Tuesday, August 25, 2009

The Mobile Platform Cheat Sheet

when choosing the technology and target platform for your mobile project or application, you will find several possibilities. There are several kinds of mobile phone platforms available and most have somewhat different characteristics. For example, Windows Mobile development is different from iPhone development, even though the target markets are quite the similar. Similarly, MIDP and Symbian development differ, even though the actual target device might be the same. With so many choices—and the introduction of the iPhone and Android during the past year or so adding to them—your best bet is to develop something that runs on multiple platforms.

Here are some of the questions you need to ask before you start the development:

  • To whom are you targeting the application? Is it a consumer application or a corporate application?
  • Is your project a game or an application? If a game, you should figure out which types of people will play it and what kind of devices they have.
  • What kind of requirements do you have for the technology? Symbian applications may be your only choice if your users already have Symbian phones and don't want to buy new ones.
  • How quickly do you need the application or a prototype?
  • How much money can you spend on the development? After all, almost always the most important factor is money.

With so many choices and considerations to address, this article provides a high-level comparison of the most used platforms and to help you determine which best fits your purposes.

Oh, the Possibilities
Listing all the mobile development technologies available is beyond the scope of this article, but these are the most commonly used options.

SMS (Short Message Service) and MMS (Multimedia Service) use the basic functionalities of the mobile phone to enable users to send text and multimedia content, respectively. Every phone (these days) should have SMS/MMS functionalities and people generally are well aware of how to use them. Developing SMS/MMS applications is a lot different from all the other technologies that are described here, since SMS/MMS development takes place only on the server side. The simplest way to make an SMS application (for example, one that receives a message and sends a joke) is to select a mobile service provider and write a simple PHP script that communicates with the provider's messaging interface.

Mobile Information Device Profile (MIDP) 1.0, a Java runtime environment for mobile devices such as cell phones and PDAs, sparked the mobile Java revolution. It turned out to be a little limited, however, because its applications didn't really deliver "write once, run anywhere" portability. This was mostly because mobile phone manufacturers didn't perform their MIDP implementations exactly the same way, and many even favored proprietary APIs. This made writing even a simple application that would work on all MIDP 1.0 devices extremely difficult. MIDP 2.0 fixed many of these problems with new features including an enhanced user interface, multimedia and game functionality, greater connectivity, over-the-air (OTA) provisioning, and end-to-end security.

Symbian OS
Symbian is an operating system for smart phones that has become quite popular. Nokia in particular has been using it heavily. Symbian has a number of user interface platforms, such as Nokia's Series 40, Series 60, and Series 80. Developing with Symbian is a lot more complicated than developing with MIDP, but Symbian applications are more reliable because they are targeted and designed for a particular UI and platform. Symbian development is done mainly in C++.

Windows Mobile
Windows Mobile is Microsoft's operating system for mobile devices such as PDAs and mobile phones. 'Pocket PC' is no longer in use; devices without a phone are called Windows Mobile Classic devices. Windows Mobile resembles other Windows operating systems, which makes it quite easy for the end user to learn. Thousands of applications are available for Windows Mobile, such as word processing, personal information management, e-mail, etc. The typical development languages for Windows Mobile are Visual C++, .NET, and Java.

ACCESS Platforms
Since acquiring Palm OS, ACCESS has been offering the ACCESS Platforms, which offer development environments with Garnet OS (an extended version of the previous Palm OS), Web 2.0, and Java. ACCESS is a Linux platform that operates in a similar way as Symbian: it licences the platform to mobile device manufacturers. This article discusses only the Garnet OS. ACCESS development typically is done in Java.

Apple's launch of the iPhone has been much discussed in the media, mostly because of its features (and lacking features)and price tag. Still, it has sold reasonably well and its users seem to appreciate it as not just a phone, but also as a mobile Internet device. The recently launched iPhone SDK lets you develop applications to run in the device, as well as web applications that are designed for the iPhone. The iPhone SDK development is done with the Cocoa Touch framework and Objective-C.

Although Google gets nearly all the credit, a group of more than 30 technology and mobile companies developed the Android mobile platform. Android is an open and free software stack for mobile devices that includes an operating system, middleware, and key applications. The first Android devices will probably be released in the first half of 2008. The development language for Android is Java.

Legitimize Your Mobile App: Get It Signed

if you're just setting out to develop your first mobile application, you may still be grappling with the fundamentals of installing SDKs, obtaining hardware, and scaling your application to the limitations of today's mobile platforms. One thing you may not be considering, however, is signing your application—cryptographically endorsing it with an identifier that others can use to trace its origin to you.

This article reviews why application signing is important, and provides a reference so you can determine the steps necessary to sign your application for today's leading mobile platforms. Armed with this information, you'll be ready to distribute your application.

Why Sign Your Application?
You might be wondering why the code signing process is even necessary—after all, the mainstream computing market has existed for years with no comparable analogue. Do mobile platform providers and carriers foist application signing on you just an additional barrier to entry?

In a word, no. Code signing provides stakeholders throughout the value chain—application testers, carriers, and users—with a clearly defendable trail of entities that have contributed to your application. By signing your application, end users can verify that your application is actually from you, and easily determine whether an intermediary has tampered with your application. Even more important, the signatures others apply to your application—such as application testers and the carrier distributing your application—provide the user with important information about the reliability of your application.

This second fact is key. On today's mobile platforms, a number of applications may not be permitted to run without the appropriate signatures. Platform interfaces requiring a user's trust (such as those that access device location or private data such as your contacts) may require additional credentials—provided through signing—in order to operate. If you don't correctly sign your application, and obtain signatures from appropriate entities such as testing houses and carriers, it won't have access to the interfaces it needs to deliver value to your users.

Critics may charge that this use of application signatures leads to closed platforms, but the anonymous and unverifiable alternative simply doesn't scale to the billions of wireless devices on the market today. Without some kind of access protection and non-repudiation scheme in place, users and network operators must simply trust every application equally or limit platform functionality to protect the network and end users.

