Sunday, December 27, 2009
GMN, Google Maps Navigation
The patent infringement case in which Nokia is seeking monies from Apple for GSM, UMTS (3G) and WiFi patents.engadget went on a digging safari to find out facta and came out with fact to show us it is a simple case of Nokia asking what is due from Apple. But more I read these patent cases, more I get confused. Why are we making standards based on patents? even if "fair, reasonable, and non-discriminatory" terms (or FRAND terms) are in place to stop companies like Nokia from gauging the rest of the world who ever makes a cell phone.
But I guess Apple would do the same if they owned the patent :).
So read and learn more about how these patents and law suits work.
Today Todd has posted an article explaining the misinterpretation of his thoughts and the verbalization of the same.
My comment in the article was not that “Asterisk attacks are endemic”, but that SIP-based brute force attacks are endemic. Every SIP system that is open to the “public” Internet is seeing large numbers of brute-force attacks. Sites that have weak username and weak password control will be compromised – this is little different than email accounts being taken over by password-guessing systems and used for sending floods of email. The significant difference is that when someone takes over a SIP platform to make outbound calls, there is usually a direct monetary cost, which gets people’s attention very quickly.We all know that Asterisk is used world over and is the favorite SIP based telephony platform is likely to attract people who are interested in hacking or attacking the system. But we also have seen security measures taken by Asterisk as well. Just like the one released day before yesterday, AST-2009-07, where the advisory and the fix was released simultaneously.
But what Todd wrote makes sense and as Asterisk, Broadsoft, Cisco, Kamailio, OpenSER, FreeSwitch, Avaya are all vulnerable to brute force attacks and every bit of information will help. Whether it is news worthy or not.
It is attempt by Acer to give users a netbook powered both by Windows XP and Android (Dual Boot). It certainly is attractive and if I did not know better would have grabbed one myself.
Google has not blessed the device and there is no Android Browser (there is a modified Firefox) and no GMail app. (There is a Firefox link to gmail pretending to be a GMail app). But what put me off was the crappy integration of the hardware and the OS.
I will wait or use this Android OS live CD LiveAndroid! (This is not the Google Android OS, which is forthcoming)
Making search more musical snapvoip.blogspot.com
Google in it's quest to master search (I thought they already did that!) bringing in new features to the search engine arena. The latest is the Google musical search.
They have reduced the time to results (time to music) by providing the capability of listening to snippet of music or song you are searching for;
your search results will include links to an audio preview of those songs provided by our music search partners MySpace (which just acquired iLike) or Lala. When you click the result you'll be able to listen to an audio preview of the song directly from one of those partners. For example, if I search for [21st century breakdown], the first results provide links to songs from Green Day's new album. MySpace and Lala also provide links to purchase the full song.That is not all, the partnership with with Pandora, imeem and Rhapsody to include links to their sites in your search results may actually get you there, in time.
As they say it is as easy easy as connecting your webcam, login to the twitcam with your twitter account and press the button to broadcast, you are done, for now.
Now twitcam will;
Post your video description and link to Twitter for all your followers to see. WHile your stream is casting, you can tweet or chat with your viewers right from the broad cast screen
Once you’re done broadcasting, twitcam archive your video and display it on the same page
Lobbyists now will have to take extra care since metadata in public records are public records snapvoip.blogspot.com
According to ARS, Arizona Supreme Court has ruled that meatadata attached to a public record is public record, in a ruling on an an Arizona case.
A case by a police officer who was demoted for reporting serious police misconduct, demanded to see metadata attached to reports filed by fellow officers, was refuced.
The case traveled a long way before landing in the Supreme Court which ruled such metadata is public records. Hooray!
Now we can see likes of California Attorney General Bill Lockyer peddling for MPAA and anti-google lobbying and Google's own doing, publicly!
If you thought phones are getting better OSs these days, you are in for a shock as, there is a pretty good phone coming out or planing to come out, running a full blown copy of windows XP! Yes Gizmodo has got the scoop on the phone and the specs, which has parts list which includes a touch screen (800X480) a hard disk of size up to 120GB (eat that Apple);
• CPU: AMD Super Mobile CPU
• Memory: 512M/1G
• SSD: 8G/16G/32G/64G
• HDD: 30G/60G/80G/120G
• LCD: 4.8' TFT Touch-screen LCD 800*480
• Operating System: Microsoft Windows XP
• Network: GSM/GPRS/EDGE/WCDMA (HSDPA/HSUPA)
• CDMA/CDMA2000 1X/CDMA1X EVDO,TD-SCDMA，TD-HSDPA
• Wireless: WiFi 802.11b/g,WiMax(optional),Buletooth,Stand-alone GPS
• Camera Specifications:CMOS, 300k/1.3 Million
• Talk time: about 5 hours,Stand by time: about 5 days
• Real life: about 7 hours(Standard), about 12 hours(Large)
Grandstream just announced that it is providingways for GXV3140 IP Multimedia Phone to go wireless with a WiFi USB adapter. Even though it appears to be an after thought, the WiFi USB adapter fully complies with the latest 802.11n standard as well as legacy 802.11b/g standard. The device supports low power management, and various security standards such as WEP 64/128, WPA (PSK), WPA2 (PSK), TKIP, and AES, allowing to be comfortable in most situations.
The GXV3140 has a USB port that can accomodate the WIFi adapter and depending on the connection you can have a very high bandwidth allowing the IPvideoTalk without any problems. And if you decide to take the phone with you, the same capabilities will be available where ever there is a wireless connection.
This allows GXV3140 users greater freddom whether one is at home or at a hotel room. Allowing video conferencing from office as well from a nice place in ones garden.
The phone, GXV3140 itself is a very capable IP Multimedia phone which supports video telephony and supports a number of web and social networing applications. It sports a 4.3” 480x272 digital color LCD and an advanced 1.3M pixel tilt capable CMOS camera (with privacy shutter) for video presentation. The phone has dual Ethernet ports, SD USB, a stereo headset jack, TV-out, stereo audio-out, and a full duplex speakerphone.
The phone supports anything thing a internet connected device provides, web, internet radio and IM services like Yahoo, MSN, and Google.
