Skip to main content

How functional and secure AES is

How functional and secure AES is? The Philippine electorate will once again go to polls and decide who will lead the nation in the next six years of their lives. This important event which will elect new president, vice president and 12 senators for national posts, and seats are also being contested for provincial, city and municipal levels, is expected to be counted unofficially in 24 hours, concluded or canvassed officially in a few days or so but authorities and observers expected it to be done in less than a week. Last presidential election, it was known three days after close of election precincts. This is especially true for nation states, not only the Philippines, that conducts their elections using automated election or computerized-and-networked voting systems. In PH, the past automated elections were encumbered with technical issues and fraudulent results, uttered and written everywhere by many concerned and affected individuals and institutions alike. This time, we could say

What speed did you really subscribe to

For some customers who just want to have Internet connection, speed is 2MB wireless broadband, they would ask the telco’s sales representative if they can avail of the current offering, and if it is available in their area. Some sales representative would surely shoot it with yes, and we already have presence nationwide, and you would pay less from the service if you subscribe now. Maybe, because there is an on-going promotion especially if the so-called offering is a new service. Like for instance, a customer have subscribed on the service. The customer, does not know anything except that it already paid it and, is now ready and excited to use broadband. It turns to be not getting what has been expected. 

If you are familiar with the real situation you would always know there is an exception. Not all areas are suitable for that kind of speed or in other term frequency. Plus if you live, even though you are in the city, where, no signal is reachable, service is still being provisioned or maybe already installed but erratic, et al. It can also be because the network is full and congested. This, later on, despite the customer’s complaint that could not use the service, will be used by the telco to collect fees because the customer is still in the so-called locked-in period.

Congestion may not happen if only they would consider the capacity available, like for instance, in a particular area. Eliminating the notion about profiteering and not providing a decent service. This can also be a case to case basis.

Comments

Popular posts from this blog

[TW] IT documents, audit and leaders

IT documents comes with different names such as the following: - Manual or handbook, - Policies and procedures, - Management systems, - Project plans. In the real world we have various names with unique descriptions and purposes when in fact they could be made to do a uniform direction for which actions are based for the entire IT initiatives, probably the longest in IT lifecycle is operation. The problem is our inclination on something else which is wrong. IT remains an IT area. Business remains a business area. The same problem is carried out when we conduct IT audit. Most audit are missing the gists in which IT is being used by businesses. We once said that an effective IT audit is conducted by IT people themselves but there is something wrong with that even. Business and accounting people have been doing it with a different bias and preconceived notions which doesn't make the cut for IT direction and audit respectively. Leaders play the same game and so the problem continues an

[TW] Technology impact on enterprises, consumer and data

The best time to learn the art and science of technology consulting or just the necessary practice required for a business not to be left behind or not to bleed cash unnessentially is now. Technology is magnanimous but it doesn't mean it has to continue being an alien to almost everyone. Technologies surrounding computers, the Internet, programmable devices, sensors, AI, differentiated network convergence and decentralized systems, data and content are gaining an unprecedented development and adaptation within, and greatly affecting, enterprises, societies and their people. It must be the more powerful that everyone become a learned stakeholder, not just an end-user and leave everything to the vendor, service provider and their technology counterparts. Smart cities are a giant technological upgrade and the experience must make people deal more for their lives in a better way. Why make everyone learn? Businesses can focus what matters to them. Technology can primarily help organizat