How functional and secure AES is? The Philippine electorate will once again go to polls and decide who will lead the nation in the next six years of their lives. This important event which will elect new president, vice president and 12 senators for national posts, and seats are also being contested for provincial, city and municipal levels, is expected to be counted unofficially in 24 hours, concluded or canvassed officially in a few days or so but authorities and observers expected it to be done in less than a week. Last presidential election, it was known three days after close of election precincts. This is especially true for nation states, not only the Philippines, that conducts their elections using automated election or computerized-and-networked voting systems. In PH, the past automated elections were encumbered with technical issues and fraudulent results, uttered and written everywhere by many concerned and affected individuals and institutions alike. This time, we could say
Data is important in our jobs. It is the key to factual business decisions and even market innovations. The basis for policy making in many organizations, enterprises, governments and scientific pursuits.
Data fed into AIs and technical related endeavors must be handled with caution. It must be scrutinized with keen interests and attention for stakeholders' legitimate purposes and in accordance to standard necessities, actual intentions and aims.
Excesses or any hint of raggedness is to the detriment of any customer and must be taken as cue that something sinister, if not anomaly, exists in a system. To be exact, it could be a specific code, variables and functions that facilitates such data or events and what makes them skim.
Data and identifiers makes humans and their activities numbered including but not limited to UUID, DOI, SIM, ICCID, IMEI, SEID, MEID, WWN, MAC and IP addresses. They exist in varying types of computers or devices, their processors, storage and software or applications and of which they are connected to the internet.
You can further prove what's really causing the issue by doing your own experiment, how and when your load disappears especially for local mobile prepaid subscribers which has been a problem for a very long time and yet they still are a problem. In order to do your experiment, as subscriber, and that your work is plausible you need to make sure your smartphone or whatever device you use for your SIM card to enable data or connect to the internet, and that you understand what consumes your prepaid the moment you turned on your data connection, mostly, via LTE, and now 5G which is still growing.
If your load is disappearing and you haven't even turned on your data connection and that you are certain it happened not only once but it has become frequent already, take note of the details including when you buy load and when your load began to disappear.
It also happens to postpaid. The most concrete way to monitor how your telco is billing your usage is don't use your SIM at all. You will know when you are being billed properly or that some irregularity is being tolerated or it has become part of their system.
You might want to read further about billing system here.
Comments