David Leane, Author at Techbest - Top Tech Reviews In Australia - Page 8 of 10

Figure 02 Humanoid Robot Reveals Significant Enhancements


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

“`html

Figure 02 Humanoid Robot Introduces Significant Enhancements

Recently, the robotics firm Figure has unveiled a new trailer showcasing their forthcoming Figure 02 robot.

Summary

  • The Figure 02 robot highlights substantial hardware improvements, including foot, hips, legs, and hand design.
  • New actuators provide specific torque and movement range for greater efficiency.
  • Revolutionary bendable structures enhance safety and versatility.
  • Advanced hand design closely resembling human manipulation capabilities.
  • Teaser illustrates a preview of the head and battery configuration, with the complete reveal scheduled for August 6th.

Foot

The video begins with a detailed view of the robot’s foot, exhibiting a completely reinvented approach to how the robot engages with the ground.

In the side view, we observe a foot that mimics the shape of a human foot, tapering down to the toes in a manner that would comfortably fit a shoe.

What truly sets this foot apart from human prototypes is the rear, featuring a space between the ankle and the heel. As the camera rotates to showcase the back, we see the foot lift, initiating the walking motion.

From this angle, the gap and the angled joint enable the foot to rotate, imitating the movement of human feet and ankles in a remarkably natural manner.

The underside of the foot reveals textured protrusions, clearly designed to enhance grip as the robot traverses various surfaces. Materials like tiles or wet concrete could be slippery, and this grip should aid in stabilizing the foot as the robot progresses. However, it does raise concerns about potential wear over time.

Hips and Legs

The video ascends the body, unveiling a collection of new actuators. The following list details the capabilities of each actuator featured in the video. These actuators are integrated throughout the knees and hips of the Figure 02 robot.

  • A2 – Torque 50Nm, Range of Movement (ROM) – 48°
  • L4 – Torque – 150Nm, ROM 135°
  • L1 – Torque – 150Nm, ROM 195°

As the video progresses, we notice the legs are designed symmetrically, swapping positions from left to right. Standardizing components on both sides minimizes manufacturing complexity and costs, allowing software to adapt for usage on either side of the body.

Actuators

The competition in the humanoid robot sector is intensely fierce, and actuator design is a crucial differentiator. Purchasing ready-made solutions isn’t feasible, and Figure showcases a disassembled actuator, illustrating components often hidden from view, which I believe is crucial in the design process.

“`

Australian Unity Achieves Successful Implementation of 7 From 78 AI Applications


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Australian Unity Effectively Deploys AI Technology

Quick Summary

  • Australian Unity moves 7 AI use cases into production from a total of 78 identified.
  • The organisation takes a prudent stance towards AI deployment.
  • One use case features a machine learning tool created by BigID for scanning sensitive information.
  • This tool assists in finding and handling sensitive data across various storage systems.
  • Different data management regulations apply across sectors such as health insurance and wealth management.

Australian Unity’s Tactical AI Deployment

Australian Unity, a prominent mutual organization engaged in varied sectors including banking, financial advisement, retirement living, and private health insurance, has proficiently advanced seven AI use cases out of the 78 potential opportunities identified. This strategic yet careful methodology of AI adoption was underscored by Craig Rowlands, General Manager of Data and Analytics, at the Gartner Data & Analytics Summit.

Australian Unity AI deployment progress

AI Use Cases Entering Production

Rowlands revealed that the AI deployment process at Australian Unity starts with in-house development of solutions to verify their effectiveness prior to rollout for members and customers. From 78 AI use cases in their framework, seven have transitioned to a production phase, while the others remain at various development stages, from business case initiation to minimum viable product (MVP).

BigID’s Machine Learning Solution

A significant AI use case includes a machine learning tool from BigID, tailored to scan the organisation’s ecosystem for sensitive data. This tool has been pivotal in pinpointing personally identifiable information (PII), health records, financial data, confidential business data, and intellectual properties within Australian Unity’s data repositories.

Rowlands elaborated that BigID’s tool facilitates the identification of sensitive data in both originating and source systems, as well as in any copies that may inhabit the environment. Recently, the tool pinpointed sensitive information within a new folder on a shared drive, enabling the organisation to promptly resolve the issue.

Rules for Data Management and Lifecycle

The tool’s capacity to distinguish data management and lifecycle rules across various divisions of Australian Unity’s business, such as health insurance and wealth management, adds further value. Each division maintains separate retention policies, and the tool aids in ensuring adherence to these diverse regulations.

Conclusion

Australian Unity’s deliberate and systematic method toward AI deployment has resulted in the successful advancement of seven out of 78 recognized AI use cases. With solutions like BigID’s machine learning data scanner, the organisation enhances its ability to handle sensitive data while complying with varied data lifecycle regulations across its sectors. This tactical approach underscores the significance of cautious AI adoption in realizing substantial and enduring outcomes.