As an aside, code signing isn't just for mobile platforms, either. Major platforms including Microsoft Windows and Mac OS X now provide facilities for code signing, and vendors warn developers that in the future, code signing may be required in to access specific APIs, in much the same way that many mobile platforms do. In the future, expect signed code to play an important role in software distribution.

How Does Application Signing Work?
Public-key cryptography provides tools that support today's need for trust and security. The basic principle of application signing is simple:

  1. An application developer (presumably, that’s you!) obtains a cryptographic key from a well-known and trusted certificate authority. You keep this cryptographic key to yourself as private knowledge.
  2. Using this private key and a one-way hash of your application, you encrypt the one-way hash, signing your application. This encrypted hash is included when distributing your application.
  3. You transfer the application to the recipient.
  4. The recipient—a testing authority, other agency, or the end consumer—creates a one-way hash of your application.
  5. The recipient decrypts the digital signature you created in step 2 and compares the results with the one-way hash of your application. If the hashes match, the recipient has assurance that the application has been delivered intact and is actually from you.
Of course, this process requires considerable infrastructure—the presence of certificate authorities, the ability for you to securely store your key and use it to sign your application, certificate stores on the end device to manage the chains of keys that prove your identify, and public cryptography algorithm implementations on today's mobile devices. The fact that this infrastructure exists and thrives is testament to the market's demand for authenticity and integrity in today's application distribution environment for wireless devices.

The signing process can be repeated at various steps through the value chain. For example, a testing house will apply their signature to your submitted and tested application after it passes their rigorous testing; later, consumers of your product can verify their signature to ensure that the version of the application they're about to execute has met the testing company's standards.

When signing an application for a mobile device, you follow essentially the same steps just described, using keys obtained from specific sources (such as Verisign or Thawte) and tools provided by the platform vendor. Unfortunately, the sources of both keys and tools vary from platform to platform, making the process a perplexing one. For example, if you're an accomplished BREW developer, you may be somewhat puzzled the first time you need to sign a Java ME application. Note that some platforms—notably Android—let you self-sign your applications, using locally generated keys. Self-signed applications are a compromise between convenience and trust, because they spare you the time and expense of working with a certificate authority to prove your identity and obtain a key. This means that it's easier to create a self-signed application—but because anyone can do it without proving their identity, it's easier to spoof a vendor's identity.

Typically, application signing is the last step before a submission for certification, because you can't make changes to a signed application (you'd break the one-way hash you create during the signing process, breaking the chain of integrity the very process is meant to ensure). Because application certification is so closely related to application signing, most developers conflate the two. They are, however, two different processes—you sign your application so that the tester and others can definitively identify the source of the application. Once your application is signed, you have a third-party certify your signed application to meet specific operational standards set by the carrier or other channel that will distribute your application. The discussion that follows focuses on the application signing process, but also provides some information about the certification submission process for each platform, because it does you little good to have a signed application ready for certification, and no idea how to get it certified!

Mobile Phone Wap Technology

    WAP or wireless Application Protocol, adds a new dimension to the Internet i.e. mobility. With a mobile phone or a laptop that supports WAP you can book tickets, order food and check your bank account at any time. You can play games while stuck in traffic, get the stock market news in the elevator… complete mobility, the world wide web with you all the time. It also includes services such as downloading entire phone books and new, improved ways of controlling outgoing and incoming calls will make mobile telephony even easier. To access WAP services you need a WAP product. Besides the WAP compatibility, WAP products have a large full graphic display and include a micro browser. The basic function of WAP is for mobile phones to be able to communicate with a server installed in the mobile phone network. It brings together the web and telecommunications. Of course, as all new technologies, WAP also comes with its questions and hesitations.


    This technology is only a couple of years old. Brought in by a company called "Unwired Planet", a combination of the leading telecommunications companies.


  • Make a request in WML (Wireless Markup Language), a language derived from HTML especially for wireless network characteristics.

  • This request is passed to a WAP Gateway that then retrieves the information from an Internet server either in standard HTML format or preferably directly prepared for wireless terminals using WML.

  • The requested information is then sent from the WAP Gateway to the WAP client, using whatever mobile network bearer service is available and most appropriate.

    Multi-party Communication
    WAP technology makes it possible for several people to communicate on the move using different devices. Instant and mobile voice, text, image and position messaging capabilities make this media an extremely powerful tool.
    Checking your horoscope
    Astrology WAP applications give you constant round-the-clock access to an up-to-the-minute horoscope. Using your mobile phone, you can keep yourself updated on what the stars have in store for you.
    Personal pocket guide
    Wherever you are in the world, your WAP-enabled mobile phone is your personal guide to the city. Use it to plan your evening's entertainment. Reserve seats at a restaurant, take in some local art, book cinema tickets or find some place at a quiet drink.
    Weather report
    An updated world-wide detailed weather report is always available if you have a WAP-enables mobile phone. You can have storm warnings automatically directed to your phone wherever you are.
    Global yellow pages
    In your WAP-enabled mobile phone, you have every Yellow pages directory in the world at your fingertips and millions of useful telephone numbers. Anywhere, at any time, you can locate and avail of local services such as taxi services, because you have the local Yellow Pages in your pocket.
    Mobile stock market
    Your automatic WAP-based stock-broker tells you the prices of your shares. You can carry out the entire transaction over the Web without moving from the spot.
    Always in touch
    Keeping in touch with
    news at home or abroad. Your WAP-enabled, mobile phone gives you access to all categories of up-to-the-minute local or international news.
    Wap entertainment
    Entertain yourself at a traffic jam with WAP. Check out the entertainment sites, online games etc.

