Connect with us

Technology

Getting the ATM machine to pay without Inserting a Card

“As the days come and go, so does technology finds new ways to interest us with its innovations, and with the latest upgrade to the ATM process of withdrawing cash, users may not need to carry their debit cards for withdrawals.”

Published

on

Getting the ATM machine to pay without Inserting a Card

As the days come and go, so does technology finds new ways to interest us with its innovations, and with the latest upgrade to the ATM process of withdrawing cash, users may not need to carry their debit cards for withdrawals.

This will very much sound fascinating considering there are times when we may be running low on cash and sadly enough may not have our ATM cards as often call it with us, leaving us stranded or short of options.

Well, the banks have decided to bail its customers out by introducing a new medium that allows customers to withdraw cash without their debit cards on them. In fact, what they only need with them is their phone to enable the transaction.

So how does this process work exactly?

Well, it differs with the banks and every bank has its own process of application, hence we summarized some processes initiated by a few banks to allow such transactions.

For the UBA bank customers, their card-less withdrawal service goes like this:

The user dials out a code *919*30*Amount# on the registered mobile number that the user engages their bank transactions on.

This then follows some on-screen prompts which when followed rightly will let the customer receive a cash-out code sent to their mobile through a SMS message.

What the user then needs to do is to locate any Automated Teller Machine that allows card-less withdrawals. In front of the machine, the user can press any button on it to display options.

The customer then needs to select the “Pay-code Cash-out” option, which will then prompt the machine to request for the cash-out code. At this point, the user enters the code that was sent via SMS on the ATM machine.

The user then has to enter the amount they intend to withdraw and press OK, this then will let the machine dispense the cash once the transaction is verified.

Getting the ATM machine to pay without Inserting a Card

For Access Bank customers, here is how the withdrawal service goes;

The Access Bank code of *903# is dialed on the user’s mobile phone number, then on it, the user selects ‘Withdraw Money’ from a number of its options.

The user then has to enter the amount needed for withdrawal before validating the transaction with their PIN code.

A transaction code is then sent through SMS which will come in handy when the customer finds an Access Bank ATM.

At the machine, the use has to press “0” to initiate the card-less withdrawal, the user selects the ‘Access Money’ option then has to input their phone number and the amount initiated and the transaction code received.

The customer is then free to select ‘Continue’ to allow the ATM dispense the cash.

For those using the GT-Bank card-less withdrawal service, they need to dial the bank code of *737# to get started. But it is interesting to know that GTBank has a unique and somewhat different method to it.

Getting the ATM machine to pay without Inserting a Card

Once the first page of the prompt opens, the user has to select the ‘Next Page’ to unveil the ‘Card-less Withdrawal’ option.

It is at this moment another prompt option requesting the bank options the customer intends utilizing pops up. The user is at liberty to choose either ‘GTBank’ or ‘Other Bank’.

If they were to choose ‘Other Bank’, it takes them to the option requesting whether it is for ‘ATM’ or ‘POS’ withdrawals.

The customer enters the amount they intend withdrawing, then they enter a 4 digit code of their choice to set as the Cash-Out PIN.

They will also enter this PIN again to complete the request, which will have them receiving a reference code through their SMS.

Once this process is completed, the customer locates any GTBank ATM and at the machine’s front, the user hits the ‘Enter’ button before selecting the ‘Card-less Withdrawal (GT-Rescue)’ option.

The following prompt then requires the user to input the Reference Code they received via the SMS on their mobile phone.

The next option requires them to input the ‘Amount’ they want to withdraw, which is of course the same with the one they requested on their mobile phone.

What comes next is the dispensing of the cash.

For intended users of the Union Bank Card-less Withdrawal Service, they are to go by these processes:

On their mobile, they are to dial the bank code of *826#, the following on-screen prompts will lead to generating a Paycode and PIN.

The next actions will be carried on the ATM machine with the user hitting the ‘Enter’ key to select ‘Paycode’

There will of course be followed up prompts which will lead to the finalization of the transaction and then the cash withdrawal.