Q&A

Q: Why is Australian Unity taking a cautious approach to AI?

A:

Australian Unity traditionally adheres to a risk-averse philosophy, emphasizing the need for AI solutions to be effective and secure before introduction to members and customers.

Q: What function does BigID’s machine learning tool serve in Australian Unity’s AI strategy?

A:

BigID’s tool scans for sensitive data throughout the organisation’s landscape, assisting in the identification and management of PII, health information, financial data, and other sensitive assets.

Q: How many AI use cases has Australian Unity transitioned to production?

A:

From 78 identified AI use cases, Australian Unity has transitioned seven into the production phase.

Q: What kinds of data does the BigID tool assist in managing?

A:

The tool aids in managing various forms of sensitive data, including personally identifiable information, health records, financial details, confidential business data, and intellectual property.

Q: How does Australian Unity manage varying data lifecycle rules?

A:

The organization utilizes solutions like BigID to guarantee compliance with the distinctly different data management and retention regulations relevant to various divisions of its operations, such as health insurance and wealth management.

Q: What are the phases of AI use case development at Australian Unity?

A:

AI use cases at Australian Unity progress through stages ranging from business case initiation to MVP and subsequently towards a production result.

Telstra and Optus Pressured to Delay 3G Network Closures


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Telstra and Optus Called to Delay 3G Network Shutdowns

Telstra and Optus Called to Delay 3G Network Shutdowns

Telstra and Optus called to delay 3G shutdowns

Quick Overview

  • Parliamentary inquiry requests Telstra and Optus to postpone their 3G shutdowns.
  • Inquiry chair Matt Canavan suggests a voluntary delay; government action may follow if ignored.
  • More than 100,000 customers could be affected by the 3G shutdown.
  • Telecoms are offering complimentary handsets to aid in the transition.
  • Optus and Telstra are dedicated to moving customers to 4G and 5G networks.
  • 3G shutdowns are scheduled to take place around September of this year.

Inquiry Background

A last-minute parliamentary inquiry has prompted Telstra and Optus to “voluntarily” reconsider their 3G network shutdown strategies. Nevertheless, it appears the telecommunications leaders remain committed to their original timelines. The inquiry, led by Nationals Senator Matt Canavan, raises crucial concerns regarding customer preparedness for transitioning to advanced technologies.

Initiatives to Transition Customers

Both Telstra and Optus are making significant efforts to shift customers to 4G and 5G networks. These initiatives include providing free handsets to individuals still using 3G devices. However, it has come to light that over 100,000 customers might not take action prior to the anticipated shutdowns in September.

Potential for Government Intervention

Senator Canavan has reached out to both firms, advocating for a voluntary delay. Should this request be overlooked, the inquiry has suggested that the government could negotiate a postponement or impose a final carrier license condition to compel action.

Responses from Telecoms

Optus’ Perspective

Optus Vice President of Government and Regulatory Affairs, Andrew Sheridan, acknowledged the inquiry’s insights. He underlined the public interest in enabling a seamless transition and reducing risks to public safety. Sheridan expressed, “Decommissioning 3G is essential for Optus to reallocate spectrum, enhancing the quality of 4G and extending 5G coverage.”

Telstra’s Perspective

While a spokesperson for Telstra was unavailable for comment, sources suggest that Telstra also supports its shutdown agenda and timelines. Both companies are actively working to minimize negative impacts on customers and assist in the transition from 3G to more advanced technologies.

Consumer Implications

Government input over the last week has advised consumers to take action ahead of the impending 3G network shutdowns. These shutdowns have been planned for years, but the urgency has intensified as the deadline looms closer.

Conclusion

The parliamentary inquiry has brought forth significant worries regarding customer readiness to shift from 3G to modern networks. Although Telstra and Optus have made strides to facilitate this transition, the potential consequences for over 100,000 customers remain a pressing concern. Upcoming government actions could involve negotiations or regulatory interventions to promote a smoother transition.

Q: Why are Telstra and Optus planning to discontinue their 3G networks?

A:

The discontinuation of 3G networks allows Telstra and Optus to redeploy the spectrum for enhanced 4G services and comprehensive 5G coverage. This shift is vital for improving network performance and meeting the rising demand for data.

Q: What initiatives have Telstra and Optus implemented to assist customers in transitioning from 3G?

A:

Both telecommunications companies have distributed free devices and set up dedicated support teams to help customers migrate to 4G and 5G networks. They have also ensured device offers remain available to facilitate the transition.

Q: What consequences will arise if Telstra and Optus do not choose to delay the 3G shutdown voluntarily?

A:

If Telstra and Optus do not voluntarily postpone the shutdown, the government may pursue negotiations for a delay or impose a carrier license condition to enforce compliance. This action could help ensure a more seamless transition for affected users.

Q: How many customers are projected to be affected by the 3G network shutdown?