The phone is capable of supporting localization in 9 languages and Youtube, Facebook, Twitter, horoscopes, and 3-way video conferencing are promised in near future.
The USB WiFi Adapter will be available in November.
Between the G1 and iPhone, I would choose iPhone but I always rely on BlackBerries to do my work. From what I have read so far, I think there will be a very capable droid or something very close to it, in my life.
The current system only allow Latin alphabet letters A-Z, the digits 0-9 and the hyphen in the domain names but the new procedure will allows non roman alphabets to reach a website by typing the name in their own language. The system is going to prove difficult as the DNS servers need to support the new language modification.
ICANN has set restrictions on selecting a language for IDNs: official language of a country or territory, or at minimum "serve as a language of administration."
It is also going to cost $26000 per language as a evaluation processing fee and a maintenace cost of 3% of domain registration fee of which both could be waived after proper request.
CONTAINS:Adventure Boy Aqua Driller Battle Brain Beatmania]Brain Genius 2 Bugs Bunny Rabbit Rescue Capture The Flag Chronicles Of Avael Comic Blast Dark Dimension Detetive Stripes DragonBall Unreal Ice Age 3 Lift Boy Luxor Quest Mercenaries 2 Pub Darts Red Bull Air Race Stranded 2 Transformers 2 Turbo Jet Ski 3D Up COMPATIBILITY LIST:All mobiles with 176x220 & 176x208 screensize.Download: 9 MB
Buzz- Brain Of The World
Capture The Flag
Chronicles Of Avael
Edgar Cave Of Secrets
Ice Age 3
Metal Gear Classic
Mickey's Journey To The West
Puzzle Quest Warlords
Red Bull Air Race
Soul Of The Demon
Turbo Jet Ski 3D
All mobiles with 240x320 screensize
Download: 11.4 MB http://www.ziddu.com/download/496448...l.com.rar.html
Monday, October 26, 2009
Get Anytime/Anywhere access to The Wall Street Journal news with this customizable application. Automatically updates your phone with critical news, market moves, and in-depth analysis of game changing global events, even offline.
Now! The Wall Street Journal Mobile Reader delivers ALL NEW local market coverage in Asia and Europe & FREE Real Time delivery of US Stock Quotes.
- BlackBerry® Bold™
- BlackBerry® Curve™
- BlackBerry® Pearl™
- BlackBerry® Storm™
- BlackBerry® 8700 Series
- BlackBerry® 8800 Series
Ringtone Shuffler, a ringtone shuffling software by Gx5 is a new BlackBerry software that lets you hear a different custom ringtone each time you receive a call. This feature is extremely useful when you have many custom ringtones that you have added to your BlackBerry and wish to enjoy them all. This great new software lets users personalise their phones and calls and helps break the monotony of having a single ringtone for every call.
Additionally, Ringtone Shuffler also allows users to shuffle ringtones from a pre-selected list of ringtones. This means that users can also decide the list of ringtones for shuffling. This allows users to categorize their ringtones and select different lists according to their mood or wish, quite like a music playlist. For instance, if you have around 20 ringtones but you wish to hear only 5 of those, you can choose those five and only they will shuffle. Ringtone Shuffler also offers smart shuffling.
The BlackBerry Ringtone Shuffler works best when used in combination with the BlackBerryRing ToneMaker produced by the same company. The BlackBerryRing ToneMaker is a Windows desktop application that lets users custom make their own BlackBerry ringtones using the music available in their music library. This eliminates the need of purchasing ringtones for the BlackBerry.
Its intuitive interface automatically transfers the custom ringtones to the smartphone and even offers features like fade in and fades out of ringtones. Moreover, this software allows users to create ringtones to an accuracy of about one hundredth of a second. With BlackBerryRing ToneMaker, users can now select which ringtone as well as which part of it they wish to use.
Ringtone Shuffler is available for $3.95 and can be purchased and downloaded here. The BlackBerryRing ToneMaker can be purchased for $9.95 and can be downloaded here. This useful application supports the BlackBerry storm in addition to all the other models supported by Ringtone Shuffler.Ringtone Shuffler supports the BlackBerry Curve, Curve 8900 series, 8800 series, Pearl, Bold and Pearl Flip. Ringtone shuffler requires the BlackBerry smartphone to have a media card inserted a minimum available space of 300kb. For the BlackBerry Curve, Pearl and 8800 series, Operating Systems 4.2, 4.3, 4.5, supports Ringtone Shuffler while for the BlackBerry Bold, Pearl Flip and Curve 8900, Operating System 4.6 is required. BlackBerryRing
BlackBerry's already had it since December in beta form, but they're now at a stable 1.0 release; and speaking of 1.0 releases, that iPhone version Sling's been talking up for a while now has now been submitted to Apple's App Store for approval, so we hope we'll be seeing that on the open market shortly. Now, if you'll excuse us, we have some Dora to watch on the Bold.
Now that it supports album art, Vista 64-bit and there’s a public beta for Mac users, RIM just let us know that BlackBerry Media Sync 2.0 has been updated to support Windows Media Player and will be available as of 4PM EST. For those of you who have a BlackBerry and have yet to try out BlackBerry Media Sync 2.0, the program allows you to fill your ‘Berry with music via iTunes — and now Windows Media Player — making it unnecessary to manually load MP3 files onto your device like in days of old. If you already have BlackBerry Media Sync 2.0, you will be prompted to upgrade automatically.
For everyone else you can hit up www.blackberry.com/mediasync on your desktop.
In a move that was somewhat anticipated, AdMob has launched an iPhone exchange for developers seeking to drive more downloads. Apps/developers contribute a portion of their inventory to the exchange and they get ad space on other apps.
It creates various opportunities for apps to be discovered by users of . . . other apps. This is a logical extension of what AdMob was already doing in advertising apps on other apps.
The growth of this apps "ecosystem" benefits AdMob in the long run as it becomes the ad network that many of these developers will use to monetize their free apps. AdMob also needs to continue to promote downloads because many apps are "perishable" and don't have a long iPhone shelf life.
Tuesday, October 6, 2009
The phone is designed to resemble the shape of a shiny pebble, and uses a small solar panel to provide power.