For customers of ‘Fidelity Bank’, their card-less withdrawal service goes with the dialing of the bank code of *770*8*Amount#.

On screen prompts will follow up to create a one-time PIN (OTP).

The follow up screen will request the user to input their Instant Banking PIN to confirm the transaction which will lead to the generation of a Paycode from the Fidelity account which is sent to the customer’s mobile number via SMS.

At the ATM gallery, the user selects the ‘PayCode Cash-out or Dial4Cash’.

The user then enters the 4 digit PIN they created earlier before inputting the Paycode that was sent to their mobile number. The amount that was requested is inserted before the machine dispenses the cash.

 

 

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

Understanding Network Edge and IoT Services

Published

on

Understanding Network Edge and IoT Services

The Internet of Things (IoT) is revolutionizing the way we live and work by connecting everyday devices to the internet, enabling them to communicate and share data with one another.

This has led to the development of smart homes, cities, and factories, where devices and systems can be controlled and monitored remotely. However, as the number of IoT devices continues to grow, so too does the amount of data they generate. This has led to the emergence of the network edge, which is essentially the point where the IoT meets the network.

The network edge refers to the distribution of computing power and data storage closer to the devices that generate and consume data, rather than relying on centralized data centers.

This is important for IoT devices because they typically have limited processing power and storage capacity, and sending all of their data to a centralized data center for processing and analysis would be impractical.

By bringing computing power and storage closer to the devices, the network edge allows for faster and more efficient data processing, reducing the latency and bandwidth required to transmit data over the network.

The history of the network edge and IoT devices can be traced back to the early days of the internet. In the 1980s, the internet was primarily used for connecting computers and research institutions, and the amount of data being transmitted was relatively small.

As the internet evolved and more people and devices began to connect to it, the amount of data being transmitted grew exponentially.

Understanding Network Edge and IoT Services

The concept of the Internet of Things (IoT) began to emerge in the 1990s, as researchers and companies began to explore the potential of connecting everyday devices to the internet. These early IoT devices were primarily used for research and experimentation, and they were not widely adopted by consumers. However, the technology continued to evolve, and by the early 2000s, the first commercial IoT devices began to appear on the market.

As the number of IoT devices grew, it became clear that the centralized data centers used to process and store data were not well-suited to the unique needs of these devices. They had limited processing power and storage capacity, and sending all of their data to a centralized data center for processing and analysis would be impractical.

This led to the development of the network edge, which is essentially the point where the IoT meets the network.

The network edge refers to the distribution of computing power and data storage closer to the devices that generate and consume data, rather than relying on centralized data centers. This allows for faster and more efficient data processing, reducing the latency and bandwidth required to transmit data over the network.

The first network edge devices were introduced in the late 2000s, and they were primarily used in industrial settings, such as factories and power plants. As the technology evolved, more and more use cases for network edge devices were discovered, and they began to be used in a wide range of applications, including healthcare, transportation, and smart homes.

As the number of IoT devices continued to grow, the network edge became increasingly important in ensuring that the data they generate could be effectively managed and utilized. Technologies such as edge computing, fog computing, and edge cloud emerged to enable the network edge.

In recent years, the network edge and IoT have gained significant momentum and is being adopted in various industry verticals. The market for edge computing and IoT devices is expected to continue to grow in the coming years, as more companies and organizations recognize the benefits of bringing computing power and storage closer to the devices that generate and consume data.

One of the key benefits of the network edge is improved security. Centralized data centers are vulnerable to a wide range of security threats, including cyber attacks, data breaches, and natural disasters. By distributing computing power and storage closer to the devices, the network edge makes it more difficult for hackers to access sensitive data.

Additionally, it allows for real-time monitoring and analysis of data, which can help detect and respond to security threats more quickly.

