Skip to main content

标 题: ATT unlimited 4G LTE data plan No Throttling可以代替家里的

发信人: jhe123 (jhe), 信区: CellularPlan
标  题: ATT unlimited 4G LTE data plan No Throttling可以代替家里的
发信站: BBS 未名空间站 (Sun Aug 19 17:21:42 2018, 美东)

请教一下:现在看Ebay上有deal, 说是30刀一个月forever,unlimited 4g data
without throttling。网速可以达到15-100M。这个可以代替家里的WiFi吗?

***********************************************************

Update一下: 8月25号开通的服务,到今天(九月九号)用了70G多一点,到现在还没
有限速的情况发生,用的是ZTE Velocity的hot spot, 在我这儿室内速度基本在18到22
之间波动,家门外能有35左右。三四个手机/电脑同时看youtube或者netflix没有任何
问题。

缺点目前发现两个,1:连续用上10个小时左右,有时会有一两个到全部手机/电脑掉线
然后连不上,这时需要把hot spot的WiFi关掉再打开就解决了。2:用微波炉时会发生
干扰,而以前用正规internet(包括ATT, Comcast)的WiFi时从来没发生过。不知道
这种小hot spot的发射原理和正规WiFi是否不完全相同?期待哪位大拿能解释一下。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...