Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Saturday, December 27, 2014

Malaysia is number 1 for mobile Internet access

This would give you an indication of mobile device usage in this country.

A study conducted by TNS which includes more than 150,000 interviews across 56 countries on consumers' online behaviour shows that Malaysia is 1 out of only 5 places in the world where smartphone usage has outstripped computers.

The 5 countries where smartphone usage has outstripped computers are:



The study found that in Malaysia, 35% of the users surveyed said that they exclusively use their smartphones and no other device to access the Internet, making Malaysia the #1 country in the world when it comes to smartphone Internet access exclusivity.

The same high smartphone adoption pattern stretched across the rest of the Asia Pacific region with many of the countries above the 50% adoption mark. Even countries that traditionally have lagged behind have registered significant growth like Vietnam at 36%, up 16 percent from 2013.


Apart from Malaysia, the only smartphone-only Internet access was true for other Asian countries:

Vietnam: 24%
Singapore: 16%
South Korea: 14%
Hong Kong: 14%

In the Western world this trend is a single-digit one, e.g. Germany is at 7%, and the UK at 6%.


Search engines

Using search engines on smartphones is ubiquitous. 72% of Malaysians do this at least once a month, and the figures are even higher in the rest of Asia  - Singapore: 88%, Vietnam: 92%, Korea: 99%, Japan: 91%. This is a global trend with the UK, France and Germany all reporting figures of 88%.


On internet penetration 

Malaysians have at least 1.2 Internet-enabled devices, which underlines the importance of the multi-screen trend: using more than one device to achieve a task, or using devices simultaneously.

"This research clearly shows that Asian consumers have taken charge of the internet, and are shaping it in their own image - Malaysians are at the forefront of this trend, using their mobile devices to access news, look for local businesses and watch videos." - Sajith Sivanandan, MD, Google Malaysia.


- Source: CW Malaysia

Thursday, June 26, 2014

Thaicom first in Asia to introduce in-flight broadband

I'd love to have this onboard AirAsia's Airbus as I will be travelling frequently in the second half of this year. If correctly priced, in-flight broadband would be a hit among today's connected generation.

I would be one of those passengers who'd subscribe to such services.



How it works. Image from Thaicom's service provider, row44.com


Another first for Thailand

Thailand's leading satellite operator, Thaicom has become the first in the Asia Pacific region to introduce commercial in-flight connectivity services using Ku-band to provide broadband on commercial flights beginning in August 2014.

The nation's premium low cost carrier Nok Air, which clocks about 48,000 flights per year will provide broadband Wi-Fi services on many of its aircraft starting in August - ranging from Internet access to other complimentary services in the future.   

The Thaicom In-Flight Connectivity (IFC) broadband service, with its partner Global Eagle Entertainment/Row44, will be implemented as a value added service for Nok Air passengers. The service is capable of delivering 3G-like speed for a superior in-flight broadband experience.

"Nok Air is adding in-flight Wi-Fi to our existing complimentary services to increase the appeal to passengers, particularly the new generation who insist on connectivity." - Patee Sarasin, Chief Executive Officer of Nok Airlines

The carrier has already offered free broadband connection at airport boarding gates and the introduction of in-flight Wi-Fi is consistent with the airline's drive to be innovative. Cool!


You can read more about this at Computerworld Malaysia

Friday, March 21, 2014

Affordable personal clouds launched in Malaysia by Western Digital

Are you currently keeping tonnes of pictures, video clips, music or documents in your hard drives and intend to access them from anywhere, anytime? Why not create your own cloud storage?

Western Digital has announced the availability of two My Cloud devices that are meant for home users and small business owner who need some form of networked storage that is affordable.

They are Western Digital My Cloud and Western Digital My Cloud EX2.


Western Digital My Cloud - for personal (home use)


The My Cloud is a single drive network storage device that provides you with your own cloud storage solution without the need to register or pay for any cloud storage services. When connected to the internet via an RJ-45 cable, you can access My Cloud from anywhere in the world as long as your computer or smartphone or tablet is connected to the internet.