A:

It is anticipated that over 100,000 customers may not respond before the 3G networks are decommissioned. These individuals could encounter connectivity challenges without transitioning to updated devices and networks.

Q: When is the planned date for the 3G network shutdown?

A:

The scheduled shutdowns for the 3G network are set to occur around September this year. Customers are encouraged to take action before this deadline to prevent any service interruption.

Microsoft’s DDoS Defense Misstep Intensifies Azure Service Outages


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Error in Microsoft’s DDoS Defence Causing Increased Azure Service Disruptions

Error in Microsoft’s DDoS Defence Causing Increased Azure Service Disruptions

A recent error in Microsoft’s DDoS defence has led to major disruptions within Azure and Microsoft 365 services. Below is an analysis of what happened and its implications for Australian companies depending on these services.

Microsoft DDoS defence error intensifies attack effects on Azure services

Quick Overview

  • Microsoft encountered a DDoS attack impacting Azure Front Door and Azure CDN services.
  • An error in the DDoS defence setup magnified the effects of the attack.
  • Services impacted included Microsoft 365, Purview, App Services, among others.
  • Problems lasted from 9:45pm AEST to 5:43am AEST.
  • A detailed preliminary report on the incident is expected to be published by Microsoft soon.

Insights into the DDoS Attack

A DDoS attack aims to disrupt a service by inundating it with excessive traffic. In this case, it targeted Microsoft’s content delivery frameworks, Azure Front Door, and Azure CDN. DDoS attacks can dramatically affect service availability, causing outages and interruptions.

Flaw in DDoS Defence Execution

Microsoft’s DDoS protection features activated as anticipated due to the assault. However, a flaw in the setup of these defences unintentionally increased the attack’s effects instead of lessening them. This flaw resulted in broader service outages than were initially expected.

Service Issues and Resolution

Problems commenced at 11:45 UTC (9:45pm AEST) and were rectified by 19:43 UTC (5:43am AEST). Services impacted included a portion of Microsoft 365, Purview, App Services, Application Insights, and the Azure portal itself. Microsoft addressed the issue by modifying network configurations and executing failovers to alternative networking routes.

Next Steps and Detailed Analysis

Microsoft has pledged to issue a more in-depth preliminary post-incident report later in the week. This report is expected to provide further insights into the cause of the error and outline the steps taken to avert similar incidents in the future.

Recap

An error in Microsoft’s implementation of its DDoS defences during a recent attack led to intensified service disruptions across Azure and Microsoft 365 services. Although the issues have been resolved, a comprehensive report is anticipated to clarify the incident and suggest future preventive actions.

Q&A

Q: What constitutes a DDoS attack?

A:

A DDoS (Distributed Denial-of-Service) attack refers to overwhelming a network or service with a surge of internet traffic, rendering it inaccessible to legitimate users.

Q: Which Microsoft services were impacted by the recent DDoS attack?

A:

The impacted services encompassed Azure Front Door, Azure CDN, a portion of Microsoft 365 offerings, Purview services, App Services, Application Insights, and the Azure portal.

Q: How long did the service disruptions persist?

A:

The disruptions began at 11:45 UTC (9:45pm AEST) and concluded by 19:43 UTC (5:43am AEST).

Q: What measures did Microsoft take to resolve the problem?

A:

Microsoft implemented network configuration amendments to bolster DDoS protection efforts and initiated failovers to alternative networking routes for relief.

Q: Will Microsoft share additional details about the incident?

A:

Indeed, Microsoft is expected to issue a detailed preliminary post-incident report later in the week.

Q: How can businesses safeguard themselves against DDoS attacks?

A:

Businesses can enhance protection by deploying strong DDoS protection systems, sustaining redundant network pathways, and using comprehensive monitoring tools to identify and mitigate attacks promptly.

Aussie Government Revamps Cyber Security Leadership in Significant Ministerial Shuffle


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Australian Government Revamps Cyber Security Leadership in Notable Ministerial Reshuffle | TechBest

Australian Government Revamps Cyber Security Leadership in Notable Ministerial Reshuffle

Government revamps cyber security leadership in ministerial shake-up

Quick Read

  • Prime Minister Anthony Albanese declares a significant cabinet reshuffle.
  • Tony Burke appointed as new minister for cyber security and Home Affairs.
  • Clare O’Neil transitions to housing and homelessness responsibilities.
  • Andrew Charlton takes on special envoy role for cyber security and digital resilience.
  • ASIO will transition from Home Affairs to the Attorney-General’s department.

Overview of the Reshuffle

On Sunday afternoon, Prime Minister Anthony Albanese announced an extensive cabinet and ministerial reshuffle, marking the first major personnel shifts in two years. This reshuffle is intended to bolster Australia’s cyber security leadership and equip the country for the upcoming elections expected next year.