  • Easy, and fast access to Internet.
  • WML and WMLScript (new language, which is based on HTML).
  • Large choice in mobile phones (most of them support WAP).
  • Can be used to download abstract data types ( videos etc.).
  • Supports most wireless networks (like: CDMA, GSM, PDC, PHS, TDMA etc.).
  • Can be built on any operating system.
  • International standard.

    Which content is possible to access with WAP?
    Almost anything available on the net; weather, news, stock market information, product updates, software downloads and so on. There is also a broad spectrum of other possible applications: e-mail, information search and retrieval, e-Commerce, calendar and office applications, maps and position-based services, voice messaging and communication, call control, Intranet/Internet access, among others.
    What type of devices will use WAP?
    Handheld digital wireless devices such as mobile phones, pagers, two-way radios, smart phones and communicators from low-end to high-end.
    Is WAP suitable for multimedia mobile services?
    A current area of interest within WAP Forum is evolution to support multimedia mobile services. WAP is an open protocol that allows the transport of many forms of multimedia content. However, some multimedia services, especially those based on streaming media, require further enhancements to WAP.
    What are the properties of WAP?
    WAP can only support DOS-like 2D graphics which are shown on the screen of the WAP devices. The current downloading speed of WAP is between 9.6kbps to 14.4kbps, depending on the telecommunication network it is riding on.
    What is a WAP gateway?

    The WAP gateway/proxy connects the wireless world with Internet/Intranet, providing a path from the WAP-enabled handsets in the wireless world to applications on the Internet/Intranet. In addition to being a bridge between the Internet world and the mobile world, the WAP gateway/proxy offers service logic such as:
    a) End-user authentication
    b) Encoding of WML pages
    c) WML script compiling
    Can WAP connect me to any site that I want to?
    As long as the site has been "wapified", that is, the site has been written in WML (wireless markup language) that is accessible by WAP devices.
    Is surfing the Internet on a WAP device similar to surfing on a PC?
    Pretty similar. The main difference is that WAP does not support fanciful graphics as WAP is written in WML . WAP supports real time text information and simple DOS-like graphics.
    What is the difference between WAP and SMS?
    With ordinary SMS one can send text messages to mobile phones, e.g. receiving today's news or sports results. But SMS can only give the mobile phone user a limited degree of interaction. One can compare SMS with email: one can send and receive messages but it is not really possible to take any action or easily navigate to other information. WAP could be compared with an Internet browser: it supports hyperlinks for easy navigation and forms that are easy to fill in with selected data and receive a response. In conclusion, the difference between WAP and SMS could be compared to the difference between an Internet browser and Email.
    What is the difference between WAP and SIM?
    One can create custom-built applications with SIM Application Toolkit (ATK) that runs on the SIM card in the mobile phone. A SIM card is the Smart card that identifies the user and where the user's phonebook is located. With SIM ATK one can set up new menus, show text in the display, get access to the phonebook and send / receive SMS messages. The difference between WAP and SIM ATK is that SIM ATK applications are located in the phone on the SIM card, and to update an application one has to exchange the SIM cards of all the users. WAP applications on the other hand are fetched from a web-server and can be updated at one central location. Smart cards will have a role to play in the fuure in WAP security and user/operator personalization.

  • Expensive.
  • Did not have a packet-based service for long time.
  • Limited size of RAM and ROM.
  • Limited power supply.
  • Low bandwidth.
  • Difficult to keep the phones up-to-date with new WAP services.
    Curtsy www compareindia com

Learn about Mobile phone GPRS Technology | The General Packet Radio Service


    The General Packet Radio Service (GPRS) is a new non-voice value added service that allows information to be sent and received across a mobile telephone network. It supplements today's Circuit Switched Data and Short Message Service. It is a step ahead to provide a massive boost to mobile data usage and usefulness. Payments are made as per data volume, instead of per minute pulse rate. You need to pay a fixed rent around Rs. 750 per month, after which you can surf for unlimited hours. Except for one thing, as a developing technology, the net connection is a slow process.


  • Surfing the net; emailing; all through the mobile.
  • Fast transmission of text documents, spreadsheets, photographs and illustrations; mobile chatting and on-line games.

  • A round the clock net connection, even when you are on the move.


    A GPRS can achieve speeds up to 171.2 kilobits per second (kbps) using all eight timeslots at the same time. This is thrice as fast as current data transmission systems.
    GPRS facilitates instant connections whereby information can be sent or received immediately as the need arises, subject to radio coverage. No dial-up modem connection is necessary.

    GPRS facilitates several new applications that have not previously been available over GSM networks due to the limitations in speed of Circuit Switched Data (9.6 kbps) and message length of the Short Message Service (160 characters). GPRS will fully enable the Internet applications you are used to on your desktop from web browsing to chat over the mobile network.


  • To begin with, a mobile phone or terminal that supports GPRS.
  • A subscription to a mobile telephone network that supports GPRS. § Knowledge of how to send and/ or receive GPRS information using their specific model of mobile phone, including software and hardware configuration.

  • A destination to send or receive information through GPRS. Whereas with SMS this was often another mobile phone, in the case of GPRS, it is likely to be an Internet address, since GPRS is designed to make the Internet fully available to mobile users for the first time.


    involves overlaying a packet based air interface on the existing circuit switched GSM network. This gives the user an option to use a packet-based data service. With GPRS, the information is split into separate but related "packets" before being transmitted and reassembled at the receiving end.
    Efficient use of scarce radio resources means that large numbers of GPRS users can potentially share the same bandwidth and be served from a single cell. The actual number of users supported depends on the application being used and how much data is being transferred. Because of the spectrum efficiency of GPRS, there is less need to build in idle capacity that is only used in peak hours. GPRS therefore lets network operators maximise the use of their network resources in a dynamic and flexible way, along with user access to resources and revenues.
    GPRS fully enables Mobile Internet functionality by allowing inter-working between the existing Internet and the new GPRS network.


