Some photos of this year's technology show & conference, held at the Hershey Lodge.
Tuesday, November 5, 2013
Thursday, September 19, 2013
Cryptolocker - RansomWare Threat
A computer virus is a software program designed to destroy or steal data. They are often a nuisance,usually designed with malicious purpose, either to disrupt activity, steal information or some other type of financial gain. Viruses have been known to wipe systems out, destroy hardware, or fill a hard drive up with junk applications.
Ransomeware is a computer virus that infects a system and limits access until the owner of the comptuer pays the creator of the virus to have it removed. The Moneypak virus is one such example.
Recently, a new variant of Ransomware (in this case crypto malware) has emerged called Cryptolocker. Crypto Malware infects a computer with a program that takes control of the system and connects to a control server to obtain an encryption key and apply it to specific files on a computer. Cryptolocker utilizes a 256 bit Advanced Encryption Standard (AES) key. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. Although the original server handing out encryption keys has been taken down, the virus is still being spread
There always exists a motive for the virus's author.Viruses can be used for marketing, theft or political statements. They can bring down home PCs or large corporate networks. Viruses exist under many forms, such as boot sector viruses or browser hijackers to name two. In some cases, a virus will infect a system for the purpose of delivering a "payload", which is other malware with a different purpose.
About two years ago, a new virus called "MoneyPak" came online. When a PC became infected, a phony message was displayed saying the FBI will seize the machine unless a $300 moneypak card was purchased from CVS or Walgreens. From a technical perspective, this was a simple annoying virus that was easy to remove. Gullible users would buy the card and pay the fee, most simply sought out technical help to have the virus removed.
Ransomeware
Recently, a new variant of Ransomware (in this case crypto malware) has emerged called Cryptolocker. Crypto Malware infects a computer with a program that takes control of the system and connects to a control server to obtain an encryption key and apply it to specific files on a computer. Cryptolocker utilizes a 256 bit Advanced Encryption Standard (AES) key. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. Although the original server handing out encryption keys has been taken down, the virus is still being spread
Current forms of the virus go after typical productivity files such as Microsoft Word, Excel, WordPerfect files, Access databases, photos and other multimedia files. Essentially, files you use everyday. Once the files are encrypted, the only way to read those files is through the key.The virus gives the end users options for obtaining a key, usually by paying a $300 un-lock fee.
How the Virus is Spread
To date, the virus is sent to host computers through "social engineering", which typically has been email. Phony emails typically appear to be from FedEx notifying the reader that a package is waiting for them, and to click a link for more information.
Prevention
The best methods to avert falling victim to these scams are:
1. End user education - stay informed on computer malware threats
2. Solid e-mail spam filtering
Public e-mail services through Microsoft (Hotmail, Outlook.com) or Google (Gmail) are generally good at eliminating these threats through behavior tracking technology. Private domain based mail accounts (YourOrganization.com) generally don't have aggressive enough spam filtration that will eliminate the majority of these threats. If you would like to improve your current spam filtration solution or have the current system evaluated, please contact us to discuss in detail.
If you have a private domain based mail account, contact us for information on our email spam filtration service and antivirus protection software. Coverage for your PC and email starts at just $2.99/month.
(215) 634-2997
www.richmondcomputer.com
(215) 634-2997
www.richmondcomputer.com
Tuesday, September 10, 2013
HP to be dropped from Dow Jones Industrial Average September 20th
In a sign that the computer manufacturer continues to struggle, Dow Jones has announced that HP will be dropped from its list of major US manufacturers, namely due to underperforming stock.
Over the years, HP has struggled to gain a higher share of the computer manufacturing market and branch out from manufacturing printers. In 2001, HP merged with Compaq to acquire a larger share of the PC and camera market. At the time, HP founder Walter Hewlett was reluctant on the merger as he saw then that PCs were a marginally profitable product.
Today, the PC division of HP has the lowest margin of their manufacturing line.
Read more.
Over the years, HP has struggled to gain a higher share of the computer manufacturing market and branch out from manufacturing printers. In 2001, HP merged with Compaq to acquire a larger share of the PC and camera market. At the time, HP founder Walter Hewlett was reluctant on the merger as he saw then that PCs were a marginally profitable product.
Today, the PC division of HP has the lowest margin of their manufacturing line.
Read more.
Friday, September 6, 2013
Electronic communications rejected by court due to lack of authentication
This may seem like a no-brainer, but authentication of electronic evidence is crucial when presented as evidence.