New Leadership in Cyber Security

Tony Burke has been designated as the new minister for cyber security and Home Affairs. Burke will also manage immigration, multicultural affairs, and the arts while continuing as leader of the house. His appointment highlights the government’s commitment to enhancing Australia’s cyber security resilience in the face of rapidly changing technological environments.

Andrew Charlton’s New Role

MP Andrew Charlton has been appointed as special envoy for cyber security and digital resilience. This newly formed advisory position will see Charlton collaborating closely with Burke and Michelle Rowland, the communications minister. Prime Minister Albanese stressed the significance of this role in addressing technological complexities and capitalizing on positive opportunities while reducing risks.

Clare O’Neil’s New Portfolio

Clare O’Neil, who formerly directed the cyber security portfolio during critical incidents such as the Optus data breach, has been reassigned to manage the housing and homelessness portfolio. In her previous role, O’Neil led a comprehensive update of the federal government’s cyber security strategy, which is currently underway.

Changes in ASIO’s Alignment

In a related adjustment, the Australian Security Intelligence Organisation (ASIO) will now be integrated into the Attorney-General’s department, connecting it more closely with the Australian Federal Police. This shift aims to enhance operations and foster better cooperation between these essential security bodies.

Summary

The recent cabinet reshuffle executed by Prime Minister Anthony Albanese signifies a considerable transformation in Australia’s cyber security and governmental framework. With Tony Burke leading cyber security and Home Affairs, and Andrew Charlton entering a new advisory capacity, the government aspires to boost its cyber resilience and prepare for forthcoming technological challenges. The shift of Clare O’Neil to the housing domain and the realignment of ASIO further illustrate the government’s strategic maneuvers leading up to the expected elections.

Q: Why was Tony Burke appointed as the new minister for cyber security and Home Affairs?

A: Tony Burke’s appointment mirrors the government’s commitment to fortifying its cyber security leadership and gearing up for the approaching elections. Burke’s extensive experience in multiple ministerial positions equips him to effectively handle the challenges in cyber security and Home Affairs.

Q: What does Andrew Charlton’s new role encompass?

A: As the special envoy for cyber security and digital resilience, Andrew Charlton will provide guidance on cyber security initiatives and digital resilience, collaborating closely with Tony Burke and other key ministers to navigate technological progress and minimize risks.

Q: How did Clare O’Neil contribute to the cyber security landscape?

A: Clare O’Neil was instrumental in overseeing the cyber security portfolio through major incidents like the Optus data breach. She also directed a significant overhaul of the federal government’s cyber security strategy, which is currently being put into action.

Q: What is the importance of ASIO’s shift to the Attorney-General’s department?

A: The transition aligns ASIO more closely with the Australian Federal Police, aiming to streamline functions and enhance coordination among primary security agencies, thereby strengthening Australia’s overall security architecture.

Q: When are the upcoming federal elections anticipated to occur?

A: Prime Minister Anthony Albanese indicated that the next federal elections are projected to take place sometime next year.

“8K Broadcasts Set for the 2024 Paris Olympics, Yet Viewers Might Be Left Out”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

8K Broadcasts Ahead for the 2024 Paris Olympics: Reasons Most Viewers Will Be Left Out

8K Broadcasts Ahead for the 2024 Paris Olympics: Reasons Most Viewers Will Be Left Out

Quick Overview

  • The 2024 Paris Olympics will include the debut of live streaming in 8K.
  • The majority of consumers currently have 4K televisions, making access to 8K viewing quite limited.
  • Exorbitant prices and scarce content represent significant obstacles to the adoption of 8K.
  • In Australia, Stan Sport is the sole provider of 4K coverage for the Olympics.
  • Channel 9 plans to provide a pre-show available in standard HD.

The Shift to 8K Technology

In 2020, Sony and Panasonic teamed with Japanese broadcaster NHK to film the Tokyo Olympics in 8K for the first occasion. Unfortunately, the Covid-19 pandemic led to the postponement of the events and disrupted these preparations. Now, the 2024 Paris Olympics aim to create history with the inaugural 8K live stream broadcast, promising an extraordinary level of detail and clarity.

To ensure 8K content delivery, the entire system—from capturing footage to consumer display—must accommodate 8K resolution. This includes 8K broadcast cameras, editing and mixing equipment, networking and storage systems, and ultimately, 8K-enabled home displays. Regrettably, most households in Australia still utilize 4K TVs, rendering access to 8K viewing rather limited.

The Price of 8K Displays

Currently, 8K televisions are present in the market, but their prices are steep. The most affordable model, a 65″ Samsung Neo QLED 8K TV, is priced around A$3,495. Larger 8K screens, which deliver the utmost viewing experience, are even pricier. A 75″ version can cost nearly A$6,495, while an 85″ 8K display might set you back close to A$10,000.

High cost of 8K TVs

The combination of these steep prices and the limited availability of native 8K content suggests that most individuals are unlikely to invest in an 8K television just yet.