    There are only limited radio resources that can be deployed for different uses- use for one purpose precludes simultaneous use for another. For example, voice and GPRS calls both use the same network resources. The extent of the impact depends upon the number of timeslots, if any, that are reserved for exclusive use of GPRS.
    Achieving the theoretical maximum GPRS data transmission speed of 171.2 kbps would require a single user taking over all eight timeslots without any error protection. Additionally, the initial GPRS terminals are expected to be severely limited- supporting only one, two or three timeslots. The bandwidth available to a GPRS user will therefore be severely limited.


    A wide range of corporate and consumer applications are enabled by nonvoice mobile services such as SMS and GPRS.
    Because of its synergy with the Internet, GPRS would allow mobile users to participate fully in existing Internet chat groups rather than needing to set up their own groups that are dedicated to mobile users. Since the number of participants is an important factor determining the value of participation in the newsgroup, the use of GPRS here would be advantageous.
    You can receive information, which is in the form of not only text, but maps, graphs or other visuals.

    Still images such as photographs, pictures, postcards, greeting cards and presentations, static web pages can be sent and received over the mobile network as they are across fixed telephone networks. It will be possible with GPRS to post images from a digital camera connected to a GPRS radio device directly to an Internet site, allowing near real-time desktop publishing.
    You will also be able to receive moving images and receive transmission from anywhere.
    You will also be able to use the GPRS for browsing the net. DOCUMENT SHARING/ COLLABORATIVE WORKING Mobile data facilitates document sharing and remote collaborative working. This lets different people in different places work on the same document at the same time.
    Dictating to a mobile phone, would simply not give sufficient voice quality to allow transmission to be broadcast or analyzed for the purposes of background noise analysis or voice printing. Since even short voice clips occupy large file sizes, GPRS or other high speed mobile data services are needed.
    Non-voice mobile services can be used to assign and communicate new jobs from office-based staff to mobile field staff. Customers typically telephone a call center whose staff take the call and categorize it. Those calls requiring a visit by field sales or service representative can then be escalated to those mobile workers.
    With up to half of employees typically away from their desks at any one time, it is important for them to keep in touch with the office by extending the use of corporate email systems beyond an employee's office PC. Since GPRS capable devices will be more widespread in corporations than amongst the general mobile phone user community, there are likely to be more corporate email applications using GPRS than Internet email ones whose target market is more general.
    Internet email services come in the form of a gateway service where the messages are not stored, or mailbox services in which messages are stored. In the case of gateway services, the wireless email platform simply translates the message from SMTP, the Internet email protocol, into SMS and sends to the SMS Center. In the case of mailbox email services, the emails are actually stored and the user gets a notification on their mobile phone and can then retrieve the full email by dialing in to collect it, forward it and so on.
    By linking Internet email with an alert mechanism such as SMS or GPRS, users can be notified when a new email is received.
    Remote LAN applications encompasses access to any applications that an employee would use when sitting at their desk, such as access to the intranet, their corporate email services such as Microsoft Exchange or Lotus Notes and to database applications running on Oracle or Sybase or whatever. The mobile terminal such as handheld or laptop computer has the same software programs as the desktop on it, or cut down client versions of the applications accessible through the corporate LAN. This application area is therefore likely to be a conglomeration of remote access to several different information types- email, intranet, databases. This information may all be accessible through web browsing tools, or require proprietary software applications on the mobile device. The ideal bearer for Remote LAN Access depends on the amount of data being transmitted, but the speed and latency of GPRS make it ideal.
    You may download sizeable data across the mobile network. This data could be a presentation document for a traveling salesperson, an appliance manual for a service engineer or a software application such as Adobe Acrobat Reader to read documents. The source of this information could be one of the Internet communication methods such as FTP (File Transfer Protocol), telnet, http or Java- or from a proprietary database or legacy platform. Irrespective of source and type of file being transferred, this kind of application tends to be bandwidth intensive. It therefore requires a high-speed mobile data service such as GPRS, EDGE or 3GSM to run satisfactorily across a mobile network.

    Home automation applications combine remote security with remote control. Basically, you can monitor your home from wherever you are- on the road, on holiday, or at the office. If your burglar alarm goes off, not only do you get alerted, but you get to go live and see who are perpetrators are and perhaps even lock them in. You can program your video, switch your oven on so that the preheating is complete by the time you arrive home and so on. Your GPRS capable mobile phone really does become like the remote control devices we use today for our television, video, hi-fi and so on. As the Internet Protocol (IP) will soon be everywhere- not just in mobile phones because of GPRS but all manner of household appliances and in every machine- these devices can be addressed and instructed. A key enabler for home automation applications will be Bluetooth, which allows disparate devices to inter work.


    Bluetooth, named after the renowned Danish King, Harold Bluetooth, is a short-range wireless connectivity standard.
    Bluetooth is capturing the minds of the present day technologists, as a technology enabler for the wireless unification of a wide variety of portable devices like mobile PCs, mobile phones and the like. It does away with the cables and enables voice and data transfer between the devices through wireless networks called piconets.
    The primary segments identified for Bluetooth application are: Cellular & PCS Mobile Phones, Digital Cordless Phones, Data Access Points, PC Cards and Adapters , Notebook & Desktop PCs, Handheld PCs & Palm Companions / PDA s, Digital Still Cameras, Output Equipment, Automotive and Industrial & Medical applications.
    The technology behind it:

    Bluetooth is a Radio Frequency (RF) specification for short-range, point-to-multi-point voice and data transfer. An advantage of Bluetooth is it's similarity to many other specifications already deployed and it's borrowing of many a feature from these specifications. The 2.4GHz band is used by IEEE 802.11 to enable wireless LAN connectivity. Bluetooth borrows specifications to enable file sharing and data transfers between devices from IrDA (a wireless specification that uses InfraRed light to connect devices). HomeRF SWAP, a specification aimed at small network of devices for the home environment, is another source for Bluetooth.
    It is omni-directional and has a present nominal link range of 10cm to 10m, which can be extended to 100m, with increased transmitting power. Bluetooth operates in the 2.4GHz Industrial-Scientific-Medical (ISM) Band and uses a Frequency Hop (FH) spread spectrum technology in which packets are transmitted in defined time slots on defined frequencies. A full duplex information interchange rate of upto 1Mbps may be achieved in which a Time-Division Duplex (TDD) scheme is used.
    A Bluetooth System:

  • A Radio Unit - consisting of a radio transceiver, which provides the radio, link between the Bluetooth devices.
  • A Baseband Unit - a hardware consisting of flash memory and a CPU. This interfaces with the radio unit and the host device electronics.
  • Link Management Software - a driver software or firmware which enables the application software to interface with the baseband unit.
  • An Application Software - this implements the user interface and is the application that can run on wireless.


