Wireless@SG
   HOME
*





Wireless@SG
Wireless@SG is a wireless broadband programme developed by the Infocomm Development Authority (IDA) of Singapore as part of its Next Generation National Infocomm Infrastructure initiative, being part of the nation's 10-year masterplan called Intelligent Nation 2015 (iN2015). The targeted users of this wireless broadband network are broadly classified as "people on the move" – people who require wireless broadband access while away from their homes, schools and offices. These include students, tourists, business travellers and enterprise users such as insurance agents and real estate agents who use widely available and wireless-enabled devices such as notebook PCs and PDAs. Once connected, users will be able to access all Internet-based services, including online gaming, web surfing, instant messaging, VoIP and email. History The IDA issued a Call-for-Collaboration (CFC) early 2006 for interested operators to provide such coverage. Late 2006, IDA has accepted the propos ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Wireless@SG Logo
Wireless@SG is a wireless broadband programme developed by the Infocomm Development Authority (IDA) of Singapore as part of its Next Generation National Infocomm Infrastructure initiative, being part of the nation's 10-year masterplan called Intelligent Nation 2015 (iN2015). The targeted users of this wireless broadband network are broadly classified as "people on the move" – people who require wireless broadband access while away from their homes, schools and offices. These include students, tourists, business travellers and enterprise users such as insurance agents and real estate agents who use widely available and wireless-enabled devices such as notebook PCs and PDAs. Once connected, users will be able to access all Internet-based services, including online gaming, web surfing, instant messaging, VoIP and email. History The IDA issued a Call-for-Collaboration (CFC) early 2006 for interested operators to provide such coverage. Late 2006, IDA has accepted the proposa ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ICELL Network
iCELL Network Pte Ltd was a Singapore-based wireless infrastructure provider. It was, at one time in the 2000s, one of the three operators of the Wireless@SG programme in Singapore. History The company was formed in 2004, spun off from PC-Connect, a company focusing on systems' integration, which, in turn, was spun off from Neat Technologies in 2002. The Infocomm Development Authority of Singapore The Infocomm Media Development Authority (IMDA) is a statutory board under the Singapore Ministry of Communications and Information (MCI). History Following the passing of the Info-communications Media Development Authority Bill in Parliame ... (IDA) selected iCELL to be one of the three initial service providers for Wireless@SG. iCELL was eventually dropped from the programme in July 2013, when the company's proposal did not meet IDA's requirements for the next deployment phase of the programme. In 2015, Chua Thiong Kien was sentenced to six months imprisonment for cheating ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ICELL Network Pte Ltd
iCELL Network Pte Ltd was a Singapore-based wireless infrastructure provider. It was, at one time in the 2000s, one of the three operators of the Wireless@SG programme in Singapore. History The company was formed in 2004, spun off from PC-Connect, a company focusing on systems' integration, which, in turn, was spun off from Neat Technologies in 2002. The Infocomm Development Authority of Singapore The Infocomm Media Development Authority (IMDA) is a statutory board under the Singapore Ministry of Communications and Information (MCI). History Following the passing of the Info-communications Media Development Authority Bill in Parliame ... (IDA) selected iCELL to be one of the three initial service providers for Wireless@SG. iCELL was eventually dropped from the programme in July 2013, when the company's proposal did not meet IDA's requirements for the next deployment phase of the programme. In 2015, Chua Thiong Kien was sentenced to six months imprisonment for cheating ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Internet In Singapore
In Singapore, there are 11,512,900 broadband Internet subscribers (as of February 2015). There are three major Internet service providers in Singapore, namely, Singtel, StarHub, and M1 and other growing providers like MyRepublic and ViewQwest. Over the years, the Singapore Government has been promoting the usage of broadband Internet access, as part of its Intelligent Nation 2015 (iN2015) and Smart Nation initiative. Internet access is readily available in Singapore, with a connectivity rate of over 99%. Surveys have also indicated a significant emotional connectedness between Singaporeans with their internet access. In August 2018, Ookla's tests determined that Singapore's broadband speed of 181.47 Mbit/s is the highest in the world. History Before the Internet, Singapore was the first country in the world to launch an interactive information service to the public. A service known as Teleview was jointly developed by Telecom Authority of Singapore (TAS) and GEC-Marconi of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