The Reality of 8K Streaming

Even with an 8K display, a rapid internet connection and a suitable smart application are required to stream 8K content. Possessing a YouTube app, for example, does not automatically provide support for 8K.

8K streaming requirements

In practice, broadcasters will likely capture video in 8K but then compress it for terrestrial TV or streaming services down to 4K or even 1080p resolutions. Consequently, the vast majority of viewers will continue to experience the Olympics in lower resolutions.

Viewing the 2024 Paris Olympics in 4K

Stan Sport

Stan Sport is the exclusive distributor of 4K Olympics coverage in Australia. To access this, a Stan Premium subscription (AU$21/month) and the Stan Sport add-on (AU$15/month) are required. Coverage will commence at 3:00 AM AEST on Saturday, July 27th, 2024.

Channel 9

Channel 9 will present a pre-show starting at 1:00 AM AEST, with the main ceremony being aired in regular HD.

The Importance of 4K

4K resolution offers quadruple the detail of standard HD, leading to an exceptionally immersive viewing experience. With 4K, viewers can discern intricate elements such as crowd faces and the precise locations of ball landings, along with a sharper and more vibrant array of colors.

Additional Suggestions

  • Verify your internet speed: Ensure a stable and fast internet connection for seamless 4K streaming.
  • Set a reminder: Given the early broadcast start, make sure to set an alarm or reminder to catch all the action.
  • Host a watch party: Invite friends and family with a 4K TV to share the experience together.

Conclusion

Despite the 2024 Paris Olympics marking a significant technological advancement with its 8K live streaming, most viewers will miss the opportunity due to the exorbitant costs and limited availability of 8K TVs and content. Nevertheless, Australians can still enjoy a premium 4K viewing experience through Stan Sport and Channel 9.

Q&A

Q: What makes the 2024 Paris Olympics significant for 8K broadcast?

A:

The 2024 Paris Olympics will represent the inaugural event featuring 8K live stream broadcasts, delivering unmatched detail and clarity.

Q: Why can’t most viewers access 8K?

A:

Most viewers do not have the requisite 8K-compatible displays, and the high costs along with limited content pose difficulties for 8K adoption.

Q: How can Australians access 4K coverage of the Olympics?

A:

Australians can view 4K Olympic coverage through Stan Sport, which necessitates a Stan Premium subscription and the Stan Sport add-on. Channel 9 will also air a pre-show in standard HD.

Q: What advantages are there to viewing the Olympics in 4K?

A:

4K resolution delivers four times the detail compared to standard HD, granting an immersive viewing experience with sharper visuals and a broader spectrum of colors.

Q: What requirements are necessary for streaming 8K content?

A:

To stream 8K content, an 8K display, a very high-speed internet connection, and a smart app capable of 8K streaming are necessary.

Q: When will the Opening Ceremony of the 2024 Paris Olympics occur?

A:

The Opening Ceremony is scheduled for Saturday, July 27th, 2024, at 3:00 AM AEST.

Optus Attracts Users with Complimentary 7-Day eSim and 30GB Data Trial.


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Optus Attracts Customers with Complimentary 7-Day eSim and 30GB Data Trial

Optus Provides Complimentary 7-Day eSim Trial with 30GB of Data

Quick Read

  • Optus provides a complimentary 7-day eSim trial that includes 30GB of data.
  • The trial is free of charge and obligation-free.
  • Users can effortlessly toggle between their existing network and Optus to make comparisons.
  • The trial offers unlimited standard national calls and 1,000 standard national messages.
  • Accessible via the My Optus app on devices that support eSIM.
  • Optus Network Pulse assists users in comprehending the quality of their connection.

If you’re the runner-up in Australia’s mobile market, you often need to think outside the box to capture more market share. Optus is giving Australians the opportunity to test its mobile network at no cost.

Optus Free 7-Day eSim and 30GB Data Trial

Optus has significantly invested in enhancing its mobile network, resulting in better speeds and wider coverage. Changing to a new mobile provider might often feel risky, so to ease this transition, Optus is offering participants the opportunity to test its network for free for 7 days through the My Optus app on an eSIM-compatible device.

This is your chance to try out the Optus network firsthand, without needing to depend on a friend’s feedback or a coverage map. Usually, such offers involve a form of commitment or lead to a paid subscription after the trial ends, but this one is completely free and requires no commitments.

The Optus Network Trial Experience

During the trial period, customers will be provided with 30GB of data, unlimited standard national calls, and 1,000 standard national text messages for a duration of 7 days within Australia. This trial is crafted to be straightforward, without any obligations or hidden conditions, reflecting the telecommunications company’s commitment to customer empowerment and transparency.

Eligible customers can experience the Optus network for 7 days without needing to provide payment details by registering through the My Optus app. An eligibility check will confirm that customers qualify for the Optus Network Trial and have a device compatible with eSIM. Throughout the trial, you can conduct speed tests and receive a performance quality score, all accessible within the Optus app.