    The usage model being presented below are those which have been identified by the Bluetooth SIG's marketing group and helps us to get a peep into the vast areas of application of this wonderful standard.

  • The three-in-one phone: It can work as cordless phones connecting to the public switched telephone network at home and office and thus incurring the fixed line charge. It could function as a walkie-talkie with other telephones in the same office or building, without incurring any charge. This telephone can also connect to the cellular infrastructure and function as a cellular phone, incurring cellular charges. At home, your phone functions as a portable phone (fixed line charge). When you're on the move, it functions as a mobile phone (cellular charge). And when your phone comes within range of another mobile phone with built-in Bluetooth wireless technology, it functions as a walkie-talkie (no telephony charge).

  • The Internet Bridge: In this usage model, mobile phone or cordless modem functions as a modem to the PC, providing dial-up networking and fax capabilities without a need for physical connection to the PC. Use your mobile computer to surf the Internet wherever you are, and regardless of whether you're cordlessly connected through a mobile phone (cellular) or through a wire-bound connection (e.g. PSTN, ISDN, LAN, xDSL).

  • The Interactive Conference: Here, multiple data terminals, use a Local Access Network (LAN) access point as a wireless connection to a LAN. Once connected, the data terminals operate as if they were connected to the LAN via dialup networking. The terminals can access all of the services provided by the LAN. In meetings and conferences you can transfer selected documents instantly with selected participants, and exchange electronic business cards automatically, without any wired connections.
    The file transfer usage model offers the ability to transfer data objects from one device to another. Object types include, among others, ***.xls,***.ppt,***.wav,***.jpg,***.doc files or entire folders, directories or streaming data formats. Also, this offers a possibility to browse the contents of the folders on a remote device.

  • The Ultimate Headset: The Headset, can be wirelessly connected for the purpose of acting as a remote device's audio input and output interface .The headset increases the freedom of movement while maintaining privacy. The headset can be typically used with a cellular headset, cordless handset or personal computer for audio input and output. This headset will also have the ability to answer incoming calls and then terminate them without physically manipulating the telephone handset.
    Connect your wireless headset to your mobile phone, mobile computer or any wired connection to keep your hands free for more important tasks when you're at the office or in your car.

  • The Automatic Synchronizer: This provides a device-to-device synchronization of the personal information management (PIM) information. Synchronization requires business card, calendar and task information to be transferred and processed by computers, cellular phones and PDA s, utilizing a common protocol and format. This involves, automatic synchronization of your desktop, mobile computer, notebook (PC-PDA and PC-HPC) and your mobile phone. For instance, as soon as you enter your office, the address list and calendar in your notebook will automatically be updated to agree with the one in your desktop, or vice versa.


    IrDA-Data (IrDA -> Infra-red Data Association) is another short-range wireless connectivity standard with an installed base of 50 million units, by now. IrDA is a point-to-point, narrow angle (30 degree cone), ad-hoc transmission standard designed to operate over a distance of 0 to 1 meter and at speeds of 9.6kbps to 4Mbps, which is expected to increase to 16Mbps.
    While the application areas of Bluetooth and IrDA overlap, they are not competitive standards, necessarily. The short range, narrow angle of IrDA allows the user to aim, in point-and-shoot style at a targeted recipient, for example in a conference hall. Close proximity to the other person is natural in a business card exchange situation and the short range is an advantage of IrDA for such applications.
    The directional nature of IR enables a low level security because of direct line-of-sight nature; but it provides for, no security at the link level. There are security loopholes as it is possible to eavesdrop on a conversation by detecting reflected light and filtering out the surrounding ambient noise.
    In contrast, Bluetooth addresses the security concerns by providing authentication and encryption in its baseband protocol. Authentication relies on a challenge-response protocol utilizing a secret key, personal identification number or PIN. Bluetooth devices talking to one another should have the same PIN. The protocol allows each device to authenticate the other. After the devices are authenticated it is possible to encrypt the transmission for added security.
    Thus, it is expected that while in some devices both IR and Bluetooth may co-exist, for the other applications, the choice of Bluetooth and IR will be based on the applications and required usage models.
    Mind-boggling technology like the Bluetooth and GPRS, is on its way to make communications in the future, a completely different ball game. A ball game with a win-win situation. Pave way for the future with these technologies then.
    Curtsy www compareindia com

Mobile Tricks

Call Hurry

In standby mode,
45# + dials the number on your sim in memory slot 45.
50# + dials slot 50 and so on.

Display an image when someone's calling:
Menu > Contacts > "select a contact card" > Options > Edit > Options > Add thumbnail > "choose an image".

view version u are Using in urs mobile !
Type *#0000# to view which firmware version you are running.

