Optus Outage – Important Service Update and Contingency Steps for Our Valued Customer

8 November 2023

Dear Valued Customers,
We wish to inform you of a current service disruption due to an outage with one of our network providers, Optus. We understand the critical nature of connectivity for your operations and want to assure you that we are actively engaging with Optus to expedite the restoration process.
Here’s what you need to know:
  • Service Impact: The outage may affect the continuity of our services to your devices and operations. Optus is deploying all available resources to restore services promptly.
  • Emergency Services: Please be advised that if you need to contact emergency services, Optus landline (fixed line telephone) may not be operational. In such cases, we urge you to use a mobile phone. Calls to the emergency number “000” will connect through alternative carriers if necessary.
  • Updates and Communication: We are monitoring the situation closely and will provide you with updates as we receive them from Optus. Our commitment is to keep you informed and supported throughout this period.
  • Customer Support: For any immediate concerns or alternative connectivity solutions, please contact our customer support team at support@m2mone.com.au. We are prepared to assist you with any additional support during this time.
We apologise for any inconvenience caused and appreciate your understanding as we navigate this unforeseen outage. Your business is important to us, and we are dedicated to resolving this issue as swiftly as possible.
Thank you for your patience and trust in M2M One.
Warm regards,
Kat Dempsey,
Senior Director – M2M One
Australia & New Zealand

How Do IoT Devices Update Remotely

What are IoT Devices?

IoT, or the Internet of Things, refers to a network of interconnected physical devices that communicate and exchange data with each other over the Internet. IoT devices are embedded with sensors, software, and other technologies to collect and transmit data. These devices range from everyday household items like smart refrigerators and thermostats to industrial tools and machinery.


How to Power IoT Devices?

Powering IoT devices requires careful consideration of energy consumption, especially for those running on batteries or solar energy. Some common power sources for IoT devices include:

  • Battery Power: Many IoT devices operate on batteries, which need to be long-lasting, especially in remote locations.
  • Mains Power: Some devices can be connected to the conventional electric grid.
  • Energy Harvesting: Innovative methods like solar or wind power harness energy from the environment.


How do IoT Devices Update Remotely?

IoT devices need regular updates to ensure they’re secure, efficient, and up-to-date with the latest functionalities. These updates can be delivered Over-the-Air (OTA), meaning remotely and wirelessly. Here’s how:

  • Identification of Updates: The central system detects devices that need updating.
  • Transmission of Update: The updates are sent wirelessly to the IoT devices.
  • Installation: The devices download and install the updates, which often require a restart.
  • Verification: The central system confirms the successful update.


Why are Remote Updates Important?

  • Security: Regular updates are vital for patching vulnerabilities that could be exploited by malicious attackers.
  • Enhancing Features: Remote updates allow for the introduction of new features and enhancements without manual intervention.
  • Compliance: Ensuring devices are operating within regulatory standards, which may change over time.
  • Performance Improvements: Updates often include optimisations that improve the overall performance of a device.


The Process of Remote Updating

  • Planning: Determining what updates are needed and scheduling them at convenient times.
  • Delivery Method: Updates can be delivered Over-the-Air (OTA) or through wired connections, depending on the device and its connectivity.
  • Monitoring and Management: Continuous monitoring of the update process and managing any issues that arise during the update.
  • Rollback Mechanism: Implementing a method to revert to a previous version if an update fails, ensuring that devices continue to operate correctly.


Challenges in Remote Updating

  • Bandwidth Limitations: Updating devices in areas with limited or expensive connectivity can take time and effort.
  • Device Downtime: Some updates may require devices to restart, leading to temporary downtime.
  • Version Control: Managing different versions across a diverse range of devices can be complex.


How M2M One Facilitates Remote Updating

Remote updating your IoT devices is a complex yet essential aspect of managing a connected ecosystem. By understanding the importance, process, challenges, and leveraging specialised services like M2M One, businesses can ensure that their IoT devices remain secure, efficient, and up-to-date.

M2M One provides a comprehensive solution to these challenges with robust and secure connectivity solutions. Our platform allows for:

  • Scheduled Updates: Plan updates at convenient times to minimise disruptions.
  • Secure Transmission: Encrypted connections ensure that updates are safe from interception or tampering.
  • Streamlined Management: Tools to monitor and manage the update process across all devices.
  • Tailored Solutions: Customisable options to suit various types of IoT devices and network constraints.