Steps to Join the Trial

  1. Install the My Optus app.
  2. Register for the trial by adhering to the instructions in the application.
  3. Enable your eSIM and take advantage of 7 days of complimentary connectivity.

Comprehending Optus Network Pulse

Customers involved in the trial can effortlessly verify their connection using the My Optus app, where they have access to Optus Network Pulse. Network Pulse is an engaging, visual tool that allows customers to comprehend the quality of their connection on the Optus mobile network, all within the My Optus app.

Maurice McCarthy’s Insight

Maurice McCarthy, Managing Director of Customer Success at Optus, expresses his excitement:

“We’re thrilled to introduce the Optus Network Trial. This daring step highlights our trust in our network. With the ease of eSIM and our top-rated My Optus app, users can retain their current number while exploring the Optus mobile network. We are confident that once customers witness the Optus advantage, they’ll transition confidently.”

Frequently Asked Questions

Q: Is it possible to retain my current number during the trial period?

Yes, with eSIM technology, customers can retain their current number while trying out the Optus mobile network.

Q: Are there any undisclosed fees or obligations?

A: No, the trial is entirely free, with no hidden fees or obligations. The service automatically ends after 7 days.

Q: What are some methods to monitor my data consumption during the trial period?

You can get real-time usage notifications and monitor your data with the My Optus app.

What occurs following the 7-day trial period?

The service terminates automatically after 7 days. Nevertheless, customers can easily transfer their current number and keep using the Optus network by switching to an Optus mobile plan.

Q: How can I determine if my device supports eSIM?

The My Optus app will carry out an eligibility check to determine if your device supports eSIM before you register for the trial.

Summary

Optus has launched a new program enabling Australians to test its upgraded mobile network with a complimentary 7-day eSIM trial, offering 30GB of data. This obligation-free trial allows users to compare their existing service with Optus’s network seamlessly. The trial also features unlimited standard national calls and 1,000 standard national texts. Eligible individuals can effortlessly sign up through the My Optus app on eSIM-compatible devices and monitor their connection strength with Optus Network Pulse. For further details, visit https://tinyurl.com/Optus-Trial.

Vandal Damages BYD Electric Vehicle at Newcastle Street-Side Charging Station


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

BYD Electric Vehicle Charging Cable Damaged in Newcastle

Quick Read

  • A BYD Atto 3 EV charging cable was vandalized in Newcastle.
  • An incident took place at the Victoria Theatre kerbside charging station.
  • Chargers set up by JetCharge are part of the Chargefox network.
  • Kerbside chargers necessitate the use of your own Type-2 to Type-2 EV charging cables.
  • Vandalism potentially driven by opposition to electric vehicles.
  • Community assistance requested to identify the vandal using security footage.

Damaged Charging Cable in Newcastle

A BYD owner recently found their charging cable damaged overnight while charging their Atto 3 Electric Vehicle (EV) at a kerbside station in Newcastle. The incident took place at the Victoria Theatre at 8/10 Perkins St, Newcastle NSW 2300, a location that provides overnight charging for up to four vehicles.

Damaged BYD EV charging cable

Kerbside Charging Solutions

The kerbside charging stations at the Victoria Theatre, installed by JetCharge and integrated into the Chargefox network, offer AC charging at 7 kW from chargers mounted on light poles. These chargers present a practical solution for EV owners without home charging options, eliminating the need to run cables across sidewalks.

BYO Charging Cables

These curbside stations necessitate that EV owners supply their own Type-2 to Type-2 EV charging cables. These cables can be rather expensive, often costing several hundred dollars based on their length and quality.

Type-2 to Type-2 EV charging cable

Vandalism: An Increasing Issue

The recent incident of vandalism is especially discouraging, indicating a possible anti-electric vehicle attitude. Although the car was not harmed, the expensive charging cable was ruined. There is hope that local companies or inhabitants might possess security recordings that could assist in identifying the perpetrator.

Community Response

The event has ignited conversations among EV enthusiasts, with individuals exchanging their experiences and worries on forums such as the BYD EV Owners Australia group on Facebook. There is a unified plea for enhanced security protocols and heightened community awareness to avert similar incidents in the future.

Victoria Theatre kerbside charging station

Summary

The damage inflicted on a BYD Atto 3 EV charging cable in Newcastle underscores the difficulties and risks encountered by the increasing population of electric vehicle owners in Australia. With the rise of kerbside charging solutions, it is crucial for communities to back these efforts and safeguard the infrastructure from harmful actions.

Q&A

Where was the act of vandalism committed?

A:

The act of vandalism took place at the Victoria Theatre curbside charging station in Newcastle, situated at 8/10 Perkins St, Newcastle NSW 2300.

Q: What kinds of chargers can be found at this place?