Learn about Features of cell Phones | How to get the most from your mobile phones

    This is the age of Multimedia Messaging Service. MMS is in; a versatile feature that allows users to send colour pictures, photographs, voice clips, programs, videos and ofcourse text from their cell phones. The rates are a little higher as compared to SMS, but MMS opens up a whole new world of communication at your finger tips. All you need is an MMS-enabled phone and a subscription to a service provider that supports MMS. With MMS, you can, not only send your messages from one phone to another, but also from phone to email, and vice versa.
    You can send, store and edit picture messages. There are a number of sites online that let you download pictures free of charge. Some MMS phones even come with an inbuilt camera, so a person can click pictures spontaneously and send them across to another MMS cell phone user. But with phones that do not have an in-built camera, these pictures have to be obtained from the Internet. The messages sent and received are either in text or graphics, once again depending on the phone model. With MMS, you can even download MP3 music, games and video clips on your phone!

    The following networks offer MMS: BPL (Mumbai) - MMS and GPRS only for post-paid users at Rs. 199 per month with 100 MMS free. If you exceed the 100 limit, MMS are charged at Rs. 3. Hutch- Rs. 99 per month. Prepaid users have to also pay Rs.50 as the initial activation charge. Messages can be downloaded from the Hutch site at Rs. 8 per MMS. Sending MMS is free. Airtel- Offers free MMS service. To activate, you need to send an sms to 222 from your MMS enabled phone. Spice (Bangalore) - Rs. 99 per month. 25 outgoing messages free, after which there will be charge of Rs.5 per MMS. Idea- Offers downloading of video messages from their site. Also allows sending and receiving pictures and music.


One step further are PDA-enabled phones, more commonly known as smart phones. These have a Digital Organiser, Excel, Word and Internet capabilities- all in one phone. Some even have an integrated camera and a MP3 player. These phones have large screens and allow you to write into it (after you learn the easy technique). They also have voice recognition capabilities. These features make the phone bulkier and costlier but then these gizmos sure do separate the men from the boys.



GPRS and WAP let you enjoy a continuous wireless connection to data networks (Internet) and access favorite web sites, entertainment services and other web applications. With WAP, GPRS, you can go online on your cell phone. All you need is a GPRS/WAP enabled phone and activation from the service provider. Call up the Customer Care number and ask them to activate the service, afterwhich you need to download the GPRS settings as instructed and GPRS is activated.

Airtel charges Rs. 600 per month for GPRS and airtime. MMS, however is free. Reliance India charges Rs. 200 + usage charges Rs, 40 paise per minute, whereas Hutch charges Rs. 99 for GPRS + airtime.

Using your cell phone as a modem:

Alternatively, you can connect to the Internet using your cell phone as a modem. For this your cell phone should support HSCSD. If your phone supports HSCSD, you can connect to a laptop, desktop or a PDA, using infrared, data cable or Bluetooth and then dial your ISP connection. This method is useful if you want to check some urgent mails or access a site when on the go. The connectivity is slow and also is expensive as compared to a normal Internet connection using a modem. You pay the ISP for the Internet hours and the cell phone service provider for the airtime charges. With Internet connectivity, you can download a variety of groovy ringtones, logos, and graphics to jazz up your phone. If you are tired of the monophonic tones, polyphonic ringtones is the latest craze. All phones do not support poplyphonic ringtones, especially the old models. If your phone does, you can download a range of polyphonic ringtones from the Internet. What's more, you can even acquire information about current news, movies, stock markets, weather, forecasts, jokes etc. All this is just a click away from your phone and all for a nominal fee. Checking email, acquiring information about current news, movies, stock markets, weather etc. is just a click away from your mobile phone.


With the advent of GPRS and Java-enabled phones, gaming is no longer limited to basic games like Snake and Space Impact. The GSM as well as the CDMA subscriber base is growing at a good rate and with Reliance offering Java support on its CDMA phones, the basic cell phone has turned into a pocket-PC!

So, what do you need to play games on your cell phone?

1) Lots of in-built memory
2) GPRS or Java enabled phones and
3) Colour screen (optional)
How can you get games on your cell phones?

You can get games either from your cell phone service provider such as Hutch (Orange), BPL, Reliance by downloading them from the internet using WAP or GPRS or you could get them uploaded onto your cell phone at a manufacturer's showroom. (e.g Nokia)


For downloading games using Hutch (Orange), it is necessary to have GPRS enabled on your cell phone. This can be activated through Hutch (Orange) by paying Rs. 99 if you are a postpaid user. Prepaid users can activate GPRS by paying Rs. 99 as activation fees + Rs.99 every month. Both pre-paid as well as post-paid users can download the games from the Hutch (Orange) site by paying Rs.20 per game for 20 rounds. For Rs. 50 you can play the game as many times you want, plus you get a free Photo Messaging facility. You need to check if Hutch supports gaming on your cell phone model though.

For downloading games using BPL website, you need to have either MMS or GPRS enabled on your phone. If not, you can go to a BPL showroom and get the games uploaded onto the phone. The charges are the same as that of Hutch, Rs. 20 per game for 20 rounds and Rs.50 for an unlimited usage, except that you'd have to shell in an extra Rs. 25 as service charges if you get the games uploaded at the showroom.


Reliance Infocomm in India allows users to download games on their Java-enabled cell phones using their 'R-World service'. With R-World, you can access and download from a huge variety of Java games such as Arcade, Boards, Puzzles, Cards, Sports, Casino, etc free of charge till March 2004.


Nokia is offering its own games to the Nokia cell phone users through cell phone service providers such as Hutch (Orange), Airtel, BPL etc. As of now, only Hutch and Orange subscribers can access the WAP-based content, whereas the Airtel, RPG (Chennai) and BPL Mobile customers can access only the SMS-based content. You are charged Rs. 49.9 per games apart from the GPRS activation and rentals. You can download from a variety of games such as Pooltime, Crashn'burn, AlphaWing etc at www.nokia.co.in. This facility is available only on a few Nokia phones at present.