“This phone demonstrates our small but meaningful commitments for the future and our environment,” said JK Shin, an executive vice president at Samsung.
Blue Earth is made from recycled plastic and features a special “Eco Mode” that users can access with a single click to wring the maximum energy use from the device.
A full solar charge of around 10 to 14 hours will provide enough power for around four hours of talk time. The handset can still be charged normally using a conventional plug, with the solar panels used to top up the battery during use.
It also has a built-in pedometer to help users to measure how much smaller their carbon footprint is when walking rather than driving.
Blue Earth goes on sale in the UK later this year and Samsung did not give any details about price or network partners. However, sources hinted that the handset was likely to be priced at the upper end of the market.
The Behold has a large 3.0-inch LCD color touch screen displays crisp, clear images and offers responsive feedback called haptics. A built-in accelerometer automatically switches the screen between portrait and landscape modes.
Through Samsung's innovative TouchWiz user interface, users can 'drag and drop' widgets to personalize the handset - functions such as the clock, music player, instant messaging and photos.
Users can blog, text and chat with the virtual QWERTY touchpad. Multiple messaging capabilities include text, multimedia messaging, instant messaging, email and Audio Postcard support.
The built-in 5.0-megapixel camera and camcorder with flash and auto-focus snaps high-resolution photos and videos.
A GPS receiver uses TeleNav GPS Navigator for turn-by-turn driving directions with maps.
The Behold has high-speed connectivity and a full HTML web browser for faster access to the Internet.
With stereo Bluetooth wireless technology, speakerphone and voice activated dialing, the Behold lets customers go handsfree.
Tuesday, August 25, 2009
when choosing the technology and target platform for your mobile project or application, you will find several possibilities. There are several kinds of mobile phone platforms available and most have somewhat different characteristics. For example, Windows Mobile development is different from iPhone development, even though the target markets are quite the similar. Similarly, MIDP and Symbian development differ, even though the actual target device might be the same. With so many choices—and the introduction of the iPhone and Android during the past year or so adding to them—your best bet is to develop something that runs on multiple platforms.
Here are some of the questions you need to ask before you start the development:
- To whom are you targeting the application? Is it a consumer application or a corporate application?
- Is your project a game or an application? If a game, you should figure out which types of people will play it and what kind of devices they have.
- What kind of requirements do you have for the technology? Symbian applications may be your only choice if your users already have Symbian phones and don't want to buy new ones.
- How quickly do you need the application or a prototype?
- How much money can you spend on the development? After all, almost always the most important factor is money.
With so many choices and considerations to address, this article provides a high-level comparison of the most used platforms and to help you determine which best fits your purposes.
Oh, the Possibilities
Listing all the mobile development technologies available is beyond the scope of this article, but these are the most commonly used options.
SMS and MMS
SMS (Short Message Service) and MMS (Multimedia Service) use the basic functionalities of the mobile phone to enable users to send text and multimedia content, respectively. Every phone (these days) should have SMS/MMS functionalities and people generally are well aware of how to use them. Developing SMS/MMS applications is a lot different from all the other technologies that are described here, since SMS/MMS development takes place only on the server side. The simplest way to make an SMS application (for example, one that receives a message and sends a joke) is to select a mobile service provider and write a simple PHP script that communicates with the provider's messaging interface.
Mobile Information Device Profile (MIDP) 1.0, a Java runtime environment for mobile devices such as cell phones and PDAs, sparked the mobile Java revolution. It turned out to be a little limited, however, because its applications didn't really deliver "write once, run anywhere" portability. This was mostly because mobile phone manufacturers didn't perform their MIDP implementations exactly the same way, and many even favored proprietary APIs. This made writing even a simple application that would work on all MIDP 1.0 devices extremely difficult. MIDP 2.0 fixed many of these problems with new features including an enhanced user interface, multimedia and game functionality, greater connectivity, over-the-air (OTA) provisioning, and end-to-end security.
Symbian is an operating system for smart phones that has become quite popular. Nokia in particular has been using it heavily. Symbian has a number of user interface platforms, such as Nokia's Series 40, Series 60, and Series 80. Developing with Symbian is a lot more complicated than developing with MIDP, but Symbian applications are more reliable because they are targeted and designed for a particular UI and platform. Symbian development is done mainly in C++.
Windows Mobile is Microsoft's operating system for mobile devices such as PDAs and mobile phones. 'Pocket PC' is no longer in use; devices without a phone are called Windows Mobile Classic devices. Windows Mobile resembles other Windows operating systems, which makes it quite easy for the end user to learn. Thousands of applications are available for Windows Mobile, such as word processing, personal information management, e-mail, etc. The typical development languages for Windows Mobile are Visual C++, .NET, and Java.
Since acquiring Palm OS, ACCESS has been offering the ACCESS Platforms, which offer development environments with Garnet OS (an extended version of the previous Palm OS), Web 2.0, and Java. ACCESS is a Linux platform that operates in a similar way as Symbian: it licences the platform to mobile device manufacturers. This article discusses only the Garnet OS. ACCESS development typically is done in Java.
Apple's launch of the iPhone has been much discussed in the media, mostly because of its features (and lacking features)and price tag. Still, it has sold reasonably well and its users seem to appreciate it as not just a phone, but also as a mobile Internet device. The recently launched iPhone SDK lets you develop applications to run in the device, as well as web applications that are designed for the iPhone. The iPhone SDK development is done with the Cocoa Touch framework and Objective-C.
Although Google gets nearly all the credit, a group of more than 30 technology and mobile companies developed the Android mobile platform. Android is an open and free software stack for mobile devices that includes an operating system, middleware, and key applications. The first Android devices will probably be released in the first half of 2008. The development language for Android is Java.
if you're just setting out to develop your first mobile application, you may still be grappling with the fundamentals of installing SDKs, obtaining hardware, and scaling your application to the limitations of today's mobile platforms. One thing you may not be considering, however, is signing your application—cryptographically endorsing it with an identifier that others can use to trace its origin to you.
This article reviews why application signing is important, and provides a reference so you can determine the steps necessary to sign your application for today's leading mobile platforms. Armed with this information, you'll be ready to distribute your application.