In 2011, a Maryland appellate court overturned a decision involving a murder trial because the prosecution failed to present any authentication that a message from a MySpace account actually came from the account they claimed it did (see: Antoine Levar GRIFFIN v. STATE of Maryland No. 74, Sept. Term, 2010). (Read more about the Griffin case)
Proper handling, analysis and authentication of electronic evidence is crucial in any form of litigation, otherwise the evidence will be tossed as hearsay.
Our SMS Witness service, which covers text messages, instant messages and Facebook data, provides parties with the proper handling, analysis and presentation of this evidence, so that it can be properly entered into evidence in civil or criminal matters.
SMS Witness entails live collection of data, special chain of custody documentation, data analysis and verification, hash code generation (to prove the file is unique), and presentation of text messages, instant messaging or Facebook messaging in a transcript format.
Sample SMS Text message transcripts:
http://www.richmondcomputer.com/doc/Transcript_2col_ColorBubble.pdf
http://www.richmondcomputer.com/doc/Transcript_ImStyle.pdf
http://www.richmondcomputer.com/doc/Transcript_UTF.pdf
Don't risk your entire case using a free or low dollar third party app to print out your messages. A single text message could swing a decision, even in a minor case, IF you present it properly.
Call 215-634-2997 for more information, or sales@richmondcomputer.com
In 2011, a Maryland appellate court overturned a decision involving a murder trial because the prosecution failed to present any authentication that a message from a MySpace account actually came from the account they claimed it did (see: Antoine Levar GRIFFIN v. STATE of Maryland No. 74, Sept. Term, 2010). (Read more about the Griffin case)
Proper handling, analysis and authentication of electronic evidence is crucial in any form of litigation, otherwise the evidence will be tossed as hearsay.
Our SMS Witness service, which covers text messages, instant messages and Facebook data, provides parties with the proper handling, analysis and presentation of this evidence, so that it can be properly entered into evidence in civil or criminal matters.
SMS Witness entails live collection of data, special chain of custody documentation, data analysis and verification, hash code generation (to prove the file is unique), and presentation of text messages, instant messaging or Facebook messaging in a transcript format.
Sample SMS Text message transcripts:
http://www.richmondcomputer.com/doc/Transcript_2col_ColorBubble.pdf
http://www.richmondcomputer.com/doc/Transcript_ImStyle.pdf
http://www.richmondcomputer.com/doc/Transcript_UTF.pdf
Don't risk your entire case using a free or low dollar third party app to print out your messages. A single text message could swing a decision, even in a minor case, IF you present it properly.
Call 215-634-2997 for more information, or sales@richmondcomputer.com
Monday, August 12, 2013
"Tax"-achussets targets IT Industry with new "computer services tax"
Governments have been taxing
citizens since the days of the Egyptian Pharaohs. Over time, governments have
levied taxes to raise funds to operate the government, be it for military
protection or domestic services. Rates rise and fall due to the state’s needs
or political agendas in play. Taxes have been known to start riots and wars,
such as the Magna Carta and the American Revolutionary War. In modern times,
there are no shortages of controversies as governments levy new taxes against
its citizens.
On Tuesday July 24, 2013, the
Massachusetts state legislature passed an $800 million dollar transportation
finance plan to fund statewide highway and transit needs. While the legislation
increased existing taxes on items such as gasoline, a new tax was created called
the “computer system service tax”, which applies the state’s 6.25% sales tax to
computer services. The new tax is expected to generate $161 million per year,
and applies to a variety of technical services provided by those in the IT
industry. Some examples include:
· Installation of “prewritten software”, for
example re-installing Windows 7 onto a customer’s PC
·
Installing a packaged software suite such as QuickBooks
onto a customer’s computer
·
Web based software/applications operated by a
company within Massachusetts
·
Networking computers together on a LAN
·
Installing software patches (enhancements) on
already installed software products (i.e. Microsoft product updates/security
updates, antivirus software updates)
Oddly, the tax does not apply to
the installation of Open Source software because there is no transaction to
acquire that software. However, if an IT Professional is engaged in website
development and uses an open source template to build the customer’s site, then
the services are taxable. Confused yet? This also means modifying an existing
website (content management) is now taxable, but website hosting and cloud
storage are not taxable.