These striking features in mobile phones have changed consumer behavior and their attitudes towards demands. They want better than the best, and thanks to sophisticated expertise they get it too. Large amount of functions and significant advantages have made cellulars a boon in disguise. Steady usage of this wire free wonder has life always on the move. At no point of time can work come to an absolute stand still. Impeccably, the credit goes to its advanced features and service providers, due to which this network functions smoothly. At the end of the discussion, one thing is evident ' A mobile in your hand…has the world at your finger tips'!
Curtsy www compareindia com

How to Disable stolen Mobile phone

Simply write down on your mobile phone following code.
To check your Mobile Phone's Serial number, key in the following digits on your phone:
All mobile phone users should keep a note of their handset's serial number (known as the 'IMEI'), as it's very handy if the phone is lost or stolen. The number can normally be found under the battery (looking something like 004400/01/123456/7).
You can also get this number from the phone software, by entering following usefull code

Simply write down on your mobile phone following code.

* # 0 6 #

A 15 digit code will appear on the screen after pressing send button, or in some phones it comes automatically just by writing above given code. . This Number is unique to your Handset. Write it down and keep it somewhere safe. Should your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won't get your phone back, but at least you know that whoever stole it can't use/sell it either. If everybody does this, there would be no point in people stealing mobile phones

How to solve battery low problem of mobile phone in an urgent call

Your Mobile Battery is Very Low, you are expecting an important call and you don't have a c harger". Nokia instrument comes with a reserve battery. To activate the battery, the key-in *3370# your cell will restart with this reserve and your instrument will show a 50% increase in battery. This reserve will get charged when you charge your mobile next time

How to remove Virus from Mobile phone

Shit happens, or any virus has attacked your mobile, its inevitable u do something wrong, Now what to do you simply have to format your phone. To format the phone, press *#7370#, then enter the lock code, which is the sec code of the phone. NOTE: battery must be filled, else if format is disrupted by low battery, consequences will be disastrous
I heard the code *#7780# works too, pretty much the same i think. For 6600 users, to format the fone, there's an alternative way. Press and hold <3>, <*>, and the buttons, then power on fone, keep holding on the 3 buttons, till u come to a format screen. tis method ONLY works on 6600, and need not enter the sec code. BUT sec code wun be reset to default 12345

What is Soft Re-set and Hard Reset of Mobile Phone

A Soft-reset - the process of resetting all the settings of the phone to the factory default! No applications are deleted!
A Hard-reset is like formatting a drive! It does format the memory. Everything that has been installed after the first use of the phone is deleted! It will recover the memory of the phone to the state you purchased it! It is done by inputing the following code: *#7370# NOTE: The battery must be full or the charger has to be connected to the phone so that it does not run out of power and make the phone unusable.

How to totally format your Nokia 3650 and remove all installed applications, user files and restore all
settings to default like it's new out of the box? (OEM apps won't be deleted like Camera and RealOne Player).

First Format your MMC: Menu > Extras > Memory > Options > Format mem. card > Yes.
Note: It is very important to format your MMC before you format your phone!
Then format your phone by typing *#7370# on main Phone screen.
Phone will ask: "Restore all original phone settings? Phone will restart." Press 'Yes' and enter your Lock code (default is 12345).
Tip: Formatting takes several minutes so you'd better connect your Nokia 3650
to a charger to ensure that your battery doesn't get empty in the middle of formatting.
Note: All your created acces points and mailboxes will be lost so take a note of them. And all application settings will be reset.
E.g. In Camera, image quality is set back to normal and memory in use is set back to phone memory. And also in Messages,
memory in use is set back to phone memory, etc. Also backup your contacts with PC Suite or a program like Contacts Manager.

To reset your wallet, should you forget your code,
Type in:
this will reset the wallet code, the wallet contents will be deleted.

Things to keep in mind while buying a cell phone

Buying a Cell Phone: An Overview

In the last decade the cell phone industry has grown thousand fold all around the world. A cell phone is somewhat necessary for an individual to keep up with the busy life of the current era. A few years back, a cell phone was not considered a necessity; it was just a luxury that was being enjoyed by only a small number of individuals. But nowadays, life without a cell phone seems impossible. People all around the world are addicted to the use of a cell phone. This is mainly because the cell phone is no longer just a cell phone; it has evolved into many things like a personal digital assistant (pda), music player, a global positioning system (gps) and a lot more. Everyday different manufacturers around the world are introducing the models with the new features. This is what needs to be taken into consideration when you go for buying a cell phone. You need to be sure about the features you want that suit your lifestyle well.

The Money Matter

Nowadays there is so much choice for an individual to buy a cell phone. Every company is producing the models with state of the art technology and features everyday. Price is the main thing that makes a difference in these different models. An expensive phone is likely to have more features, reliability and a better technology than a cheap one. Everyone wants a best phone in the market for him but high price of the cell phones comes in the way therefore price is a big thing that needs to be kept in mind while buying a cellular phone. But expensive and sophisticated phones are not everyone’s choice; there are people who just want a simple cell phone which is not much expensive but does its job well only as a cell phone. Also the extra features provided in the expensive phones are not everyone’s need.
Therefore the price is a main thing to keep in mind whenever you to buy a cell phone. Do not buy a cell phone just because it is expensive; buy the one that suits your needs.

Choices in Different Vendors and their Models

Lucky for the customers that nowadays there are a huge number of cell phone manufacturers who have a vast number of models for customers to choose from. Every vendor holds certain advantages that the other lacks in. This creates a great competition which is very healthy for the cell phone industry. Also this competition results in the reduction of the price which is beneficial for the end user.
Some people have liking for a certain brand but they still have a lot of choice in the models offered by the same brand. Every other day a new model is launched by a company, this is a strategy of companies to keep a customer stick to their brand and attract more.

Research is Always Better

It is always better to research about the phone you are going to buy before you set out to actually buy it. There are number of ways to know about that phone, the best one is internet. You can read the product reviews on the internet for that phone and know if there are any issues with it. You can also know the people’s view about the certain features offered by that particular device on internet. Also try to read the review by some critic about that phone; it will further clarify its view in your mind.
Hence it is to be said that in order to get the desired satisfaction, the above things should be kept in mind before buying a cell phone.

