Tampilkan postingan dengan label Internet. Tampilkan semua postingan
Tampilkan postingan dengan label Internet. Tampilkan semua postingan

Airtel Now Blocking BIS For Non BB Phones In Phases

Posted by Unknown Rabu, 04 Desember 2013 0 komentar
1st of December, Airtel announced to its subscribers that her BIS packages working on non BB phones would be blocked and disabled on the 2nd of December.


Well, it does seem that Airtel have started blocking the BIS for non BB phones today. This is being carried out in phases.

Airtel started disabling the ability for one to browse on non BB phones using BIS subscription at 6:20am today as reported by a number of people.

Already, some users can't connect to the internet anymore. However, some can still connect to the internet using the BIS package. This only suggest that in matters of time, everyone using such package on a non BB phone will be unable to access the internet except the SIM is put in a BlackBerry device.

Many questions have been put forward, but the one that is most frequently asked is that;

Will my subscription just end like that even if i still have days to go?

The answer to that is that, your subscription won't end. The BIS package will still be active but will only work when  the SIM is inserted into a BlackBerry phone.

Also, we do not know if the ability to share the internet on a BlackBerry phone through Hotspot would be disabled just like MTN, GLO and Etisalat are doing...we hope not though.

Guys are already planning to subscribe to their other network plans for internet services. 

Is this a good business idea from Airtel? Although other networks in Nigeria have no profit problem by not allowing their BIS package to work for non BB phones. But for Airtel, only time will tell how well this decision was.




Baca Selengkapnya ....

Airtel Disables BIS For Non BlackBerry Phones

Posted by Unknown Minggu, 01 Desember 2013 0 komentar
Airtel have decided that come 3rd of December 2013, Airtel BIS packages will stop functioning on non BlackBerry phones.


The original message from Airtel sent as a SMS reads thus:

Airtel: Dear Customer, effective 3rd Dec 2013  AIRTEL BB Plans will cease to function on non BB devices or used as a modem . Thank you. 

This means that if you have an Android phone, iPhone, iPad, Nokia phones, tablets and so on and you subscribe to the Airtel BIS plans to browse on these devices, your Internet won't be activated.

Also, we do not know if hotspot may be deactivated just like Etisalat did with their BIS package.

This is not a very encouraging or good news at all seeing how affordable the BIS plan have been for BlackBerry smartphone and how ripped off it has been for other non BlackBerry smartphones.

Only BlackBerry smartphone will work with the BIS packages. Not cool.

Please be wise and do not subscribe to this BIS packages on your non BlackBerry phone so as not to risk losing your cash.

If there's a work around to bypass this restrictions, we shall put it on this blog site.

However, on a mumu scale of 1 - 10 where do you place this decision by Airtel? Let's hear it. 

Like our Facebook page and follow us on Twitter for more smartphone news.





Baca Selengkapnya ....

David Cameron should heed Douglas Adams and ORG

Posted by Unknown Kamis, 11 Agustus 2011 0 komentar

Widely reported today are David Cameron's comments to parliament on riots and social media:

Mr Speaker, everyone watching these horrific actions will be stuck by how they were organised via social media.

Free flow of information can be used for good. But it can also be used for ill.

[And when people are using social media for violence we need to stop them.]

So we are working with the Police, the intelligence services and industry to look at whether it would be right to stop people communicating via these websites and services when we know they are plotting violence, disorder and criminality.

I have also asked the police if they need any other new powers.
(the bit in square brackets was in his press statement, but not read in the Commons)

This particular line of reasoning was magnificently rebutted by Douglas Adams in 1999:
Newsreaders still feel it is worth a special and rather worrying mention if, for instance, a crime was planned by people 'over the Internet.' They don't bother to mention when criminals use the telephone or the M4, or discuss their dastardly plans 'over a cup of tea,' though each of these was new and controversial in their day.

I was encouraged recently when the UK Govt abandoned web blocking plans in the Digital Economy Act. Understanding that the internet is there for common carriage (a mere conduit, as the EU puts it) is important. Even on its own terms this threat makes little sense: if people are plotting riots on social media, that is surely exactly the evidence you need to convict them under the UK's statutory Conspiracy law. The telephone, the M4 and cups of tea are much harder to use as sources of evidence.

The Open Rights Group, has a typically measured and thoughtful response to this.

Cameron should be careful, or he'll look to posterity like William Cobbett ranting about the pernicious evils of tea.


Baca Selengkapnya ....