A:

The site is equipped with AC chargers provided by JetCharge, offering 7 kW of power and mounted on light poles. These chargers are integrated into the Chargefox network.

Do individuals have to supply their own charging cables?

A:

Yes, users are required to provide their own Type-2 to Type-2 EV charging cables in order to utilize these kerbside chargers. These cables can be quite costly, sometimes amounting to several hundred dollars.

What could have driven someone to commit this act of vandalism?

A:

The act of vandalism appears to be driven by anti-EV sentiment, as only the charging cable was harmed, leaving the vehicle itself untouched.

Q: In what ways can the community contribute to solving this problem?

A:

The community can assist by reviewing security footage from local businesses or homes and reporting any unusual activities. Enhanced awareness and backing for electric vehicle infrastructure are also essential.

Q: Where can I talk more about this incident?

A:

You can find discussions about this incident in the BYD EV Owners Australia group on Facebook. Group members share their experiences and concerns about owning electric vehicles and the associated challenges.

Harnessing the Cloud’s Potential: The Revolutionary Seamless Migration by Fusion5


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

“`

Harnessing Cloud Potential: Fusion5’s Game-Changing Approach to Effortless Migration

Harnessing the Cloud’s Potential: How Fusion5 is Transforming Smooth Migration

Quick Read

  • Comprehend your workloads prior to transitioning to the cloud.
  • Be mindful of the expenses related to cloud services.
  • Equip your team with the essential understanding for cloud governance.
  • Select a trustworthy partner for evaluating and overseeing the migration.
  • Use infrastructure-as-code for effective administration and security.
Cloud Revolution by Fusion5

There are numerous reasons to move to the cloud, but the method an organization selects to make the transition can greatly impact the outcomes it experiences upon arrival.

Important Factors to Consider for Cloud Migration

According to Kris Jackson, the general manager of cloud infrastructure and security at Fusion5, advantages like lowered expenses, enhanced security, and better governance can be realized, though they are contingent on how well the migration is strategized and performed.

Understanding Workloads

“Firstly, ensure you have a thorough understanding of the workloads in your environment,” Jackson advises. This includes recognizing which applications and data require migration and comprehending their dependencies and performance needs.

Cost Awareness

The second important point is to ensure you understand that every minute a service operates in the cloud incurs charges. Cloud services use a pay-as-you-go model, so inefficiencies can swiftly result in excessive costs if not properly managed.

Team Preparedness

Furthermore, consider whether your business is truly prepared to handle workloads in the cloud. Does your team possess adequate knowledge of cloud concepts and the necessary governance and control measures? It is essential to provide proper training and preparation to your team to avoid mismanagement and ensure smooth operations after migration.

The Significance of a Trustworthy Companion

Jackson underscores the significance of selecting a partner capable of both accurately evaluating and overseeing the migration process, as well as training internal resources. This guarantees that the staff can effectively handle the new environment.

Infrastructure-as-Code

This opens up the possibility to shift from utilizing traditional processes for cloud management to employing machine-readable definition files, a strategy known as infrastructure-as-code. According to Jackson, this method can result in further cost savings through automation of management tasks and enhanced security.

“It’s crucial to comprehend how your team will function in the new setting and which tools they will utilize to take advantage of that automation,” Jackson explains.

Summary

Migrating to the cloud presents various advantages such as lowering expenses, boosting security, and strengthening governance. Nevertheless, comprehending workloads, being mindful of costs, and readying your team are crucial steps for a smooth transition. Collaborating with professionals such as Fusion5 can facilitate the process and secure lasting success by implementing strategies like infrastructure-as-code.

Q: What are the main advantages of transitioning to cloud computing?

A: The main advantages consist of lower expenses, enhanced security, and better governance.

Q: What factors should businesses evaluate prior to moving to the cloud?

Organizations must comprehend their workloads, stay informed about cloud service expenses, and equip their teams with the essential knowledge for effective cloud governance.

Q: Why is selecting a dependable partner for cloud migration so crucial?

A dependable partner can effectively evaluate and oversee the migration process while also training internal staff to maintain seamless operations after the migration.

Q: What does infrastructure-as-code mean?

Infrastructure as Code refers to the practice of using machine-readable definition files to manage cloud environments. This approach enhances cost efficiency and security by leveraging automation.

Q: What strategies can businesses use to control expenses related to cloud services?

A: By recognizing that cloud services incur costs by the minute, businesses can improve their planning and utilize management automation tools to maintain cost control.

Q: In what ways can Fusion5 assist with the process of migrating to the cloud?

Fusion5 can assist by evaluating and overseeing the migration process, training internal teams, and offering expertise in utilizing infrastructure-as-code for effective management and improved security.

