantage of them. The access to Google+ APIs had already been cut off.
If you need to get your personal data off Google+ , go to https://www.theverge.com/2019/1/24/18194474/how-to-download-google-plus-data and follow the steps there.
Basically in a nutshell it’s a matter of signing into your Google account, go to Takeout. (This is where Google invites you to download all of your data.)
Toggle each service on, that you want to download and pay attention to the little downward arrow that is to the left of some of the toggles. Those arrows indicate that you can select in which format you want your data to be downloaded.
There are several services that you want to select if you’re interested in your Google+ data.
- Google+ and Google+ websites
- Google+ Circles – Your contacts.
- Google+ Communities.
- Google+ Stream
- All of your Google+ posts. You can download the entire thing, or you can choose a specific type of data: ActivityLog, Collections, Events, Photos, or Posts.
————————————————————————
Scooti, you can now hail a
two-wheeled taxi ride
- Scooter taxi service Scooti launched in Melbourne on Monday. It allows people to hail a scooter via an app and travel around the city on two wheels.
- The company claims that its service is much cheaper, greener, and quicker than travelling by car. The company’s app connects scooter drivers with people that are looking for a ride in the same way that Uber’s connects car drivers with passengers.
- You won’t need to worry about bringing a helmet either, as the scooter driver is obliged to provide one for all passengers.
- “All drivers are specially trained, insured and certified under government legislation,” Scooti operate mainly in and around the CBD where most roads are 40 km/hr zones, and the helmets, hairnets and safety vests are provided to all our customers.”
- It will operate daily from 5am to 10pm. Scooti plans to expand to Sydney and Brisbane if the launch goes well in Melbourne.
——————————————————————————————————————-
When it come to IT systems
What is a honeypot?
https://www.techworld.com.au/article/659528/what-honeypot-trap-catching-hackers-act/?fp=16&fpid=1
- A honeypot is a trap that an IT pro lays for a malicious hacker, hoping that they’ll interact with it in a way that provides useful intelligence. It’s one of the oldest security measures in IT.
There is a few different types of Honey Pots
- A pure honeypot – is a physical server setup in such a way as to lure in attackers. Special monitoring software keeps an eye on the connection between the honeypot and the rest of the network.
- Because these are full-fledged machines, they make for a more realistic-looking target to attackers, but there is a risk that attackers could turn the tables on the honeypot’s creators and use the honeypot as a staging server for attacks.
- Then there’s the High-interaction honeypot – It uses virtual machines to keep potentially compromised systems isolated. Multiple virtual honeypots can be run on a single physical device. This makes it easier to scale up to multiple honeypots and to sandbox compromised systems and then shut them down and restart them, restored to a pristine state.
- A team that controls the honeypot can watch the techniques hackers use to infiltrate thier systems, they can then escalate privileges, There are different types of honeypots that are set up by security companies, academics, and government agencies looking to examine the threat landscape. Their creators may be interested in learning what sort of attacks are out there, getting details on how specific kinds of attacks work, or even trying to lure a particular hacker in the hopes of tracing the attack back to its source.
- Splunk can be used as a security tool that can take in information from honeypots,There is more details on the link provided in the show notes too, also if you want to know what type of software are used and if you want to setup your own Honey Pot , there is also a link on that page to details on how to do that too.
Jordan
https://www.msn.com/en-us/news/technology/does-apple-even-care-about-computers-anymore/ar-BBVyI4R
https://www.msn.com/en-us/news/technology/iphone-11-could-have-much-larger-battery-for-reverse-charging/ar-BBVzxAn