The BPI's China-like clauses in the Digital Economy Bill

Posted by Unknown Selasa, 23 Maret 2010 0 komentar
In January, Bono from his self-described bully pulpit in the NY Times, called for China-style net censorship to protect 'over-rewarded rock stars':

[...]the people this reverse Robin Hooding benefits are rich service providers, whose swollen profits perfectly mirror the lost receipts of the music business.

We’re the post office, they tell us; who knows what’s in the brown-paper packages? But we know from America’s noble effort to stop child pornography, not to mention China’s ignoble effort to suppress online dissent, that it’s perfectly possible to track content.


Rebecca MacKinnon today released her prepared Congressional testimony on the effects of Chinese net-blocking - I recommend reading the whole thing, but as the British Phonographic Industry took Bono up on his challenge, and wrote internet blocking by BPI fiat into the UK Digital Economy Bill, I thought I'd look at the parallels. A previous draft of the Bill compared poorly to Magna Carta; how does it line up against Chinese practice?


Rebecca MacKinnon:

Filtering or “blocking:” This is the original and best understood form of Internet censorship. Internet users on a particular network are blocked from accessing specific websites. The technical term for this kind of censorship is “filtering.” Some congressional proceedings and legislation have also referred to this kind of censorship as “Internet jamming.” Filtering can range in scope from a home network, a school network, university network, corporate network, the entire service of a particular commercial Internet Service Provider (ISP), or all Internet connections within a specific country. It is called “filtering” because a network administrator uses special software or hardware to block access to specified web pages by banning access to certain designated domain names, Internet addresses, or any page containing specified keywords or phrases.


Digital Economy Bill, Clause 18:

18 Preventing access to specified online locations for the prevention of online copyright infringement
In Part 1 of the Copyright, Designs and Patents Act 1988, after section 97A insert—
“97B Preventing access to specified online locations for the prevention of online copyright infringement
(1) The High Court (in Scotland, the Court of Session) shall have power to grant an injunction against a service provider, requiring it to prevent access to online locations specified in the order of the Court for the prevention of online copyright infringement.[...]
the Court shall order the service provider to pay the copyright owner’s costs of the application unless there were exceptional circumstances justifying the service provider’s failure to prevent access despite notification by the copyright owner.


Note the insidious allocation of costs there, which is designed to ensure that ISPs block access or remove content on accusation, before an injunction is applied for. Here's Rebecca again on how this works in practice in China:

Deletion and removal of content: Filtering is the primary means of censoring content over which the Chinese government has no jurisdiction. When it comes to websites and Internet services over which Chinese authorities do have legal jurisdiction – usually because at least some of the company’s operations and computer servers are located in-country – why merely block or filter content when you can delete it from the Internet entirely? In Anglo-European legal parlance, the legal mechanism used to implement such a system is called “intermediary liability.” The Chinese government calls it “self-discipline,” but it amounts to the same thing, and it is precisely the legal mechanism through which Google’s Chinese search engine, Google.cn, was required to censor its search results.[7]

All Internet companies operating within Chinese jurisdiction – domestic or foreign – are held liable for everything appearing on their search engines, blogging platforms, and social networking services. They are also legally responsible for everything their users discuss or organize through chat clients and messaging services. In this way, much of the censorship and surveillance work is delegated and outsourced by the government to the private sector – who, if they fail to censor and monitor their users to the government’s satisfaction, will lose their business license and be forced to shut down. It is also the mechanism through which China-based companies must monitor and censor the conversations of more than fifty million Chinese bloggers. Politically sensitive postings are deleted or blocked from ever being published. Bloggers who get too influential in the wrong ways can have their accounts shut down and their entire blogs erased. That work is done primarily not by “Internet police” but by employees of Internet companies.[8]


The language of clause 18 reflects this implied goal of "self-discipline" too:

(2)(b) the extent to which the operator of each specified online location has taken reasonable steps to prevent copyright infringement content being accessed at or via that online location or taken reasonable steps to remove copyright infringing content from that online location (or both),
(c) whether the service provider has itself taken reasonable steps to prevent access to the specified online location,

(3) An application for an injunction under subsection (1) shall be made on notice to the service provider and to the operator of each specified online location in relation to which an injunction is sought and to the Secretary of State.
[...](4)(b) the owner of copyright before making the application made a written request to the service provider giving it a reasonable period of time to take measures to prevent its service being used to access the specified online location in the injunction, and no steps were taken,


The Chinese government has also used its control over the domain name system to block dissent. Here's Rebecca's summary again:

Domain name controls: In December, the government-affiliated China Internet Network Information Center (CNNIC) announced that it would no longer allow individuals to register Internet domain names ending in .cn. Only companies or organizations would be able to use the .cn domain.[16] While authorities explained that this measure was aimed at cleaning up pornography, fraud, and spam, a group of Chinese webmasters protested that it also violated individual rights.[17]

Authorities announced that more than 130,000 websites had shut down in the cleanup. In January a Chinese newspaper reported that self-employed individuals and freelancers conducting online business had been badly hurt by the measure.[18] Later in February, CNNIC backtracked somewhat, announcing that individuals will once again be allowed to register .cn domains, but all applicants must appear in person to confirm their registration, show a government ID, and submit a photo of themselves with their application. [19] This eliminates the possibility of anonymous domain name registration under .cn and makes it easier for authorities to warn or intimidate website operators when “objectionable” content appears.

Up to now, the UK registrar has been broadly neutral and independent of the Government, but Clause 19 of the DE Bill grabs new broad powers:

19 Powers in relation to internet domain registries
After section 124N of the Communications Act 2003 insert—
“Powers in relation to internet domain registries

124O Notification of failure in relation to internet domain registry
(1) This section applies where the Secretary of State—
(a) is satisfied that a serious relevant failure in relation to a qualifying internet domain registry is taking place or has taken place, and
(b) wishes to exercise the powers under section 124P or 124R.
(2) The Secretary of State must notify the internet domain registry, specifying the failure and a period during which the registry has the opportunity to make representations to the Secretary of State.
(3) There is a relevant failure in relation to a qualifying internet domain registry if—
(a) the registry, or any of its registrars or end-users, engages in prescribed practices that are unfair or involve the misuse of internet domain names, or
(b) the arrangements made by the registry for dealing with complaints in connection with internet domain names do not comply with prescribed requirements.
(4) A relevant failure is serious, for the purposes of this section, if it has adversely affected or is likely adversely to affect—
(a) the reputation or availability of electronic communications networks or electronic communications services provided in the United Kingdom or a part of the United Kingdom, or
(b) the interests of consumers or members of the public in the United Kingdom or a part of the United Kingdom.
(5) In subsection (3) “prescribed” means prescribed by regulations made by the Secretary of State.

In other words, the Secretary of State gets to decide what counts as misuse, and reputational damage. Clauses 20 and 21 give further powers to take over management of a registry and change it's constitution, again by fiat.

What else does China do? It selectively disconnects people from the net. Here's Rebecca again:

Localized disconnection and restriction: In times of crisis when the government wants to ensure that people cannot use the Internet or mobile phones to organize protests, connections are shut down entirely or heavily restricted in specific locations. There have been anecdotal reports of Internet connections going down or text-messaging services suddenly not working in counties or towns immediately after local disturbances broke out. The most extreme case however is Xinjiang province, a traditionally Muslim region bordering Pakistan, Kazakhstan, and Afghanistan in China’s far Northwest. After ethnic riots took place in July of last year, the Internet was cut off in the entire province for six months, along with most mobile text messaging and international phone service. Nobody in Xinjiang could send e-mail or access any website – domestic or foreign. Businesspeople had to travel to the bordering province of Gansu just to communicate with customers.[20]

Internet access and phone service have now been restored, but with severe limitations on the number of text messages people can send on their mobile phones per day, no access to overseas websites, and even very limited access to domestic Chinese websites. Xinjiang-based Internet users can only access specially watered-down versions of official Chinese news and information sites, with many of the functions such as blogging or comments disabled.[21]

Clause 10 of the Digital Economy Bill makes Localized disconnection and restriction possible through 'technical obligations' imposed on ISPs:

10 Obligations to limit internet access: assessment and preparation
After section 124F of the Communications Act 2003 insert—
“124G Obligations to limit internet access: assessment and preparation
(1) The Secretary of State may direct OFCOM to—
(a) assess whether one or more technical obligations should be imposed on internet service providers;
(b) take steps to prepare for the obligations;
(c) provide a report on the assessment or steps to the Secretary of State.
(2) A “technical obligation”, in relation to an internet service provider, is an obligation for the provider to take a technical measure against some or all relevant subscribers to its service for the purpose of preventing or reducing infringement of copyright by means of the internet.
(3) A “technical measure” is a measure that—
(a) limits the speed or other capacity of the service provided to a subscriber;
(b) prevents a subscriber from using the service to gain access to particular material, or limits such use;
(c) suspends the service provided to a subscriber; or
(d) limits the service provided to a subscriber in another way.