The tax singles out the computer
industry, and those who outsource technology functions to service providers, be
it individuals or corporations. This causes a number of problems. First, if the
tax is not repealed, it sets a precedent which other states or legislative
bodies could follow. Secondly, it hurts innovation. Companies may elect to
defer upgrades and projects which would otherwise improve commerce. Thirdly, it
encourages companies to defer maintenance such as the installation of new
antivirus software or security updates on network computers when performed by
consultants or contractors. Compromised computers and websites are often the
source of malware infections for other systems, and encouraging companies to
defer maintenance because of rising maintenance costs is a dangerous situation
for everyone. Fourth, IT consultants and contracting firms already pay their
share of income tax, as do the companies that utilize these services.
Targeting the IT industry will
only impede the growth of the IT industry. The IT industry, like many others is
diverse. It is comprised of firms small and large, from independent consultants
to multinational firms. In some cases, a “computer services” tax will cost
jobs. Small businesses could decide to keep certain tasks in-house, even
assigning them to less than qualified personnel (the famous scope creep). While
there remains a great deal of ambiguity regarding the law, what is clear is the
losers are the IT sector and businesses within “Tax”achusetts.
Rather than waste precious legislative time (is there such a thing on the taxpayer's dime?), legislators could have studied where this tax was enacted before, namely to the south in Maryland in 2007. There, a similar outcry led to the repealing of the tax not long after it became law.
Rather than waste precious legislative time (is there such a thing on the taxpayer's dime?), legislators could have studied where this tax was enacted before, namely to the south in Maryland in 2007. There, a similar outcry led to the repealing of the tax not long after it became law.
Wednesday, July 17, 2013
Microsoft Makes Appeal to NSA on PRISM Scandal
In a surprise move for Microsoft, general counsel Brad Smith wrote to US Attorney General Eric Holder to make a plea for permission to disclose and explain to the public what information the software giant has been handing over to the NSA as part of the PRISM scandal, which came to light by leaker Eric Snowden who is now seeking asylum while holed up in a Russian airport.
The concerns brought up by Microsoft's attorney primarily deal with preserving constitutional rights of U.S. citizens. However, it is more likely that Microsoft's lawyers are concerned with liability over the surrendering their customers' data to the U.S. Government, and potential for lawsuits as part of those requests.
With more and more data being stored in the cloud, and most computers on a 24/7 connection to the internet with various "behind the scenes" applications transmitting data to Microsoft, its likely that all of our computers are potential sources for monitoring by government authorities.
Read More
Do you think Microsoft should be able to disclose to customers what information is being requested and turned over to the NSA?
Sound off here!
The concerns brought up by Microsoft's attorney primarily deal with preserving constitutional rights of U.S. citizens. However, it is more likely that Microsoft's lawyers are concerned with liability over the surrendering their customers' data to the U.S. Government, and potential for lawsuits as part of those requests.
With more and more data being stored in the cloud, and most computers on a 24/7 connection to the internet with various "behind the scenes" applications transmitting data to Microsoft, its likely that all of our computers are potential sources for monitoring by government authorities.
Read More
Do you think Microsoft should be able to disclose to customers what information is being requested and turned over to the NSA?
Sound off here!
Thursday, June 20, 2013
Gigabit Wifi coming soon
The Wi-Fi Alliance, a global organization that ensures the interoperability of Wi-Fi technologies, began certifying so-called "ac" devices on July 20, 2013. The new standard is called "802.11ac" will have speeds of up to 1.3 Gigabits per second.
Since few devices are currently on the market with the new standard, pricing is much higher than standard WiFi devices. Netgear's R6200 WiFi access point starts at $160.00 at Best Buy.
Before considering a purchase, consider operational gains are mostly applicable to the streaming of large files across a WiFi network, such as videos and sound files.
Since few devices are currently on the market with the new standard, pricing is much higher than standard WiFi devices. Netgear's R6200 WiFi access point starts at $160.00 at Best Buy.
Before considering a purchase, consider operational gains are mostly applicable to the streaming of large files across a WiFi network, such as videos and sound files.
Friday, June 14, 2013
Use of Facebook data for criminal & civil litigation
Recently, Facebook disclosed that it received thousands of requests for data from user accounts in the last half of 2012 alone. This reinforces the fact that investigators, and ultimately the courts, are relying more on electronic data for litigation purposes than ever before.
That being said, Richmond Computer now offers transcription and data collection services involving Facebook data, similar to the highly popular SMS Witness program, which converts cell phone text messages to court admissible transcripts. Starting at $49.99, we can collect Facebook data and produce items such as Facebook messages into transcripts, complete with documentation on collection and production methodology and analysis of metadata.
Read more.
