Feeds

Give us your poor, your huddled masses…

And we'll get them set up with the Post Office

  • alert
  • submit to reddit

Security for virtualized datacentres

Trade secretary Stephen Byers today told of a new Post Office Bill that will change the grubby little boxes into beacons of the Internet age.

He listed the three main aims of the bill as:


  • Establishing a universal bank Quoting a figure of 3.5 million people without a bank account in the UK, post offices will act as a bank, offering cash withdrawal, direct debits etc., etc.
  • Provide Internet access and opportunities for e-commerce Internet terminals are to be put in all post offices and staff to be trained to help people use them. The bill will also free the Post Office from various legal restraints so branches will be able to pursue ecommerce ideas. One suggested by Byers himself was as a package holding station for goods bought over the Internet.
  • Post Office to be more greatly involved in government services Also using the Internet, the government hopes that post offices will become a one-stop shop for information and advice on its services, extending the traditional car tax and licence transactions.


Byers also spelt out a commitment to rural post offices, over 500 of which have closed in the last year alone. The Post Office will be made responsible for maintaining the rural network and preventing any avoidable closures. Sadly, "unavoidable" closures were defined as those offices where no one wanted to take them over or where they were not commercially viable.

None of these aims would be possible the secretary claimed, if it hadn't been for the government's £ 500 million investment in online modern systems for the Post Office.

So there you have it. It won't be Bill Gates, Richard Branson or even Tony Blair that will lead the common people into the digital future. No, it will be Doris and Gladys. These master-tearers of stamps, mental-arithmetic champions, community heros, it will be them that will walk slowly round the edge of the counter and stumble - carefully but with great determination - up the hill of providence, with all of us behind.

How very British. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.