Softbank's computer system was snowed under Saturday and Sunday by massive applications following the introduction of the mobile number portability system, which allows people to switch cell phone carriers without changing their numbers. The system was resumed Monday.The computer system was paralyzed when swamped by a huge number of applications that Son described as "beyond our expectations."Softbank acknowledged the computer system did not have enough capacity.To prepare for this weekend, which is likely to draw another massive number of applications because Friday is a national holiday, Softbank will accept only new subscriptions, cancellations and repairs between Wednesday and Sunday.In addition, Softbank Mobile Corp. is investigated for the violation of goods display law on its advertisements. By those atitudes of Softbank Mobile Corp., I think the company will lose its trust. Actually, I want it to be gone as a mobile corpolation because of no reason.
Monday, October 30, 2006
Son offers apology for weekend crash
Monday, October 23, 2006
What Is "Net Neutrality"?
At the Internet boom in 1990's, many companies invested a lot of money to the construct of optical fiber. However, many of those companies went bankrupt as the boom calmed down. As a result, we can use those infrastructures of the optical fiber in low prices. Today, however, since
the broadband has infiltrated rapidly, the extra band of the optical fiber has been dwindling. To react that, the broadband companies required to invest much more. But there is one big problem. Are the broadband companies able to invest the money to the construction of infrastructure to supply the explosive demand for the communication. Therefore, the network management people indicate the broadband companies require to earn the money from companies using the Internet by any ways.
Sunday, October 15, 2006
Introduce 3 Good Web Sites (in English)
Amazon.com is good because it is so convenient for shopping because I can buy almost everything I want there, books, CDs, DVDs, and other goods. I always use it if I want to buy something that I cannot get near my house. Things in amazon are also discounted, so I can buy something cheaper than shops nearby. Also, I can buy forigne books and other items I want, so amazon is one of most important sites for my daily life.
Wikdiipea is good because I can find the basic information about almost everything there. And I can use the site from everywhere whenever. In addition, it has deep and detailed information as much as other encyclopedia web sites. So, it's vry usuful.
These sites help my life.
Monday, October 09, 2006
Computer Gifts I Would Buy for Friends & Family
I have an ipod nano 2GB, and I use it almost everyday in the train, or on the street. It has about five hundreds of songs in its small body. Therefore, it means that I can have a lot of variety of 500 favorite songs always in my pocket. So, I would like them to feel comfortable same as me in daily life. Ipods can contain many kinds of information from the conputers. It is able to be used as a flash memory, so I can put not only music but also pictures, and movies. Moreover, we can see those movies in the ipod's screen. I think ipod will be one of the most important computer device in daily use. I f I see people who do not have ipods, I will recommend those people that you should have ipods.
By the way, recently, the new ipod nano was released. It has 8GB capacity to put the information. It is attractive because my ipod can not have songs that I want to bring.
Monday, October 02, 2006
Social Engineering
Social engineering is a kind of criminal related to computer using. It is caused by an outside hacker's tricks in order to obtain information the hacker needs to access to the system. Also, it's to get information from a person without breaking into a system. Moreover, everyone seems to agree upon is hacker has a clever control skill to make people trust him. Always, the hacker's purpose is to gain illegal access to an important system and information. Social engineering is not exactly the same as hacking. Social engineering attack takes place on the physical and psychological. On the physical attack, the hacker attacks in the workplace, your trash, and on the phone.
For example, the hacker walks into your workplace and pretends like a maintenance worker or consultant who has access to the organization. Another way to get information to access a system is just watching employee’s type in his password.
These explanations tell us how dangerous social engineering is and, also, how to protect our information from that danger. I think it's not easy, but, if the security to keep information inside the organization is completely built, the information will not leak out.