Why Sign Your Application?
You might be wondering why the code signing process is even necessary—after all, the mainstream computing market has existed for years with no comparable analogue. Do mobile platform providers and carriers foist application signing on you just an additional barrier to entry?
In a word, no. Code signing provides stakeholders throughout the value chain—application testers, carriers, and users—with a clearly defendable trail of entities that have contributed to your application. By signing your application, end users can verify that your application is actually from you, and easily determine whether an intermediary has tampered with your application. Even more important, the signatures others apply to your application—such as application testers and the carrier distributing your application—provide the user with important information about the reliability of your application.
This second fact is key. On today's mobile platforms, a number of applications may not be permitted to run without the appropriate signatures. Platform interfaces requiring a user's trust (such as those that access device location or private data such as your contacts) may require additional credentials—provided through signing—in order to operate. If you don't correctly sign your application, and obtain signatures from appropriate entities such as testing houses and carriers, it won't have access to the interfaces it needs to deliver value to your users.
Critics may charge that this use of application signatures leads to closed platforms, but the anonymous and unverifiable alternative simply doesn't scale to the billions of wireless devices on the market today. Without some kind of access protection and non-repudiation scheme in place, users and network operators must simply trust every application equally or limit platform functionality to protect the network and end users.
As an aside, code signing isn't just for mobile platforms, either. Major platforms including Microsoft Windows and Mac OS X now provide facilities for code signing, and vendors warn developers that in the future, code signing may be required in to access specific APIs, in much the same way that many mobile platforms do. In the future, expect signed code to play an important role in software distribution.
How Does Application Signing Work?
Public-key cryptography provides tools that support today's need for trust and security. The basic principle of application signing is simple:
- An application developer (presumably, that’s you!) obtains a cryptographic key from a well-known and trusted certificate authority. You keep this cryptographic key to yourself as private knowledge.
- Using this private key and a one-way hash of your application, you encrypt the one-way hash, signing your application. This encrypted hash is included when distributing your application.
- You transfer the application to the recipient.
- The recipient—a testing authority, other agency, or the end consumer—creates a one-way hash of your application.
- The recipient decrypts the digital signature you created in step 2 and compares the results with the one-way hash of your application. If the hashes match, the recipient has assurance that the application has been delivered intact and is actually from you.
The signing process can be repeated at various steps through the value chain. For example, a testing house will apply their signature to your submitted and tested application after it passes their rigorous testing; later, consumers of your product can verify their signature to ensure that the version of the application they're about to execute has met the testing company's standards.
When signing an application for a mobile device, you follow essentially the same steps just described, using keys obtained from specific sources (such as Verisign or Thawte) and tools provided by the platform vendor. Unfortunately, the sources of both keys and tools vary from platform to platform, making the process a perplexing one. For example, if you're an accomplished BREW developer, you may be somewhat puzzled the first time you need to sign a Java ME application. Note that some platforms—notably Android—let you self-sign your applications, using locally generated keys. Self-signed applications are a compromise between convenience and trust, because they spare you the time and expense of working with a certificate authority to prove your identity and obtain a key. This means that it's easier to create a self-signed application—but because anyone can do it without proving their identity, it's easier to spoof a vendor's identity.
Typically, application signing is the last step before a submission for certification, because you can't make changes to a signed application (you'd break the one-way hash you create during the signing process, breaking the chain of integrity the very process is meant to ensure). Because application certification is so closely related to application signing, most developers conflate the two. They are, however, two different processes—you sign your application so that the tester and others can definitively identify the source of the application. Once your application is signed, you have a third-party certify your signed application to meet specific operational standards set by the carrier or other channel that will distribute your application. The discussion that follows focuses on the application signing process, but also provides some information about the certification submission process for each platform, because it does you little good to have a signed application ready for certification, and no idea how to get it certified!
WAP or wireless Application Protocol, adds a new dimension to the Internet i.e. mobility. With a mobile phone or a laptop that supports WAP you can book tickets, order food and check your bank account at any time. You can play games while stuck in traffic, get the stock market news in the elevator… complete mobility, the world wide web with you all the time. It also includes services such as downloading entire phone books and new, improved ways of controlling outgoing and incoming calls will make mobile telephony even easier. To access WAP services you need a WAP product. Besides the WAP compatibility, WAP products have a large full graphic display and include a micro browser. The basic function of WAP is for mobile phones to be able to communicate with a server installed in the mobile phone network. It brings together the web and telecommunications. Of course, as all new technologies, WAP also comes with its questions and hesitations.
|HISTORY AND BRIEF TECHNOLOGICAL OVERVIEW|
This technology is only a couple of years old. Brought in by a company called "Unwired Planet", a combination of the leading telecommunications companies.
|ADVANTAGES OF WAP|
|FREQUENTLY ASKED QUESTIONS|
Which content is possible to access with WAP?
|DISADVANTAGES OF WAP|
The General Packet Radio Service (GPRS) is a new non-voice value added service that allows information to be sent and received across a mobile telephone network. It supplements today's Circuit Switched Data and Short Message Service. It is a step ahead to provide a massive boost to mobile data usage and usefulness. Payments are made as per data volume, instead of per minute pulse rate. You need to pay a fixed rent around Rs. 750 per month, after which you can surf for unlimited hours. Except for one thing, as a developing technology, the net connection is a slow process.
- Surfing the net; emailing; all through the mobile.
Fast transmission of text documents, spreadsheets, photographs and illustrations; mobile chatting and on-line games.
- A round the clock net connection, even when you are on the move.
A GPRS can achieve speeds up to 171.2 kilobits per second (kbps) using all eight timeslots at the same time. This is thrice as fast as current data transmission systems.
GPRS facilitates instant connections whereby information can be sent or received immediately as the need arises, subject to radio coverage. No dial-up modem connection is necessary.
NEW APPLICATIONS, BETTER APPLICATIONS
GPRS facilitates several new applications that have not previously been available over GSM networks due to the limitations in speed of Circuit Switched Data (9.6 kbps) and message length of the Short Message Service (160 characters). GPRS will fully enable the Internet applications you are used to on your desktop from web browsing to chat over the mobile network.