Meanwhile, the My Cloud EX2 is a two-bay variant of the older My Cloud EX4 four-bay network-attached storage (NAS). Similar to the EX4, the EX2 is designed for professionals and prosumers that need a reliable device to save, back-up, stream and manage large amounts of data.


Relative size of the My Cloud EX2 (left) and My Cloud (right). Photo: Computerworld Malaysia


Both My Cloud and My Cloud EX2 has desktop and mobile apps that enable you to access the NAS from wherever you are and they can be downloaded for free on both Android and iOS stores.

Apart from the obvious, they can also serve as a home's digital entertainment hub that can then be streamed to any DLNA-certified multimedia device such as a WD TV Live media player, smart TVs, etc.


MyCloud and My Cloud EX2: Prices

These storage devices are now available at select retailers nationwide, with prices starting from RM499 for the My Cloud and from RM1,159 for the My Cloud EX2. The retailed prices are as follow:

My Cloud 2TB - RM499
My Cloud 3TB - RM649
My Cloud 4TB - RM799

My Cloud EX2, 4TB - RM1,159
My Cloud EX2, 6TB - RM1,459
My Cloud EX2, 8TB - RM1,959

To have an idea and expert opinion of these network-attached storage devices, you can read online reviews here:

1) Western Digital My Cloud - by Engadget and PC Magazine
2) Western Digital My Cloud EX2 - by Cnet and PC Magazine


TheGreenMechanics: I'm going to check them out at Low Yat Plaza a little bit later this evening to find out the street prices.

Wednesday, February 5, 2014

Android phones are world’s most malware-infected mobile devices

This is because smart phones running on Android system dominate the mobile device population. This does not necessarily means that Android phones are more prone to attack than those running on Windows and iOS.

According to an article published in Computerworld, the most common types of malware infecting Android devices arethe following:
  • Adware
  • Information Stealers
  • SpyPhone
  • SMS Trojans
  • Banking Trojans
  • Fake Security Software


Samsung Galaxy S4. Samsung smartphones and tabs are running on Android operating system.


Most malware-infected

Android smart phones are the world's most malware-infected mobile devices with 60% of them globally having been successfully targeted by malicious software in the last quarter of (Q4) 2013.

This was according to the Kindsight Security Labs Malware Report-Q4 2013 whose findings have been made available recently. The report by the malware detection arm of the Ontario-based network security solutions provider said the figures regarding infected devices was conservative.

It explained that this was because detectors of Alcatel-Lucent-Kindsight's parent company-were not employed in China and Russia where infection rates are known to be higher.


Android devices have the largest market share

The report attributed the 60% infection rate to the fact that Android devices hold the largest share of the global market for smartphones. It explained cybercriminals often go after low hanging fruit to maximise results from their efforts. It likewise said 40% of infected devices were Windows PCs connected to the mobile network.

On the other hand, iPhone, Blackberry, Symbian and Windows Mobile accounted for less than one percent of infected mobile devices.

Unlike the iPhone or Blackberry, the Android offers the ability to load them from third party app sites.

Source: Computerworld Malaysia


TheGreenMechanics: International Telecommunications Union estimated that there are 2.1 billion smartphones globally. If you are in the higher risk bracket, just play safe and be very careful with what you download into your phone.

Thursday, September 26, 2013

Revolutionary conferencing system launched in Malaysia

Not too sure if this can be termed 'revolutionary' but one thing is for sure - it's a first in Malaysia.

A couple of weeks ago, Bosch launched a new conference system called DCN Multimedia, which uses Internet Protocol-based OMNEO media networking architecture with touch screen conference devices based on the Android operating system.

In a nutshell, what it does is that it enables superior multimedia/remote conferencing experience - that includes audio, video, meeting content and touch-screen technology in "elegant and ergonomically" designed conference devices.


Photo shows Live-testing of the new Bosch DCN multimedia conference system. Photo by Computerworld Malaysia.