With M2M One, you’re not just adopting a service but also partnering with a team of experts dedicated to making the remote updating of your IoT devices as seamless as possible. Contact our friendly team today to learn how we can enhance your IoT experience.

How to Use Dual SIM Cards On Your Phone

Using Multiple Networks on a Dual SIM Phone

With dual SIM mobiles, users can utilise two different SIM cards, possibly from other networks, in a single device. Incorporating dual SIM capabilities into your daily routine is smart because it allows you to enjoy broader network coverage, financial savings, and enhanced convenience. But how exactly does it work? Here’s a breakdown:


Two SIM Card Slots

Most dual SIM phones have two separate slots for the SIM cards. These can be used simultaneously for different purposes.

  • Standby Dual SIM: This means the phone has two SIM card slots, but only one can be active at a time. You’ll have to switch between them manually.
  • Active Dual SIM: In this configuration, both SIM cards can be active simultaneously, meaning you can receive calls and texts on both numbers without switching.


Network Connectivity

Both SIM cards in the phone can connect to mobile networks. They can be from the same or different network providers. This allows you to:

  • Utilise one SIM for personal use and another for business.
  • Take advantage of different billing plans or network offers.
  • Maintain connectivity with a home network while using a local network abroad to save on roaming costs.


Settings and Customisation

Most dual SIM phones allow you to customise how the cards function:

  • Assign names to distinguish between the two (e.g., “Work” and “Personal”).
  • Select default SIM for data usage, calls, or text messages.
  • Manage data roaming settings for each SIM separately.


Hybrid Slots

Some phones have a hybrid slot where the second SIM slot can also be used for a microSD card for additional storage. In this case, you can either use two SIM cards or one SIM card and one microSD card.


Compatibility and Network Support

Dual SIM functionality usually supports all standard network technologies, including 4G, 3G, and 2G. The compatibility and performance might differ depending on the handset and the network providers.


Revolutionise Your Mobile Experience with Dual SIM Cards from M2M One

Dual SIM cards in mobile phones offer flexibility and convenience that single SIM devices can’t match. Whether for managing personal and professional lives separately, saving on mobile costs, or ensuring connectivity while travelling, the dual SIM functionality adapts to various needs and preferences.

When it comes to leveraging the benefits of dual SIM cards, choosing M2M One can be your game-changing decision for these reasons:

  • Enhanced Connectivity: M2M One provides robust network coverage, ensuring uninterrupted connectivity whether you’re at home, at work, or on the go.
  • Flexible Plans: Tailor your M2M One SIM to your specific needs. From data-centric plans to voice-focused options, there’s a perfect fit for everyone.
  • Seamless Integration: Use an M2M One SIM alongside another network SIM effortlessly. Enjoy the benefits of two networks without the hassle of carrying two devices.
  • Superior Support: M2M One’s customer support is always ready to assist you. From setting up your dual SIM functionality to troubleshooting any issues, expert help is just a call away.
  • Cost-Efficient Solutions: Utilise M2M One’s competitive pricing to make the most out of your dual SIM experience. Optimise your spending by switching between your SIMs based on your needs.
  • Innovative Technology: M2M One is committed to staying at the forefront of technological advancements. Benefit from cutting-edge features that enhance your dual SIM experience.
  • Trust and Reliability: With a reputation for quality and reliability, M2M One ensures that your dual SIM functionality works seamlessly, providing peace of mind.


Why Choose M2M One for Your SIM Card Needs

Choosing M2M One is more than a mere transaction; it’s an investment in a hassle-free, state-of-the-art communication experience. Make the smart choice and switch to M2M One today to fully realise the potential of using dual SIM cards in your device. Join us on a journey towards smarter connectivity, where your communication needs are met with precision, care, and innovation.

What are Private Networks?

Private networks have evolved significantly since their inception. In the early days of computing, private networks were established to facilitate secure communication within an organisation. They were physically isolated systems, ensuring complete privacy and security. As technology evolved, Virtual Private Networks (VPNs) came into existence, allowing encrypted communication over public networks. This evolution marked a critical shift in how businesses and individuals protected their data and maintained privacy.


What Constitutes a Private Network?