WHAT DO YOU NEED FOR A GPRS ?
- To begin with, a mobile phone or terminal that supports GPRS.
A subscription to a mobile telephone network that supports GPRS. § Knowledge of how to send and/ or receive GPRS information using their specific model of mobile phone, including software and hardware configuration.
A destination to send or receive information through GPRS. Whereas with SMS this was often another mobile phone, in the case of GPRS, it is likely to be an Internet address, since GPRS is designed to make the Internet fully available to mobile users for the first time.
KEY NETWORK FEATURES OF GPRS
PACKET SWITCHING GPRS
involves overlaying a packet based air interface on the existing circuit switched GSM network. This gives the user an option to use a packet-based data service. With GPRS, the information is split into separate but related "packets" before being transmitted and reassembled at the receiving end.
Efficient use of scarce radio resources means that large numbers of GPRS users can potentially share the same bandwidth and be served from a single cell. The actual number of users supported depends on the application being used and how much data is being transferred. Because of the spectrum efficiency of GPRS, there is less need to build in idle capacity that is only used in peak hours. GPRS therefore lets network operators maximise the use of their network resources in a dynamic and flexible way, along with user access to resources and revenues.
GPRS fully enables Mobile Internet functionality by allowing inter-working between the existing Internet and the new GPRS network.
LIMITATIONS OF GPRS
LIMITED CELL CAPACITY FOR ALL USERS
There are only limited radio resources that can be deployed for different uses- use for one purpose precludes simultaneous use for another. For example, voice and GPRS calls both use the same network resources. The extent of the impact depends upon the number of timeslots, if any, that are reserved for exclusive use of GPRS.
SPEEDS MUCH LOWER IN REALITY
Achieving the theoretical maximum GPRS data transmission speed of 171.2 kbps would require a single user taking over all eight timeslots without any error protection. Additionally, the initial GPRS terminals are expected to be severely limited- supporting only one, two or three timeslots. The bandwidth available to a GPRS user will therefore be severely limited.
APPLICATIONS OF GPRS
A wide range of corporate and consumer applications are enabled by nonvoice mobile services such as SMS and GPRS.
Because of its synergy with the Internet, GPRS would allow mobile users to participate fully in existing Internet chat groups rather than needing to set up their own groups that are dedicated to mobile users. Since the number of participants is an important factor determining the value of participation in the newsgroup, the use of GPRS here would be advantageous.
TEXTUAL AND VISUAL INFORMATION
You can receive information, which is in the form of not only text, but maps, graphs or other visuals.
Still images such as photographs, pictures, postcards, greeting cards and presentations, static web pages can be sent and received over the mobile network as they are across fixed telephone networks. It will be possible with GPRS to post images from a digital camera connected to a GPRS radio device directly to an Internet site, allowing near real-time desktop publishing.
You will also be able to receive moving images and receive transmission from anywhere.
You will also be able to use the GPRS for browsing the net. DOCUMENT SHARING/ COLLABORATIVE WORKING Mobile data facilitates document sharing and remote collaborative working. This lets different people in different places work on the same document at the same time.
Dictating to a mobile phone, would simply not give sufficient voice quality to allow transmission to be broadcast or analyzed for the purposes of background noise analysis or voice printing. Since even short voice clips occupy large file sizes, GPRS or other high speed mobile data services are needed.
Non-voice mobile services can be used to assign and communicate new jobs from office-based staff to mobile field staff. Customers typically telephone a call center whose staff take the call and categorize it. Those calls requiring a visit by field sales or service representative can then be escalated to those mobile workers.
With up to half of employees typically away from their desks at any one time, it is important for them to keep in touch with the office by extending the use of corporate email systems beyond an employee's office PC. Since GPRS capable devices will be more widespread in corporations than amongst the general mobile phone user community, there are likely to be more corporate email applications using GPRS than Internet email ones whose target market is more general.
Internet email services come in the form of a gateway service where the messages are not stored, or mailbox services in which messages are stored. In the case of gateway services, the wireless email platform simply translates the message from SMTP, the Internet email protocol, into SMS and sends to the SMS Center. In the case of mailbox email services, the emails are actually stored and the user gets a notification on their mobile phone and can then retrieve the full email by dialing in to collect it, forward it and so on.
By linking Internet email with an alert mechanism such as SMS or GPRS, users can be notified when a new email is received.
REMOTE LAN ACCESS
Remote LAN applications encompasses access to any applications that an employee would use when sitting at their desk, such as access to the intranet, their corporate email services such as Microsoft Exchange or Lotus Notes and to database applications running on Oracle or Sybase or whatever. The mobile terminal such as handheld or laptop computer has the same software programs as the desktop on it, or cut down client versions of the applications accessible through the corporate LAN. This application area is therefore likely to be a conglomeration of remote access to several different information types- email, intranet, databases. This information may all be accessible through web browsing tools, or require proprietary software applications on the mobile device. The ideal bearer for Remote LAN Access depends on the amount of data being transmitted, but the speed and latency of GPRS make it ideal.
You may download sizeable data across the mobile network. This data could be a presentation document for a traveling salesperson, an appliance manual for a service engineer or a software application such as Adobe Acrobat Reader to read documents. The source of this information could be one of the Internet communication methods such as FTP (File Transfer Protocol), telnet, http or Java- or from a proprietary database or legacy platform. Irrespective of source and type of file being transferred, this kind of application tends to be bandwidth intensive. It therefore requires a high-speed mobile data service such as GPRS, EDGE or 3GSM to run satisfactorily across a mobile network.
Home automation applications combine remote security with remote control. Basically, you can monitor your home from wherever you are- on the road, on holiday, or at the office. If your burglar alarm goes off, not only do you get alerted, but you get to go live and see who are perpetrators are and perhaps even lock them in. You can program your video, switch your oven on so that the preheating is complete by the time you arrive home and so on. Your GPRS capable mobile phone really does become like the remote control devices we use today for our television, video, hi-fi and so on. As the Internet Protocol (IP) will soon be everywhere- not just in mobile phones because of GPRS but all manner of household appliances and in every machine- these devices can be addressed and instructed. A key enabler for home automation applications will be Bluetooth, which allows disparate devices to inter work.