That being said, Richmond Computer now offers transcription and data collection services involving Facebook data, similar to the highly popular SMS Witness program, which converts cell phone text messages to court admissible transcripts. Starting at $49.99, we can collect Facebook data and produce items such as Facebook messages into transcripts, complete with documentation on collection and production methodology and analysis of metadata.
Read more.
Thursday, June 6, 2013
Microsoft to end all support for Windows XP April 8, 2014
Microsoft has set the date for an end to all support for Windows XP: 4/8/2014. Windows XP was once the mainstay of home and office PCs, and continues to be used on 37% of all business computers (a staggering number!). Despite this, Microsoft is pushing forward with making Windows 8 the flagship of home and office operating systems. Recently, Microsoft has released an updated version in response to significant backlash from end users on the format and usability of the newest version of Windows.
Thursday, May 30, 2013
Microsoft relents on start button in Windows 8
Following months of heavy criticism over the removal of the start button from the Windows 8 operating system, Microsoft added this feature back in Windows 8.1, which is not yet available to the public.
The return of the start button demonstrates that Microsoft is sensitive to the heavy criticism from consumers and feedback from those in the technology industry. However, the return of the start button does not equal the return of the "start menu", where one would normally find a list of apps and programs on their system. Early reviews indicate that the modifications in 8.1 do improve accessibility to the system.
The "Metro" syle screen is similar to that of Windows Server 2012. The universal application of the new interfaces do show Microsoft's commitment to breaking out of its "Windows shell", which has defined their products since Windows 95.
If you are in the market for a new computer system we still exercise caution in choosing Windows 8 over Windows 7 for an operating system. While Windows 8 reviews indicate that it is a more stable operating system than Windows 7 (Windows 7 is an extremely stable platform), there is a good period of adjustment in dealing with the new Graphical User Interface (GUI). While Windows 8 is less demanding on hardware than its predecessor, the switch to the new system has been called a "jarring" experience for many.
If you are in the market for a new system, contact us for a free consultation on which OS is best for you.
The return of the start button demonstrates that Microsoft is sensitive to the heavy criticism from consumers and feedback from those in the technology industry. However, the return of the start button does not equal the return of the "start menu", where one would normally find a list of apps and programs on their system. Early reviews indicate that the modifications in 8.1 do improve accessibility to the system.
The "Metro" syle screen is similar to that of Windows Server 2012. The universal application of the new interfaces do show Microsoft's commitment to breaking out of its "Windows shell", which has defined their products since Windows 95.
If you are in the market for a new computer system we still exercise caution in choosing Windows 8 over Windows 7 for an operating system. While Windows 8 reviews indicate that it is a more stable operating system than Windows 7 (Windows 7 is an extremely stable platform), there is a good period of adjustment in dealing with the new Graphical User Interface (GUI). While Windows 8 is less demanding on hardware than its predecessor, the switch to the new system has been called a "jarring" experience for many.
If you are in the market for a new system, contact us for a free consultation on which OS is best for you.
Tuesday, May 14, 2013
"FBI" MoneyPak Drive-by virus still alive and well (Revton Virus)
Since 2011, a "drive-by" virus has been circulating on infected web servers which, when visited by web surfers, installs a software application known as the "Revton Virus" which locks the user's computer and demands payment for copyright infringement with the FBI's logo on the computer screen.
Richmond Computer continues to receive calls for removal of this virus, which takes about 30 minutes. Because of the high number of infections seen, we've been able to flat-rate the removal cost to just $80.00.
While there are many options out there to remove the virus, if you are looking for timely removal with minimal effort, we suggest you call us. Work can be performed at your location or our office at no additional charge for customers within Philadelphia.
More information:
http://www.fbi.gov/news/stories/2012/august/new-internet-scam
http://www.kktv.com/home/headlines/FBI-Virus-Scam-Continues-to-Grow-207415201.html#.UZKaqaLviSo
Richmond Computer continues to receive calls for removal of this virus, which takes about 30 minutes. Because of the high number of infections seen, we've been able to flat-rate the removal cost to just $80.00.
While there are many options out there to remove the virus, if you are looking for timely removal with minimal effort, we suggest you call us. Work can be performed at your location or our office at no additional charge for customers within Philadelphia.
More information:
http://www.fbi.gov/news/stories/2012/august/new-internet-scam
http://www.kktv.com/home/headlines/FBI-Virus-Scam-Continues-to-Grow-207415201.html#.UZKaqaLviSo
Monday, May 6, 2013
Software you own becoming a thing of the past
Remember the days when you went to a store and bought a software application that came in a box? It looks like the days of picking up boxes of software with neatly packaged CDs and user manuals are rapidly becoming a thing of the past.