DCN Multimedia uses IP-based OMNEO media networking architecture. Photo by Computerworld Malaysia.


Bosch upped the ante on multimedia conferencing

Technology systems provider Bosch has launched a new conference system called DCN Multimedia, which uses IP-based OMNEO media networking architecture with touch screen conference devices based on the Android operating system.

DCN Multimedia is the company's latest range of conference systems that once again shows its innovative edge in developing holistic solutions for digital technology in the conference room. It claimed that the system's sound quality, interactive platforms and diverse practicality offers superior technical proficiency to allow effective communication.

The company now offered a range of meeting and conferencing applications and the new DCN system "combined audio, video, meeting content and touch-screen technology in elegant and ergonomically designed conference devices."

The high-resolution, capacitive touch-screens provide users with the information they need literally at their fingertips, allowing participants to share documents, retrieve and display presentations, as well as access the internet.


How about security standards?

Audio and control data transmitted through the system is encrypted in accordance with internationally recognised standards. This means that it is securely protected against tampering and unauthorized access.

The system allows easy expansion with OMNEO audio devices and a wide range of audio products supporting Dante technology. Enhanced functionalities can also be added to the multimedia conference devices via software and integrating third-party or custom-made apps.

Standard and open technologies can be combined with multimedia capabilities for an enhanced meeting experience.


Reference: Computerworld Malaysia

Friday, August 23, 2013

4G service now available on Mount Everest

No jungle's to deep and no mountain's too high.

That's what two of the global telecommunication giants from China  -  Huawei and China Mobile - did last month. They successfully deployed 4G coverage on Mount Everest, some 5,200 metres above sea level and demonstrated this by streaming live HD video from a Mount Everest base camp to the event venue.

This is pretty impressive, considering the engineering challenges the IT companies faced at 5,200 metres high (17,000 feet). Our own Mount Kinabalu is 4,095 metres (13,435 ft) in height.



Mount Everest is 8,848-metre high and the 4G facility is constructed at 5,200-metre high. Photo by Luca Galuzzi


This is not the first attempt at bringing high-speed broadband to the world's tallest mountain as in 2007, the two companies worked together to provide GSM services ahead of the 2008 Olympics Games torch relay. But it's a first for super-fast connectivity, the 4G LTE.


Concerns on spying?

Huawei has delivered 4G solutions to other parts of the region including EPC (Evolved Packet Core), integrated equipment rooms, BTS (Base Transceiver Station), microwave transmission and 4G devices.

However, Computerworld reported that  the company is still struggling to win approval in the UK and the US, due to its close ties with the Chinese government. Huawei's founder, Ren Zhengfei, is a former Red Army officer, but the company denies receiving any financial support from the government.

Huawei has been banned from doing business in the US and blacklisted from Australia's critical national infrastructure.


TheGreenMechanics:
Our telcos are still far behind in terms of deploying 4G LTE connectivity in this country. Instead of collaborating, they make life difficult for themselves by refusing to share the burden of putting up the network infrastructure.

Well, they shares some communication towers, but that is all.


Source: Computerworld Malaysia

Thursday, August 22, 2013

8 out of 10 Malaysian Internet users shop online

That's according to Trend Micro, a Malaysia-based Internet content developer of security and threat management solutions.

So, that makes me an odd species among the many Internet users in Malaysia as I don't really shop online. Okay, I make online rewards points redemption on my credit card, but that's about it. I don't shop online, not for foods, not for gadgets, not just yet.

Besides, I can drive to the city center in 15 minutes if I need to. But of course, things could change - if not soon, later.


Are you an online shopper?


Read what Trend Micro found out, and be warned of the risk involved:

Recent online survey shows that eight out of 10 Malaysian Internet users now shop online, an increase that reflects a global and regional increase in online commerce.

Global online retails sales passed US$1 trillion last year and are expected to grow by 17.1% this year, according to eMarketer, with the Asia Pacific region accounting for more than a third of the sales.

The company cited market research firm Nielsen's expectations that Malaysia's online shopping market would increase to RM5 billion (US$1.52 billion) by 2015.