WHAT IS BLUETOOTH TECHNOLOGY ?
- A Radio Unit - consisting of a radio transceiver, which provides the radio, link between the Bluetooth devices.
- A Baseband Unit - a hardware consisting of flash memory and a CPU. This interfaces with the radio unit and the host device electronics.
- Link Management Software - a driver software or firmware which enables the application software to interface with the baseband unit.
- An Application Software - this implements the user interface and is the application that can run on wireless.
Bluetooth, named after the renowned Danish King, Harold Bluetooth, is a short-range wireless connectivity standard.
Bluetooth is capturing the minds of the present day technologists, as a technology enabler for the wireless unification of a wide variety of portable devices like mobile PCs, mobile phones and the like. It does away with the cables and enables voice and data transfer between the devices through wireless networks called piconets.
The primary segments identified for Bluetooth application are: Cellular & PCS Mobile Phones, Digital Cordless Phones, Data Access Points, PC Cards and Adapters , Notebook & Desktop PCs, Handheld PCs & Palm Companions / PDA s, Digital Still Cameras, Output Equipment, Automotive and Industrial & Medical applications.
The technology behind it:
Bluetooth is a Radio Frequency (RF) specification for short-range, point-to-multi-point voice and data transfer. An advantage of Bluetooth is it's similarity to many other specifications already deployed and it's borrowing of many a feature from these specifications. The 2.4GHz band is used by IEEE 802.11 to enable wireless LAN connectivity. Bluetooth borrows specifications to enable file sharing and data transfers between devices from IrDA (a wireless specification that uses InfraRed light to connect devices). HomeRF SWAP, a specification aimed at small network of devices for the home environment, is another source for Bluetooth.
It is omni-directional and has a present nominal link range of 10cm to 10m, which can be extended to 100m, with increased transmitting power. Bluetooth operates in the 2.4GHz Industrial-Scientific-Medical (ISM) Band and uses a Frequency Hop (FH) spread spectrum technology in which packets are transmitted in defined time slots on defined frequencies. A full duplex information interchange rate of upto 1Mbps may be achieved in which a Time-Division Duplex (TDD) scheme is used.
A Bluetooth System:
BLUE TOOTH USAGE MODELS
The three-in-one phone: It can work as cordless phones connecting to the public switched telephone network at home and office and thus incurring the fixed line charge. It could function as a walkie-talkie with other telephones in the same office or building, without incurring any charge. This telephone can also connect to the cellular infrastructure and function as a cellular phone, incurring cellular charges. At home, your phone functions as a portable phone (fixed line charge). When you're on the move, it functions as a mobile phone (cellular charge). And when your phone comes within range of another mobile phone with built-in Bluetooth wireless technology, it functions as a walkie-talkie (no telephony charge).
The Internet Bridge: In this usage model, mobile phone or cordless modem functions as a modem to the PC, providing dial-up networking and fax capabilities without a need for physical connection to the PC. Use your mobile computer to surf the Internet wherever you are, and regardless of whether you're cordlessly connected through a mobile phone (cellular) or through a wire-bound connection (e.g. PSTN, ISDN, LAN, xDSL).
The Interactive Conference: Here, multiple data terminals, use a Local Access Network (LAN) access point as a wireless connection to a LAN. Once connected, the data terminals operate as if they were connected to the LAN via dialup networking. The terminals can access all of the services provided by the LAN. In meetings and conferences you can transfer selected documents instantly with selected participants, and exchange electronic business cards automatically, without any wired connections.
The file transfer usage model offers the ability to transfer data objects from one device to another. Object types include, among others, ***.xls,***.ppt,***.wav,***.jpg,***.doc files or entire folders, directories or streaming data formats. Also, this offers a possibility to browse the contents of the folders on a remote device.
The Ultimate Headset: The Headset, can be wirelessly connected for the purpose of acting as a remote device's audio input and output interface .The headset increases the freedom of movement while maintaining privacy. The headset can be typically used with a cellular headset, cordless handset or personal computer for audio input and output. This headset will also have the ability to answer incoming calls and then terminate them without physically manipulating the telephone handset.
Connect your wireless headset to your mobile phone, mobile computer or any wired connection to keep your hands free for more important tasks when you're at the office or in your car.
The Automatic Synchronizer: This provides a device-to-device synchronization of the personal information management (PIM) information. Synchronization requires business card, calendar and task information to be transferred and processed by computers, cellular phones and PDA s, utilizing a common protocol and format. This involves, automatic synchronization of your desktop, mobile computer, notebook (PC-PDA and PC-HPC) and your mobile phone. For instance, as soon as you enter your office, the address list and calendar in your notebook will automatically be updated to agree with the one in your desktop, or vice versa.
The usage model being presented below are those which have been identified by the Bluetooth SIG's marketing group and helps us to get a peep into the vast areas of application of this wonderful standard.
IrDA AND BLUETOOTH
IrDA-Data (IrDA -> Infra-red Data Association) is another short-range wireless connectivity standard with an installed base of 50 million units, by now. IrDA is a point-to-point, narrow angle (30 degree cone), ad-hoc transmission standard designed to operate over a distance of 0 to 1 meter and at speeds of 9.6kbps to 4Mbps, which is expected to increase to 16Mbps.
While the application areas of Bluetooth and IrDA overlap, they are not competitive standards, necessarily. The short range, narrow angle of IrDA allows the user to aim, in point-and-shoot style at a targeted recipient, for example in a conference hall. Close proximity to the other person is natural in a business card exchange situation and the short range is an advantage of IrDA for such applications.
The directional nature of IR enables a low level security because of direct line-of-sight nature; but it provides for, no security at the link level. There are security loopholes as it is possible to eavesdrop on a conversation by detecting reflected light and filtering out the surrounding ambient noise.
In contrast, Bluetooth addresses the security concerns by providing authentication and encryption in its baseband protocol. Authentication relies on a challenge-response protocol utilizing a secret key, personal identification number or PIN. Bluetooth devices talking to one another should have the same PIN. The protocol allows each device to authenticate the other. After the devices are authenticated it is possible to encrypt the transmission for added security.