These clauses are in the Bill as it currently stands. They are not scheduled to be debated properly in the Commons. Harriet Harman, as leader of the Commons gets to decide if they are debated. The Open Rights Group has ways to take action, including writing to Harriet Harman and joining the protests in London on Wednesday 24th March.


Baca Selengkapnya ....

I'm with the stupid network

Posted by Unknown Sabtu, 14 Juni 2008 0 komentar
I'm looking forward to the Supernova conference next week, because Kevin Werbach always brings together an interesting group of people who care about the Internet and its future. We don't all agree on everything, which makes for some interesting debates, but we do tend to back the Open Web and the Stupid Network. It was the tenth anniversary of David Isenberg's 'Rise of the Stupid Network' paper this week, so I came up with this t-shirt design idea.

Baca Selengkapnya ....

Miasma theory - wrong in the 1840s, wrong now

Posted by Unknown Selasa, 27 Mei 2008 0 komentar
A couple of years ago I wrote:
My generation draws the Internet as a cloud that connects everyone; the younger generation experiences it as oxygen that supports their digital lives. The old generation sees this as a poisonous gas that has leaked out of their pipes, and they want to seal it up again.

Bill Thompson and Nick Carr are worried about governments interfering too:

In the real world national borders, commercial rivalries and political imperatives all come into play, turning the cloud into a miasma as heavy with menace as the fog over the Grimpen Mire that concealed the Hound of the Baskervilles in Arthur Conan Doyle's story.

Except, if you have read or listened to Steven Johnson's excellent The Ghost Map, you'll know that the miasma theory of disease was a fatal error for urban England in the 1840s - the real problem was not the bad smells in the air, but the diseases in the water. The fault, dear governments, lies not in our clouds but in your pipes.


Baca Selengkapnya ....

Comcast's Bialystock and Bloom Business Model?

Posted by Unknown Rabu, 16 April 2008 0 komentar
Tomorrow, the FCC is holding a public hearing at Stanford on Broadband network management practices. With striking timing, Comcast today managed to announce a 'Internet Bill of Rights' without inviting any users, and simultaneously cut off Dave Winer's net connection for exceeding their secret usage limits. I can't link to Comcast's policy because their website mungs the text in via javascript - here's what they say:
Excessive use means data usage that is not characteristic of a typical residential user of the service as determined by Comcast.[...]Comcast currently identifies well less than 1% of Comcast High-Speed Internet customers as excessive users each month. [...]Many excessive users consume more data than a business-class T1 line running at full capacity in a month. [T1 is 1.5 Mbit/sec - Comcast claims to offer 12 Mbit/sec for PowerBoost, and 6/8 Mbit/sec standard] [...] Currently, each month Comcast identifies the top bandwidth users of its High-Speed Internet service by determining aggregate data usage across its entire customer base nationwide.

What they are saying is that they use a crude averaging model, and penalize you if you don't fit, for example by using the connection capacity they promise more than 10% of the time. Now, this could be called Procrustean, but it reminds me of The Producers, where Bialystock and Bloom sold a hundred people 10% shares of the show, assuming it would fail. Sadly for Comcast, people like Dave are finding new uses for the net's bandwidth, and not just checking email sporadically any more.

Conventional internet service user models are based on users downloading more then they upload, from common big media sites that can be easily cached. However, as Odlyzko pointed out, citing Lesk's now decade-old work, the dominant form of data creation is photographs. Now all these photographs are actually digital, and we want to share them so others can see them. Because we aren't allowed to run our own servers by the likes of Comcast, we have to upload them to Flickr or Photobucket or Picasa to share them. This gives us an 'upload more than you download' network flow, as we send them up at full multi-megapixel resolution, but browse a few of each others' at thumbnail or reduced size. And that's before we even consider video uploading (which I've noticed Comcast throttles at 0.4 Mbit/sec for me).

Comcast hit the news before by sabotaging Bittorrent transfers by faking reset packets, but what Bittorrent is really doing is arbitraging around the asymmetric network bandwidth delivered by these outdated user models.

Bob Briscoe recently wrote an interesting proposal on handling congestion by TCP signalling to reveal the costs of congestion. This was spun by George Ou as an attack on P2P protocols, but the underlying principle of penalising those who cause congestion is an interesting one. The question I'd like answered is that if I have a gigabit network at home, and the internet backbone is multi-terabit, when Comcast throttles my uploads to 400 kilobits, aren't they the ones causing the congestion?


Baca Selengkapnya ....
Trik SEO Terbaru support Online Shop Baju Wanita - Original design by Bamz | Copyright of apk zenonia 5.