Language Selection

English French German Italian Portuguese Spanish

The Fall of AT&T Wireless

Filed under
Sci/Tech

The SeatlePI is speculating that "a single event may have sealed AT&T Wireless's fate: the opportunity for its customers to leave" citing that they were "infamously apathetic" to it's customers.

I can only tell you in my sparse experience this was certainly not the case. As at&t wireless agents/representatives, we had strict guidelines for customer service and were monitored several times each month

netting ourselves a possible "write-up" if any one of those guidelines were not followed.

In addition, in the capacity of my job in the new Cingular structure, we are migrating customers back to at&t each day from Cingular plans and other carriers. When asking customers out of curiosity why, they cite the rate plans were much better, the service area is wider, and the reception was much stronger, among other things. Cingular's goal is to move all at&t customers to Cingular as soon as possible of course, but they are not forcing anyone at the moment. We are still activating new at&t customers everyday. There are also divested markets in which no cingular offers are to be made. So, at&t wireless will still be around in some form or another for a while, even if under the Cingular name.

Yes, I agree that giving the consumer the choice to port their wireless numbers lead many to try out other less expensive carriers, many are regretting that decision and are coming back each day as well.

Full Story with many reference links.

More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News