Thus, it is expected that while in some devices both IR and Bluetooth may co-exist, for the other applications, the choice of Bluetooth and IR will be based on the applications and required usage models.
Mind-boggling technology like the Bluetooth and GPRS, is on its way to make communications in the future, a completely different ball game. A ball game with a win-win situation. Pave way for the future with these technologies then. Curtsy www compareindia com
In standby mode,
45# + dials the number on your sim in memory slot 45.
50# + dials slot 50 and so on.
Display an image when someone's calling:
Menu > Contacts > "select a contact card" > Options > Edit > Options > Add thumbnail > "choose an image".
view version u are Using in urs mobile !
Type *#0000# to view which firmware version you are running.
MMS- MORE THAN JUST TALK
|This is the age of Multimedia Messaging Service. MMS is in; a versatile feature that allows users to send colour pictures, photographs, voice clips, programs, videos and ofcourse text from their cell phones. The rates are a little higher as compared to SMS, but MMS opens up a whole new world of communication at your finger tips. All you need is an MMS-enabled phone and a subscription to a service provider that supports MMS. With MMS, you can, not only send your messages from one phone to another, but also from phone to email, and vice versa.|
|You can send, store and edit picture messages. There are a number of sites online that let you download pictures free of charge. Some MMS phones even come with an inbuilt camera, so a person can click pictures spontaneously and send them across to another MMS cell phone user. But with phones that do not have an in-built camera, these pictures have to be obtained from the Internet. The messages sent and received are either in text or graphics, once again depending on the phone model. With MMS, you can even download MP3 music, games and video clips on your phone! |
The following networks offer MMS: BPL (Mumbai) - MMS and GPRS only for post-paid users at Rs. 199 per month with 100 MMS free. If you exceed the 100 limit, MMS are charged at Rs. 3. Hutch- Rs. 99 per month. Prepaid users have to also pay Rs.50 as the initial activation charge. Messages can be downloaded from the Hutch site at Rs. 8 per MMS. Sending MMS is free. Airtel- Offers free MMS service. To activate, you need to send an sms to 222 from your MMS enabled phone. Spice (Bangalore) - Rs. 99 per month. 25 outgoing messages free, after which there will be charge of Rs.5 per MMS. Idea- Offers downloading of video messages from their site. Also allows sending and receiving pictures and music.
SMART PHONES- (PDA PHONES)
One step further are PDA-enabled phones, more commonly known as smart phones. These have a Digital Organiser, Excel, Word and Internet capabilities- all in one phone. Some even have an integrated camera and a MP3 player. These phones have large screens and allow you to write into it (after you learn the easy technique). They also have voice recognition capabilities. These features make the phone bulkier and costlier but then these gizmos sure do separate the men from the boys.
|GPRS AND WAP |
GPRS and WAP let you enjoy a continuous wireless connection to data networks (Internet) and access favorite web sites, entertainment services and other web applications. With WAP, GPRS, you can go online on your cell phone. All you need is a GPRS/WAP enabled phone and activation from the service provider. Call up the Customer Care number and ask them to activate the service, afterwhich you need to download the GPRS settings as instructed and GPRS is activated.
Airtel charges Rs. 600 per month for GPRS and airtime. MMS, however is free. Reliance India charges Rs. 200 + usage charges Rs, 40 paise per minute, whereas Hutch charges Rs. 99 for GPRS + airtime.
Using your cell phone as a modem:
Alternatively, you can connect to the Internet using your cell phone as a modem. For this your cell phone should support HSCSD. If your phone supports HSCSD, you can connect to a laptop, desktop or a PDA, using infrared, data cable or Bluetooth and then dial your ISP connection. This method is useful if you want to check some urgent mails or access a site when on the go. The connectivity is slow and also is expensive as compared to a normal Internet connection using a modem. You pay the ISP for the Internet hours and the cell phone service provider for the airtime charges. With Internet connectivity, you can download a variety of groovy ringtones, logos, and graphics to jazz up your phone. If you are tired of the monophonic tones, polyphonic ringtones is the latest craze. All phones do not support poplyphonic ringtones, especially the old models. If your phone does, you can download a range of polyphonic ringtones from the Internet. What's more, you can even acquire information about current news, movies, stock markets, weather, forecasts, jokes etc. All this is just a click away from your phone and all for a nominal fee. Checking email, acquiring information about current news, movies, stock markets, weather etc. is just a click away from your mobile phone.
With the advent of GPRS and Java-enabled phones, gaming is no longer limited to basic games like Snake and Space Impact. The GSM as well as the CDMA subscriber base is growing at a good rate and with Reliance offering Java support on its CDMA phones, the basic cell phone has turned into a pocket-PC!
So, what do you need to play games on your cell phone?
1) Lots of in-built memory
2) GPRS or Java enabled phones and
3) Colour screen (optional)
How can you get games on your cell phones?
You can get games either from your cell phone service provider such as Hutch (Orange), BPL, Reliance by downloading them from the internet using WAP or GPRS or you could get them uploaded onto your cell phone at a manufacturer's showroom. (e.g Nokia)
For downloading games using Hutch (Orange), it is necessary to have GPRS enabled on your cell phone. This can be activated through Hutch (Orange) by paying Rs. 99 if you are a postpaid user. Prepaid users can activate GPRS by paying Rs. 99 as activation fees + Rs.99 every month. Both pre-paid as well as post-paid users can download the games from the Hutch (Orange) site by paying Rs.20 per game for 20 rounds. For Rs. 50 you can play the game as many times you want, plus you get a free Photo Messaging facility. You need to check if Hutch supports gaming on your cell phone model though.
For downloading games using BPL website, you need to have either MMS or GPRS enabled on your phone. If not, you can go to a BPL showroom and get the games uploaded onto the phone. The charges are the same as that of Hutch, Rs. 20 per game for 20 rounds and Rs.50 for an unlimited usage, except that you'd have to shell in an extra Rs. 25 as service charges if you get the games uploaded at the showroom.