Mobile » Theme : Ancient System V2

Ancient System V2 22.2 MB
This is a unique theme, it has actually been out for quite a while but I still find it stunning. The colors are soothing and are easy on the eyes. It has 140+ custom icons, custom ui, custom dock, custom wallpapers and more. This download includes:
- [8KB] README.rtf
- [88KB] Icon Template.psd
- [12.4MB] Ancient System v2.2. rar
- [12.4MB] Ancient System v2.3. rar

Note: If your on 3.0 use the v2.3 rar
How to Install?
Simply ssh into your device [details can also be found within the README.rft file] and drag/ drop the theme into your Library > Themes folder. Then go to Winterboard and check it.



Monday, August 24, 2009

Airtel Ringtones Remix Collection

You can download all kind of airtel ringingtones from folowing link


Kaspersky Mobile Security 8 Activation Key | Date: 24/08/2009

Kaspersky Mobile Security 8 Activation Key

Date: 24/08/2009

Download the key before it gets blacklisted.
The key has been checked on Kaspersky blacklist as of 24/08/2009 05:35:44 PM (GMT+05:30).

The key is successfully working, I guarantee that.
But, one thing, the key is only for Kaspersky Mobile Security 8, so please don't try to run the key on other versions of Kaspersky because it will not work with any version of Kaspersky Internet Security and any version of Kaspersky Anti-Virus and other Kaspersky Lab products like Kaspersky Small Office Security (any version), Kaspersky Open Space Security Suite (which includes Kaspersky Work Space Security (any version), Kaspersky Business Space Security (any version), Kaspersky Enterprise Space Security (any version), Kaspersky Total Space Security (any version)), Kaspersky Anti-Hacker (any version), Kaspersky Administration Kit (any version), Kaspersky Mail Gateway (any version), Kaspersky File Server (any version), Kaspersky CheckPoint (any version).

When this key gets backlisted or expires (whichever is earlier), I'll upload a new one.

download now

ATTENTION Nokia owners!!

ATTENTION Nokia owners!!


If you own one of the following handsets:->

Nokia 1100, Nokia 1100c, Nokia 1101, Nokia 1108, Nokia 1110, Nokia 1112, Nokia 1255, Nokia 1315, Nokia 1600, Nokia 2112, Nokia 2118, Nokia 2255, Nokia 2272, Nokia 2275, Nokia 2300, Nokia 2300c, Nokia 2310, Nokia 2355, Nokia 2600, Nokia 2610, Nokia 2610b, Nokia 2626, Nokia 3100, Nokia 3105, Nokia 3120, Nokia 3125, Nokia 6030, Nokia 6085, Nokia 6086, Nokia 6108, Nokia 6175i, Nokia 6178i, Nokia 6230, Nokia 6230i, Nokia 6270, Nokia 6600, Nokia 6620, Nokia 6630, Nokia 6631, Nokia 6670, Nokia 6680, Nokia 6681, Nokia 6682, Nokia 6820, Nokia 6822, Nokia 7610, Nokia N70, Nokia N71, Nokia N72, Nokia N91, Nokia E50, Nokia E60


Original news report here:->

Get security master code for nokia here

Get security master code for nokia here-Moosa All the users who have forgotten their Security/Lock Codes need not to worry. You just need to know your IMEI (International Mobile Equipment Identity) number. To check your IMEI number, type *#06# on the main screen. This number can also be found on the backside of the handset. Just remove the battery You can visit a site which will calculate the Master Code of your phone. This code can be used to change your present Lock/Security code. http://www.nokialockcode.com
click here to calculate ur phone master code


Note :
1. Lock/Security Code is not the PIN Code.
2. If you want to remove the Service Provider Lock, then this is the wrong thread.
3. The Master Codes are only for DCT-3 and DCT-4 phones.

How to install Java

This guide will be divided into two parts -- Bluetooth and Card Readers. Please refer to the appropriate section to find out how you should go about the install process.

You will need a filemanager app (such as FExplorer or SeleQ) and the devices to transfer the data to your phone.

Quick Info:

-Applications usually have the *.SIS filetype.
-Cracks for applications usually have the *.APP filetype.
-Java applications can have *.JAD and *.JAR filetypes, however the Nokia 6600 can ONLY use *.JAR.
-Games can come in the form of SIS applications and Java. Generally, SIS games are faster, have better music and graphics.


1] Send your desired files to the phone, they will appear as messages.

2] Open Menu > Messaging > Inbox

3] Highlight the message that should say "Bluetooth" with the filename below it, and then press the joystick to open it.

4] The installation process should begin, follow the onscreen prompts.

5] It will ask you where to save the application, to Phone Memory or to you Multimedia Memory Card (may be seen as "NO NAME" if you have not given you card a label). It is recommended to save your programs to the MMC.

6] After the installation process is finished, feel free to delete the original SMS you recieved from bluetooth.


1] Remove the MMC from your phone and insert it into the card reader.

2] Open My Computer and open your MMC's folder.

3] Copy your desired files to the root directory of your MMC ONLY (That means put them straight onto the MMC and not into any folders.)

4] Remove the MMC from the card reader and insert it back into your phone.

5] Start your file manager application and browse to the root directory of your MMC, which should be E:/

6] Open the file you transferred to your phone, and an installation process should begin, follow the onscreen prompts.

7] It will ask you where to save the application, to Phone Memory or to you Multimedia Memory Card (may be seen as "NO NAME" if you have not given you card a label). It is recommended to save your programs to the MMC.

8] After the installation process is finished, feel free to delete the file if it still remains (if it successfully installed, there should be no file, or a file that is only 1kb large).

Peace !

About MOBileZONE

THis is a platform of ur mobilephone modification with new softwares,ringingtones,wallpapers and etc.
and also all kind of new news about mobile sets are also available here.Alls softwares are free.thanks for viewing my site.