Another benefit of the network edge is improved scalability. As more and more devices are connected to the internet, the amount of data they generate will continue to grow. Centralized data centers would quickly become overwhelmed if they had to process and store all of this data.

By distributing computing power and storage closer to the devices, the network edge allows for more efficient use of resources and makes it easier to scale up as the number of devices increases.

The network edge also enables new use cases for IoT devices. For example, by bringing computing power and storage closer to the devices, it is possible to perform real-time analysis and decision-making on the data generated by IoT devices. This can be used in industrial settings, such as factories and power plants, to improve efficiency and reduce downtime.

It can also be used in healthcare, where real-time monitoring of patients’ vital signs can help detect and respond to health issues more quickly.

There are various technologies that enable the network edge, including edge computing, fog computing, and edge cloud. Edge computing is the practice of processing data at the edge of the network, closer to where it is generated.

Understanding Network Edge and IoT Services

This is done using specialized edge devices, such as gateways and routers, that have the computing power and storage capacity to process and store data. Fog computing, on the other hand, is a distributed computing architecture that extends the cloud to the network edge. It uses specialized fog nodes, which are similar to edge devices, to perform computation and storage closer to the devices.

Edge cloud is a hybrid approach that combines the benefits of edge computing and cloud computing. It uses edge devices and fog nodes to perform computation and storage at the edge of the network, while also using cloud resources for more computationally intensive tasks.

In conclusion, the network edge is an important aspect of the IoT as it enables faster and more efficient data processing, improved security, scalability, and new use cases. The network edge technologies like Edge computing, fog computing and Edge cloud plays important role in this context.

As the number of IoT devices continues to grow, the network edge will become increasingly important in ensuring that the data they generate can be effectively managed and utilized.

 

 

Continue Reading

Technology

A Game Of Network Functions and Services

Published

on

A Game Of Network Functions and Services

Network functions and services are an essential part of any modern network infrastructure. They are responsible for managing the flow of data, ensuring that communication is seamless and efficient, and providing security and reliability.

One of the most basic network functions is routing, which determines the path that data takes as it travels through a network. Routers use routing protocols to determine the best path for data to take, ensuring that it reaches its destination quickly and efficiently.

Switching is another important network function. It involves the forwarding of data packets from one device to another within a network. Switches use MAC addresses to forward data packets to their intended destination, allowing for smooth communication between devices.

Firewalling is another vital network function. Firewalls are security systems that monitor and control network traffic, protecting the network from unauthorized access and potential threats. They act as gatekeepers for a network, allowing only authorized traffic to pass through and protecting the network from potential cyber attacks.

Load balancing is another important network function. It distributes network traffic among multiple devices, ensuring that no single device becomes overwhelmed and that communication remains stable.

Another network service is virtual private network (VPN) which allows for secure communication between remote devices. It creates a secure, encrypted tunnel for data to travel through, keeping it safe from potential attackers.

Domain Name System (DNS) services are used to translate human-friendly URLs into machine-readable IP addresses. This makes it easy for users to access network resources and simplifies the process of connecting to a network.

Network Address Translation (NAT) is used to share a single public IP address among multiple devices on a private network. It allows devices on a private network to communicate with devices on a public network while keeping the private network hidden.

Quality of Service (QoS) is another network service that is used to manage network traffic and ensure that critical applications and services receive the bandwidth they need to operate effectively.

These network functions and services work together to keep the flow of information running smoothly and efficiently. As technology continues to advance and networks become increasingly complex, it’s important to understand the different network functions and services available, and how they can be used to support the needs of different organizations.

A Game Of Network Functions and Services

Using the favorite fantasy series, Game of Thrones as a reference point to better explain the points, we can see that in the world of Game of Thrones, powerful leaders battle for control of the Seven Kingdoms, each with their own network of allies and resources at their disposal. Similarly, in the world of networking, network functions and services play a crucial role in managing the flow of data and ensuring that communication is seamless and efficient.