IN2015
Intelligent Nation 2015 (iN2015) is a 10-year master plan by the Government of Singapore to improve Singapore's infocomm infrastructure over the next decade. Led by the Infocomm Development Authority of Singapore (IDA), iN2015 involves several organizations. According to IDA, iN2015 is the blueprint to navigate Singapore's "transition into a global city, universally recognized as an enviable synthesis of technology, infrastructure, enterprise and manpower". The Singapore government hopes to use iN2015 to greatly expand Singapore's infocomm industry. Purpose The vision of iN2015 is: Singapore: an Intelligent Nation, a Global City, powered By Infocomm. The goals of the program are as follows: * To be the first in the world in harnessing infocomm to add value to the economy and society. * To realize a 2–fold increase in the value-add of the infocomm industry to S$26 billion. * To realize a 3–fold increase in infocomm export revenue to S$60 billion. * To create 80,000 addit ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Personal Computer
A personal computer (PC) is a multi-purpose microcomputer whose size, capabilities, and price make it feasible for individual use. Personal computers are intended to be operated directly by an end user, rather than by a computer expert or technician. Unlike large, costly minicomputers and mainframes, time-sharing by many people at the same time is not used with personal computers. Primarily in the late 1970s and 1980s, the term home computer was also used. Institutional or corporate computer owners in the 1960s had to write their own programs to do any useful work with the machines. While personal computer users may develop their own applications, usually these systems run commercial software, free-of-charge software ("freeware"), which is most often proprietary, or free and open-source software, which is provided in "ready-to-run", or binary, form. Software for personal computers is typically developed and distributed independently from the hardware or operating system ma ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Anti-virus
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other malware, antivirus software started to protect from other computer threats. In particular, modern antivirus software can protect users from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraud tools, adware, and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT), and botnet DDoS attacks. History 1949–1980 period (pre-antivirus days) Although the roots of the computer viru ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Personal Firewall
A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall. A personal firewall differs from a conventional firewall in terms of scale. A personal firewall will usually protect only the computer on which it is installed, as compared to a conventional firewall which is normally installed on a designated interface between two or more networks, such as a router or proxy server. Hence, personal firewalls allow a security policy to be defined for individual computers, whereas a conventional firewall controls the policy between the networks that it connects. The per-computer scope of personal firewalls is useful to protect machines that are moved across different networks. For example, a laptop computer may be used on a trusted intranet at a workplace where minimal protection is needed as a conventional firewall is already in place, a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Virtual Private Network
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The benefits of a VPN include increases in functionality, security, and management of the private network. It provides access to resources that are inaccessible on the public network and is typically used for remote workers. Encryption is common, although not an inherent part of a VPN connection. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated circuits or with tunneling protocols over existing networks. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely. Types Virtual private networks may be classified into several categories: ;Remote acce ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Captive Portal
A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources. Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license agreement, acceptable use policy, survey completion, or other valid credentials that both the host and user agree to adhere by. Captive portals are used for a broad range of mobile and pedestrian broadband services – including cable and commercially provided Wi-Fi and home hotspots. A captive portal can also be used to provide access to enterprise or residential wired networks, such as apartment houses, hotel rooms, and business centers. The captive portal is presented to the client and is stored either at the gateway or on a web server hosting the web page. Depending on the feature set of the gateway, websites or TCP ports can be white-listed ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


EAP-MSCHAPv2
: ''PEAP is also an acronym for Personal Egress Air Packs.'' Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.Protected EAP Protocol (PEAP) Version 2, /tools.ietf.org/html/draft-josefsson-pppext-eap-tls-eap-10 draft-josefsson-pppext-eap-tls-eap-10 abstract The purpose was to correct deficiencies in EAP; EAP assumed a protected communication channel, such as that provided by physical security, so facilities for protection of the EAP conversation were not provided. PEAP was jointly developed by Cisco Systems, Microsoft, and RSA Security. PEAPv0 was the version included with Microsoft Windows XP and was nominally defined in /tools.ietf.org/html/draft-kamath-pppext-peapv0-00 draft-kamath-pppext-peapv0-00 PEAPv1 and PEAPv2 were defined in different versions of ''draft-josefsson-pppext-eap-tls- ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]