Last year, Microsoft rolled out its Office 365 suite, which is the software giant's alternative to spending upwards of $400 for Microsoft Outlook, Word, Excel and Access (among others). Now, for a monthly fee (called "subscriptions"), users can continue to utilize this software, so long as the bills are paid. If you stop paying the bill, you can still access your files with restricted abilities.
Adobe is the latest software company to jump on the clouded subscription craze. In a recent announcement, Adobe has decided that applications part of their creative suite, such as Photoshop, will ONLY be available in the cloud, under a subscription.
The benefits to you as the consumer are low cost of entry for gaining access to the software, which will now change more gracefully through frequent, periodic updates, as opposed to drastic changes from version to version.
The downside? You'll need to tie your bank account or credit card to Adobe or Microsoft to pay the monthly subscription fee to continue to use the software. Effectively, you will no longer own the software, but only have rights to use it under their EULA and as long as the bill is paid.
Read more.
Last year, Microsoft rolled out its Office 365 suite, which is the software giant's alternative to spending upwards of $400 for Microsoft Outlook, Word, Excel and Access (among others). Now, for a monthly fee (called "subscriptions"), users can continue to utilize this software, so long as the bills are paid. If you stop paying the bill, you can still access your files with restricted abilities.
Adobe is the latest software company to jump on the clouded subscription craze. In a recent announcement, Adobe has decided that applications part of their creative suite, such as Photoshop, will ONLY be available in the cloud, under a subscription.
The benefits to you as the consumer are low cost of entry for gaining access to the software, which will now change more gracefully through frequent, periodic updates, as opposed to drastic changes from version to version.
The downside? You'll need to tie your bank account or credit card to Adobe or Microsoft to pay the monthly subscription fee to continue to use the software. Effectively, you will no longer own the software, but only have rights to use it under their EULA and as long as the bill is paid.
Read more.
Tuesday, April 9, 2013
Microsoft Windows XP Support Ends April 8, 2014
Extended support for Windows XP ends one year from today. What that means is no more security updates and patches for identified vulnerabilities, meaning the system will be "wide open" to attacks from malware and other loopholes in the operating system. After 10 years, we at Richmond Computer would like to think Microsoft has plugged all the holes, but new exploits are always being discovered by would-be malware authors.
In addition to the end-of-life for Windows XP, Microsoft will also be discontinuing product support for Office 2003.
A starting statistic: As of March 2013, 38.7% of all PCs continue to run Windows XP. Windows 7 currently makes up 44.73% of operating systems used on home and office computers.
Looking to upgrade your current system or go with something totally new? Call us at (215) 634-2997 for a consultation to help decide if Windows 7, Windows 8 or a Mac is right for you.
Wednesday, March 27, 2013
UPS is NOT sending you e-mail
We've all missed the UPS guy, but when we do, UPS isn't going to send you an e-mail to tell you about it. Despite being in the 21st century, "old brown" still uses paper stickies to alert you when you missed a delivery.
Unfortunately, implusiveness and gullibility get the better of us. As we discovered today after deploying brand new Windows 7 PCs for a client, one of the staff received a phony e-mail claiming to be a UPS notice with a "billing attachment". The user clicked it once. Nothing. Then again, and again, and again. Within 30 minutes, their network ground to a halt. Now its costing hours of time and effort to repair a file server and client PCs that were infected by numerous pieces of malware.
Think carefully when reading e-mail.
Tuesday, March 26, 2013
Making IT integral with your Business
IT support and technology in small business has traditionally been regarded as "the guy in the back office" that no one sees until something breaks. For small business that outsources IT to firms like us at Richmond Computer, we're never seen nor heard except during deployment projects or emergency repairs.
In today's digital business world, that's all changing the face of technology and those that support it. Since technology is front and center when it comes to operating a business, IT staff are also now on the front lines when it comes to interacting with staff and customers.
Our mantra has always been delivering products and service that enhances a business either through improving productivity or cutting costs, or both. In addition, Richmond Computer has recognized the value to our customers by not just being the fix-it guys in the back office, but being able to interact with the customers of our clients and integrating technology with customer service and overall value to the customer experience.
Where does your current IT solution stand?
Monday, March 25, 2013
More changes to Windows 8 - Windows BLUE
In an effort to push acceptance of an otherwise weakly adopted new product, Microsoft is releasing another patch to Windows 8: a component named "Windows Blue". Allegedly, Blue allows more customization to the start screen (which replaced the desktop/start button environment). Notably, is the ability to split apps on a screen, a popular feature in the business world, especially in multi-screen environments. However, rumors from the beta testing mill claim that Blue eliminates the ability to run the "desktop" on Windows 8 systems.