One key network function is routing, which determines the path that data takes as it travels through a network. In Game of Thrones, characters often rely on their knowledge of the land and its various routes in order to outmaneuver their enemies. Similarly, in a network, routers use routing protocols to determine the best path for data to take, ensuring that it reaches its destination quickly and efficiently.

Another important network function is switching, which involves the forwarding of data packets from one device to another within a network. In Game of Thrones, characters must navigate through complex political alliances and betrayals in order to gain control of key territories. Similarly, in a network, switches use MAC addresses to forward data packets to their intended destination, allowing for smooth communication between devices.

Firewalling is another vital network function. Firewalls are security systems that monitor and control network traffic, protecting the network from unauthorized access and potential threats. In Game of Thrones, characters must often defend their strongholds from invaders and protect their secrets from enemies. Similarly, firewalls act as gatekeepers for a network, allowing only authorized traffic to pass through and protecting the network from potential cyber attacks.

Load balancing is another important network function. In the world of Game of Thrones, powerful leaders must distribute resources and troops strategically in order to maintain control of their territories.

Similarly, in a network, load balancers distribute network traffic among multiple devices, ensuring that no single device becomes overwhelmed and that communication remains stable.

Beyond these core functions, there are also various network services that can be implemented to further enhance the capabilities of a network. For example, virtual private networks (VPNs) allow for secure communication between remote devices, much like how the Night’s Watch protects the Wall and the realm from the Wildlings and White Walkers.

Similarly, Domain Name System (DNS) services allow for easy access to network resources by translating human-friendly URLs into machine-readable IP addresses. This is similar to how the Maesters in the Citadel help to preserve the knowledge and history of the Seven Kingdoms.

Just as in Game of Thrones, where different houses and factions have different strengths and weaknesses, different network functions and services may be more or less suitable for different types of networks and organizations. For example, a small business may not require the same level of security as a government agency, but they may require more resources to support a large number of employees.

In conclusion, network functions and services play a crucial role in managing the flow of data and ensuring that communication is seamless and efficient. From routing and switching to firewalling and load balancing, these functions and services work together to keep the flow of information running smoothly, much like how different houses and factions in Game of Thrones must work together to maintain control of the Seven Kingdoms.

As technology continues to advance and networks become increasingly complex, it’s important to understand the different network functions and services available, and how they can be used to support the needs of different organizations.

In conclusion, network functions and services are an essential part of any modern network infrastructure. They are responsible for managing the flow of data, ensuring that communication is seamless and efficient, and providing security and reliability.

Understanding the different network functions and services available, and how they can be used to support the needs of different organizations, is crucial to maintaining a stable and efficient network.

 

 

 

Continue Reading

Technology

The Magic of Network Virtualization: How Overlay Networks are Changing the Game

Published

on

The Magic of Network Virtualization: How Overlay Networks are Changing the Game

Have you ever wondered how the internet is able to connect so many different devices, from smartphones to laptops to servers, all around the world?

The answer lies in something called network virtualization. In simple terms, it’s a way to divide a physical network into multiple virtual networks, each with their own set of rules and configurations. And one of the most powerful tools for doing this is something called an overlay network.

In this blog post, we’re going to take a closer look at what network virtualization and overlay networks are, how they work, and why they’re so important for the future of the internet. We’ll also explore some real-world examples of how these technologies are being used today, and take a look at some of the benefits and challenges of network virtualization.

So, sit back, relax, and get ready to discover the magic of network virtualization and overlay networks!

What is Network Virtualization?

Network virtualization is the process of creating multiple virtual networks on top of a single physical network. This is done by using software to divide the physical network into multiple “virtual” networks, each with its own set of rules and configurations.

Think of it like building a house. A physical network is like the foundation of a house, while virtual networks are like the rooms inside. Just like how you can divide a house into multiple rooms, each with its own function, you can divide a physical network into multiple virtual networks, each with its own set of rules and configurations.

Why is Network Virtualization Important?