“`

A Crowdstrike Incident Causes Unprecedented IT Disruption, Raising Significant Concerns About Testing Procedures


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

“`html

CrowdStrike’s Devastating IT Outage: Causes and Preventive Measures for Future Incidents

Quick Read

  • A CrowdStrike update leads to a significant IT outage affecting systems worldwide.
  • Initially believed to be a Microsoft outage, the issue was later identified as a bug in CrowdStrike.
  • Travel, business, and critical services have faced significant disruptions.
  • Underlying issue: unauthorized memory access resulting in a Blue Screen of Death (BSOD).
  • The solution required several intricate steps, such as booting in safe mode and uninstalling the problematic update.
  • Preventing future issues necessitates thorough testing and the implementation of phased rollouts.

What Happened?

CrowdStrike, a prominent American cybersecurity company recognized for its endpoint security solutions, released an update that unintentionally led to a worldwide IT outage. This flaw resulted in the notorious Blue Screen of Death (BSOD) on Windows computers, causing continuous reboot loops and considerable disturbances.

The problem started at approximately 4 PM Australian time on Friday, July 19, 2024. Initially blamed on Microsoft, further investigation identified CrowdStrike’s update as the cause. This unprecedented incident had far-reaching consequences:

  • Turmoil in travel: A multitude of flights were either cancelled or delayed globally.
  • Operational disruptions were experienced by banks, hospitals, emergency services, and media organizations.
  • Economic consequences: Companies suffered financial losses due to mandatory closures or decreased productivity.
  • Significant disruption: Crucial services such as online banking and hospital systems experienced interruptions.
CrowdStrike Triggers Unprecedented IT Outage, Sparks Major Concerns Over Testing Protocols
Sydney Airport’s flight information screens displaying Blue Screens of Death (BSODs)

Root Cause Analysis

CrowdStrike’s update tried to access an invalid memory address (0x9c), causing Windows to instantly shut down the application. This invalid access occurred because of a NULL pointer in the memory-unsafe C++ language. Given that security software has extensive access to system files, this error resulted in widespread system crashes.

Resolution Steps

To address the problem, CrowdStrike released a public announcement and detailed the procedures for impacted firms.

  1. Starting Windows in Safe Mode can be difficult for devices deployed in an enterprise environment because of Bitlocker encryption.
  2. Delete the problematic update—it’s more straightforward once you enter Safe Mode.

CrowdStrike stopped the spread of the flawed update and focused on releasing a fixed version. However, addressing the issue was intricate and lengthy, necessitating physical access to numerous devices.

Future Prevention Strategies

The incident highlights the necessity for stringent testing procedures and gradual implementations for crucial updates. It is imperative for security vendors to ensure their code undergoes extensive automated and manual testing prior to deployment. Gradual rollouts, akin to Microsoft’s Windows Insider Release Rings, could assist in reducing such risks by identifying problems at an early stage with smaller groups.

Moreover, operating systems such as Windows ought to integrate features that enable the rollback of faulty drivers without necessitating a full reboot or considerable manual effort.

Summary

The IT outage caused by CrowdStrike highlights the essential importance of thorough testing and gradual deployments in software updates. Although the immediate problem has been addressed, similar events in the future can be avoided by enhancing practices and protocols among both cybersecurity companies and operating system developers.

Q&A

What was the reason behind the CrowdStrike IT disruption?

A:

The interruption occurred due to a glitch in a CrowdStrike update which tried to access an invalid memory address, causing Windows PCs to experience Blue Screens of Death (BSODs).

How were various sectors impacted by the outage?

A:

The disruption led to travel turmoil with flight cancellations, interruptions in banking and hospital operations, economic losses, and public inconvenience in crucial services such as online banking and emergency communication channels.

Q: What actions were implemented to address the problem?

A:

The solution entailed starting the impacted computers in Safe Mode and uninstalling the problematic update. Additionally, CrowdStrike halted the spread of the update and released a fixed version.

Q: What measures can be taken to avoid similar incidents in the future?

A:

To ensure better future prevention, it is necessary to implement stricter testing protocols, introduce phased rollouts for updates, and incorporate built-in rollback mechanisms within operating systems to manage faulty drivers more effectively.

Why wasn’t this problem identified during testing?

A:

The incident exposes deficiencies in CrowdStrike’s testing procedures. The defective code probably succeeded in automated tests but did not perform as expected in practical situations, suggesting a requirement for more thorough testing strategies.

Q: What was CrowdStrike’s reaction to the worldwide backlash?

A:

CrowdStrike has released a public apology and outlined measures to fix the problem. The CEO is presently on an apology tour to address international concerns.

What is Microsoft’s role in preventing these problems?

A:

Microsoft can mitigate these problems by introducing rollback mechanisms for faulty drivers and ensuring that third-party updates adhere to strict safety standards before being deployed.

Q: What effect did this incident have on CrowdStrike’s market valuation?

A:

CrowdStrike saw a major decline in its market capitalization, shedding billions of dollars in value overnight due to the incident.



“`