Microsoft has tried all sorts of gimmicks to get consumers and business users to adopt Windows 8. Tech savvy or not, most can appreciate Microsoft's interest in becoming more like Apple, with tiled screens to resemble iPhones and iPads, yet they've forgotten that most users grew up with the desktop and start button, and stuck it out with Windows all these years because of its (don't laugh) stability.
If you remember this screen, you're old enough to remember Ronald Reagan as president
Read More.
Microsoft has tried all sorts of gimmicks to get consumers and business users to adopt Windows 8. Tech savvy or not, most can appreciate Microsoft's interest in becoming more like Apple, with tiled screens to resemble iPhones and iPads, yet they've forgotten that most users grew up with the desktop and start button, and stuck it out with Windows all these years because of its (don't laugh) stability.
If you remember this screen, you're old enough to remember Ronald Reagan as president
Read More.
Friday, March 22, 2013
Technology and Mass Transit: SEPTA, NPT and your smartphone
Philadelphia's public transportation service provider, the Southeastern Pennsylvania Transportation Authority (SEPTA), is in the process of developing and deploying a tech-heavy fare and payment collection system that will transport riders from the current 1940's system of tokens and paper tickets punched by train conductors to "Smart Cards" and other near-field technology media.
While we won't get into the details about the system itself here, SEPTA's management has been bragging that the new system dubbed "NPT" for New Payment Technologies, will allow riders to pay fares using their smartphones. This isn't revolutionary as one can purchase rides on airplanes and trains/buses in other cities, and has been the case for a few years now. SEPTA's approach is different than Amtrak for example, because of specific technologies deployed. One can purchase an Amtrak ticket now onboard the train through the Amtrak website. After the purchase is complete, the phone will display a barcode which is then scanned by the attendant on the train. The same method of validation is also used by airlines when checking in.
However, SEPTA in their infinite wisdom, decided that barcodes were too "old school" and instead is only utilizing near-field communication (NFC) devices, such as credit cards or smartphones with such capabilities, which today is most Android based devices. But SEPTA staff didn't do their homework, or simply listened to the wrong "geeks". If you don't know what the most common and popular smartphone is today, you've been living under a rock. iPhones never had, and have no plans to add NFC to future models. This means users of the most popular phone on the market are forever locked out from buying fares to ride buses, trolleys and trains in Philadelphia because SEPTA felt barcodes weren't on par with today's "modern" technology.
Instead, this new NFC-NPT system will force train riders to have a smartcard in their pocket in order to pass through newly installed turnstiles in center city and then "tap-out" to a NFC reader at their train station of their final destination. Its an extra step and an investment in alot of station gating devices all because the agency refused to include barcodes as a method of reading a paid fare.
Deployment begins July 2013 with completion in mid 2014. Stay tuned.
While we won't get into the details about the system itself here, SEPTA's management has been bragging that the new system dubbed "NPT" for New Payment Technologies, will allow riders to pay fares using their smartphones. This isn't revolutionary as one can purchase rides on airplanes and trains/buses in other cities, and has been the case for a few years now. SEPTA's approach is different than Amtrak for example, because of specific technologies deployed. One can purchase an Amtrak ticket now onboard the train through the Amtrak website. After the purchase is complete, the phone will display a barcode which is then scanned by the attendant on the train. The same method of validation is also used by airlines when checking in.
However, SEPTA in their infinite wisdom, decided that barcodes were too "old school" and instead is only utilizing near-field communication (NFC) devices, such as credit cards or smartphones with such capabilities, which today is most Android based devices. But SEPTA staff didn't do their homework, or simply listened to the wrong "geeks". If you don't know what the most common and popular smartphone is today, you've been living under a rock. iPhones never had, and have no plans to add NFC to future models. This means users of the most popular phone on the market are forever locked out from buying fares to ride buses, trolleys and trains in Philadelphia because SEPTA felt barcodes weren't on par with today's "modern" technology.
Instead, this new NFC-NPT system will force train riders to have a smartcard in their pocket in order to pass through newly installed turnstiles in center city and then "tap-out" to a NFC reader at their train station of their final destination. Its an extra step and an investment in alot of station gating devices all because the agency refused to include barcodes as a method of reading a paid fare.
Deployment begins July 2013 with completion in mid 2014. Stay tuned.
Subscribe to:
Posts (Atom)