There are many reasons why network virtualization is important, but perhaps the most significant is that it allows for greater flexibility and scalability. With traditional networks, it can be difficult and time-consuming to make changes or add new devices. But with virtual networks, it’s much easier to make changes and add new devices, since each virtual network can be managed separately.

Another important aspect of network virtualization is that it allows for better security. Since each virtual network can be configured with its own set of rules, it’s easier to keep sensitive data and devices separate and secure.

What is an Overlay Network?

An overlay network is a virtual network that is built on top of another network, typically a physical network. Overlay networks use software to create virtual connections between devices that are not directly connected to the same physical network.

Think of it like a map overlay on Google Maps. You can see the physical roads and buildings, but you can also see virtual overlays like traffic, public transportation routes, and more. In the same way, an overlay network allows you to see virtual connections on top of a physical network.

The Magic of Network Virtualization: How Overlay Networks are Changing the Game

Why are Overlay Networks Important?

Overlay networks are important for a number of reasons, but perhaps the most significant is that they allow for greater flexibility and scalability. With traditional networks, it can be difficult and time-consuming to connect devices that are not directly connected to the same physical network. But with overlay networks, it’s much easier to create virtual connections between these devices.

Another important aspect of overlay networks is that they allow for better security. Since overlay networks can be configured with their own set of rules, it’s easier to keep sensitive data and devices separate and secure.

Real-World Examples of Network Virtualization and Overlay Networks

One of the most popular examples of network virtualization and overlay networks is software-defined networking (SDN). SDN is a type of network virtualization that uses software to create virtual networks on top of physical networks.

Another example is virtual private networks (VPN s). A VPN is an overlay network that creates a virtual connection between two devices, allowing them to communicate as if they were on the same physical network, even if they’re in different locations. This is often used for remote workers to securely access a company’s network from home.

Another example is cloud computing, where a virtual network is created on top of a physical network to connect servers and storage devices in different locations. This allows for greater flexibility and scalability, as well as better security, since data and devices can be kept separate and secure.

In Africa, for example, some companies are using network virtualization and overlay networks to create smart cities. This includes using sensors and cameras to collect data on traffic, weather, and more, and then using this data to optimize traffic flow, reduce energy consumption, and improve public services.

Benefits of Network Virtualization and Overlay Networks

There are many benefits to using network virtualization and overlay networks, including:

Greater flexibility and scalability: Virtual networks can be created and modified quickly and easily, allowing for greater flexibility and scalability.

Better security: Virtual networks can be configured with their own set of rules, making it easier to keep sensitive data and devices separate and secure.

Improved efficiency: Virtual networks can be optimized for specific tasks, improving efficiency and reducing costs.

Reduced downtime: Virtual networks can be configured with failover and redundancy, reducing downtime in case of a failure.

Challenges of Network Virtualization and Overlay Networks

While network virtualization and overlay networks have many benefits, there are also some challenges to be aware of, including:

Complexity: Virtual networks can be complex to set up and manage, requiring specialized knowledge and skills.

Limited resources: Virtual networks require a significant amount of resources, such as bandwidth, storage, and processing power.

Lack of standardization: There is currently a lack of standardization in the virtual network industry, making it difficult to interoperate different virtual networks.

Security concerns: Virtual networks can introduce new security risks, such as virtual machine (VM) escape attacks and other cyber threats.

Conclusion

Network virtualization and overlay networks are powerful tools for creating virtual networks on top of physical networks. These technologies allow for greater flexibility and scalability, as well as better security. They are used in a variety of real-world examples such as Software-defined networking (SDN), Virtual private networks (VPNs), Cloud computing and Smart cities in Africa.

While there are challenges to be aware of, such as complexity, limited resources and security concerns, the benefits of network virtualization and overlay networks make them an essential part of the future of the internet. As we continue to rely more heavily on the internet, it is important to understand the technology that makes it all possible, and network virtualization and overlay networks are a big part of that.

 

 

 

Continue Reading

Trending