Reliance Infocomm in India allows users to download games on their Java-enabled cell phones using their 'R-World service'. With R-World, you can access and download from a huge variety of Java games such as Arcade, Boards, Puzzles, Cards, Sports, Casino, etc free of charge till March 2004.
Nokia is offering its own games to the Nokia cell phone users through cell phone service providers such as Hutch (Orange), Airtel, BPL etc. As of now, only Hutch and Orange subscribers can access the WAP-based content, whereas the Airtel, RPG (Chennai) and BPL Mobile customers can access only the SMS-based content. You are charged Rs. 49.9 per games apart from the GPRS activation and rentals. You can download from a variety of games such as Pooltime, Crashn'burn, AlphaWing etc at www.nokia.co.in. This facility is available only on a few Nokia phones at present.
These striking features in mobile phones have changed consumer behavior and their attitudes towards demands. They want better than the best, and thanks to sophisticated expertise they get it too. Large amount of functions and significant advantages have made cellulars a boon in disguise. Steady usage of this wire free wonder has life always on the move. At no point of time can work come to an absolute stand still. Impeccably, the credit goes to its advanced features and service providers, due to which this network functions smoothly. At the end of the discussion, one thing is evident ' A mobile in your hand…has the world at your finger tips'!
Curtsy www compareindia com
Simply write down on your mobile phone following code.
To check your Mobile Phone's Serial number, key in the following digits on your phone:All mobile phone users should keep a note of their handset's serial number (known as the 'IMEI'), as it's very handy if the phone is lost or stolen. The number can normally be found under the battery (looking something like 004400/01/123456/7).
You can also get this number from the phone software, by entering following usefull code
Simply write down on your mobile phone following code.
* # 0 6 #
A 15 digit code will appear on the screen after pressing send button, or in some phones it comes automatically just by writing above given code. . This Number is unique to your Handset. Write it down and keep it somewhere safe. Should your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won't get your phone back, but at least you know that whoever stole it can't use/sell it either. If everybody does this, there would be no point in people stealing mobile phones
I heard the code *#7780# works too, pretty much the same i think. For 6600 users, to format the fone, there's an alternative way. Press and hold <3>, <*>, and the buttons, then power on fone, keep holding on the 3 buttons, till u come to a format screen. tis method ONLY works on 6600, and need not enter the sec code. BUT sec code wun be reset to default 12345
A Soft-reset - the process of resetting all the settings of the phone to the factory default! No applications are deleted!
A Hard-reset is like formatting a drive! It does format the memory. Everything that has been installed after the first use of the phone is deleted! It will recover the memory of the phone to the state you purchased it! It is done by inputing the following code: *#7370# NOTE: The battery must be full or the charger has to be connected to the phone so that it does not run out of power and make the phone unusable.
How to totally format your Nokia 3650 and remove all installed applications, user files and restore all
settings to default like it's new out of the box? (OEM apps won't be deleted like Camera and RealOne Player).
First Format your MMC: Menu > Extras > Memory > Options > Format mem. card > Yes.
Note: It is very important to format your MMC before you format your phone!
Then format your phone by typing *#7370# on main Phone screen.
Phone will ask: "Restore all original phone settings? Phone will restart." Press 'Yes' and enter your Lock code (default is 12345).
Tip: Formatting takes several minutes so you'd better connect your Nokia 3650
to a charger to ensure that your battery doesn't get empty in the middle of formatting.
Note: All your created acces points and mailboxes will be lost so take a note of them. And all application settings will be reset.
E.g. In Camera, image quality is set back to normal and memory in use is set back to phone memory. And also in Messages,
memory in use is set back to phone memory, etc. Also backup your contacts with PC Suite or a program like Contacts Manager.
To reset your wallet, should you forget your code,
this will reset the wallet code, the wallet contents will be deleted.
Buying a Cell Phone: An Overview
In the last decade the cell phone industry has grown thousand fold all around the world. A cell phone is somewhat necessary for an individual to keep up with the busy life of the current era. A few years back, a cell phone was not considered a necessity; it was just a luxury that was being enjoyed by only a small number of individuals. But nowadays, life without a cell phone seems impossible. People all around the world are addicted to the use of a cell phone. This is mainly because the cell phone is no longer just a cell phone; it has evolved into many things like a personal digital assistant (pda), music player, a global positioning system (gps) and a lot more. Everyday different manufacturers around the world are introducing the models with the new features. This is what needs to be taken into consideration when you go for buying a cell phone. You need to be sure about the features you want that suit your lifestyle well.
The Money Matter
Nowadays there is so much choice for an individual to buy a cell phone. Every company is producing the models with state of the art technology and features everyday. Price is the main thing that makes a difference in these different models. An expensive phone is likely to have more features, reliability and a better technology than a cheap one. Everyone wants a best phone in the market for him but high price of the cell phones comes in the way therefore price is a big thing that needs to be kept in mind while buying a cellular phone. But expensive and sophisticated phones are not everyone’s choice; there are people who just want a simple cell phone which is not much expensive but does its job well only as a cell phone. Also the extra features provided in the expensive phones are not everyone’s need.
Therefore the price is a main thing to keep in mind whenever you to buy a cell phone. Do not buy a cell phone just because it is expensive; buy the one that suits your needs.
Choices in Different Vendors and their Models
Lucky for the customers that nowadays there are a huge number of cell phone manufacturers who have a vast number of models for customers to choose from. Every vendor holds certain advantages that the other lacks in. This creates a great competition which is very healthy for the cell phone industry. Also this competition results in the reduction of the price which is beneficial for the end user.
Some people have liking for a certain brand but they still have a lot of choice in the models offered by the same brand. Every other day a new model is launched by a company, this is a strategy of companies to keep a customer stick to their brand and attract more.
Research is Always Better
It is always better to research about the phone you are going to buy before you set out to actually buy it. There are number of ways to know about that phone, the best one is internet. You can read the product reviews on the internet for that phone and know if there are any issues with it. You can also know the people’s view about the certain features offered by that particular device on internet. Also try to read the review by some critic about that phone; it will further clarify its view in your mind.
Hence it is to be said that in order to get the desired satisfaction, the above things should be kept in mind before buying a cell phone.