The rapid growth of online shopping worldwide together with the immense increase of money changing hands in the cyberspace, especially after the reduction of the of the Online Interbank GIRO (IBG) to 10 sen, will attract more cyber criminals to target online shoppers.


Risks for online shoppers:

"The main risks for online shoppers lie in replying to unsolicited emails spoofed to appear to originate from reputable retailers. Clicking through the links in these could lead unsuspecting users to a phishing site designed to steal their credit card credentials."
- Goh Chee Hoh, Managing Director, SEA Region, Trend Micro Inc


TheGreenMechanics: So, at a dinner table of ten Internet savvies, two of us would be at odds with the rest of the people. Wow, that's a bit stressing, LOL.


Source: Computerworld Malaysia

Saturday, July 20, 2013

5 Tips for Securing Your Wireless Network

My friend is a System Analyst and he administrate our IT network at enterprise level.

The networks, depending on location, vary from small, localised system to wide virtual interconnection between offices and premises miles away from each others. So, this article might be of interest to him and I'm sure he and many others can benefit from some of the ideas presented here.


Typical clients of a wireless router. Image credit: ConceptDraw


I found that some of them are pertinent to my situation but they could be essential to other professions.

Five pointers or tips to wireless network security:

1. Security practices are essential for wireless networks of all types.

Strong encryption—preferably use WPA2. An eavesdropper can pick up wireless signals from the street or a parking lot and break older security algorithms like WEP in minutes using tools readily available on the Web.

Complex passwords. Cybercriminals can use cloud computing resources to test millions of passwords in minutes, so wireless passwords should be 10 characters or longer and include numbers and special characters.

Unique SSIDs. SSIDs are part of the password used for WPA2 encryption. Hackers use“rainbow tables” to test common SSIDs, so administrators should pick unique network names (but not ones that identify their organisation).

VPNs for remote access. Virtual private networks are essential to protect communications from mobile employees (who can put a VPN client on their devices) and remote offices (which can use economical, point-to-point VPN connections).

Employee education and published policies. Employees need to be educated on secure networking practices. In companies with bring-your-own-device (BYOD) policies, this includes acceptable uses of personal devices for company business.

2. Provide controlled access for Guests

Uncontrolled access to wireless networks is a common security issue. Often, customers,suppliers and other office visitors are given IDs and passwords that provide perpetual access to internal networks. Stories abound of contractors whose passwords remained valid for weeks or months after they moved on to other employers.

Some organisations address this problem by providing a separate guest network with limited access to core IT systems. This approach addresses the issue of transient guests, but it is expensive and not always useful for contractors and long-term guests.

Another approach is to find tools that restrict guest and contractor access to appropriate periods of time and place limits on their activities.

3. Manage multiple access points in Central Offices

Deploying and managing wireless access points can be time-consuming. Large offices and campuses may require many access points to cover all office areas, conference rooms andmeeting spaces used by employees. Multiple wireless networks for different groups and for guests can add to the work.

A best-case scenario is to find tools that do not require specialised knowledge or a long learning curve, so the work can be done by network administrators rather than wireless networking specialists.

4. Manage access points in Remote Offices

Providing technical support to remote and branch offices is also a challenge. Constant travel is rarely an option, and it is difficult to work through remote personnel, particularly if no local IT staff is available.

Administrators need to find tools that allow them to deploy, monitor and update remote access points from a central console.

5. Integrate wireless traffic into the Network Security Infrastructure

Cybercriminals are increasingly targeting wireless traffic as an avenue to penetrate enterprise networks. They are exploiting:

· The growing number of remote and mobile workers. 
· Home computers and mobile devices that lack the endpoint protection tools.
· Bring-your-own-computer policies that limit the control that companies have over the selection and configuration of mobile devices.

To prevent wireless traffic from becoming a major threat vector, enterprises should ensure that wireless traffic flows through the full network security infrastructure so it can be scanned for malware. Probes and attacks can also be detected.


Source: Tech @TheStar