A private network is a network that uses private IP address space, providing a secure connection within a specific organisation. It may include various technologies such as VPNs, dedicated lines, and private LTE networks. These networks are not accessible by the general public, ensuring that the data transmitted remains confidential and secure.


Maximising Opportunities with Private Networks with M2MOne 

The Benefits of Private Networks 

In today’s world where data security is paramount, private networks offer a robust solution for individuals and businesses alike. Understanding the challenges and benefits, and choosing a provider like M2M One, can help you navigate the complex landscape of private networking, ensuring that your data remains secure, and your network performs at its best.

  • Security: Private networks provide a high level of security, keeping data protected.
  • Control: Having a private network allows for complete control over the network’s configurations and settings.
  • Performance: With dedicated resources, private networks can offer better performance compared to public networks.


Overcome Challenges with M2M One 

Navigating the world of private networks can be daunting, presenting challenges that may seem insurmountable:

  • Complexity: Setting up and managing a private network requires specialized skills and can often be a perplexing process.
  • Cost: The expenses involved in implementing and maintaining a private network can quickly add up, depending on the chosen solution.
  • Scalability: As your business expands, the need for a network that can gracefully handle increased traffic becomes crucial, yet scaling can be a challenging task.

Fortunately, with M2M One, these challenges become opportunities. Our team of experts takes the complexity out of the equation, offering custom solutions that fit your budget without compromising on quality. Our scalable solutions grow with your business, ensuring that you never outgrow your network.


Why Use M2M One’s Private Network?

M2M One’s private network solutions stand out for their reliability, scalability, and tailored support. Offering customisable options, we provide the perfect balance between cost and functionality, tailored to your specific needs. Our commitment to security ensures that your data remains protected, and our expert team is always on hand to provide support, ensuring that your network performs optimally. With M2M One, you not only get a private network but a strategic partner committed to your success.

Understanding How a Virtual Private Network (VPN) Works

In an increasingly interconnected world, safeguarding our online privacy and security is paramount. One powerful tool that ensures secure internet browsing is a Virtual Private Network (VPN). Let’s delve into the inner workings of a VPN and explore how it enhances your online experience.


What is an IP VPN Service?

An IP VPN service, also known as a Virtual Private Network, establishes a secure and encrypted connection over a public network, such as the Internet. It creates a private network by encrypting your internet traffic, making it difficult for hackers, ISPs, or other prying eyes to intercept or decipher your data.


How Do VPN Services Work?

When you connect to a VPN server, your device creates a secure tunnel to the VPN server. All your internet traffic, including websites visited, downloads, and communications, is routed through this encrypted tunnel. This shields your online activities from potential threats and unauthorised surveillance. VPNs also mask your IP address, providing anonymity and allowing you to bypass geographical restrictions.


Types of VPN

There are several types of VPN protocols that determine how the VPN connection is established and encrypted. Some standard VPN protocols include:

  • OpenVPN: An open-source protocol known for its robust security and versatility.
  • IPSec (Internet Protocol Security): A protocol suite that provides secure communication over IP networks.
  • L2TP (Layer 2 Tunneling Protocol): A protocol that combines the best features of PPTP and L2F (Layer 2 Forwarding).
  • PPTP (Point-to-Point Tunneling Protocol): A widely supported protocol that offers fast connection speeds but is less secure.


Why Use M2M One’s VPN Services

At M2M One, we offer reliable and secure VPN services tailored to meet your specific needs. Our VPN solutions provide enhanced data privacy, allowing you to browse the Internet confidently. Here’s why you should choose M2M One:

  • Data Security: Our VPN services utilise strong encryption protocols to safeguard your data, protecting it from potential threats.
  • Anonymity: By masking your IP address, our VPN services grant you anonymity and enable unrestricted access to online content.
  • Flexible Plans: We offer flexible VPN plans to cater to diverse requirements, ensuring you find the perfect fit for your business or personal use.

Safeguard your online privacy and security with M2M One’s VPN services. Browse online to explore our VPN offerings and experience the benefits of a trusted VPN provider.

Understanding how a VPN works is essential in today’s digital landscape. VPNs provide a secure and private online environment by encrypting your internet traffic and protecting your data. Stay one step ahead of potential threats and enjoy a worry-free browsing experience with a reliable VPN service like M2M One.