Leaderboard
Popular Content
Showing most liked content on 06/01/2011 in all areas
-
3 points^ ^ ^ Get Epson Stylus T13 for Rs 1,499 (Without Cartridge) from here http://cgi.ebay.in/B...#ht_4993wt_1139 Then buy a set of 6 Cartridge (3 Color, 3 Black) from here for Rs 600 http://cgi.ebay.in/C...#ht_6541wt_1000 (I have used the same cartridge from same supplier... Good quality.. Total VFM..)
-
2 pointsWhat Made You Happy Today / Recently ? And Why Not Share It ? - Let Everyone Know There Are Small Pleasures To Savour Everyday... You Have To Only Look Around & Discover Happiness? That illusive thing... What makes us happy? What makes us happy continuously... First one may be easy... It's the second one that's tough to decipher? Because more often than not, the definition of happiness gets restricted to larger things in life... A New Car... Bigger House... Yearly Promotion... Better Job... Arrival of a Kid... Getting a good degree... Better Business.. Such things don't happen on a daily basis but at a longer time frame... We are happy when it does... Then again the search for a better/larger happiness continues... But somewhere along the journey we have to get through each day & that becomes a source of pain.. The earlier feeling of being too happy on achieving larger things in life vanishes too soon & the journey becomes a struggle.. That's only because as grown ups, smart & intelligent, we either don't care for or enjoy smaller things in life... How happy it was to bunk a day in school, play gully cricket with stone stumps, eat roadside trash with limited pocket money, watching adult film without being adult and so on... Nothing was very logical as such but happiness scale? You Bet... It was awesome... That was only because we did not put our intelligence in measuring the QUANTUM... If you felt happy... You felt happy... Period... Why not rekindle that childlike attitude again and share in this topic "What Made You Happy Today / Recently" ? Can be any small thing... And no bar for larger things... Just share & let other members know there are thousands of things to be happy about every day!!! Spread The Smile & Happiness For All... May be your reason for being happy today/recently will become theirs too and everyone will discover new/unexplored sources... Only possible with your uninhibited and whole-hearted participation on a regular basis... Few Things Which Made me happy recently.... - Received a beautiful handmade glass painting from Sister in Law... Awesome... Took her 17 Days to make... - At last the housing society made parking slots in order with fresh coat of paint... Cars are not crowded any longer... - Got Rajkot's famous Peda alongwith a relative... It's Yummy... Exported till New York... BTW i got it free... - That 5 pair of Arrow socks for Rs 152.. Happy hunting together...
-
2 pointsSurprising, nobody has posted this deal? bestylish.com Rs 99 for a Rs 1000 voucher to buy Stylish & Comfortable Shoes!! Indulge in Branded Luxury for your feet @ Best Prices Online!! On www.dealsandyou.com Vouchers may show sold out for some cities, so check other cities. May become active for that city again... but possibly the deal will terminate soon, so that may not happen again.
-
1 pointNew members, (why even me in the beginning!) go nuts over technical jargon that they may not fully follow. I am posting this topic with a view to help them comprehend better and understand CDMA which I feel is not given due appreciation. Post the additional essential details here but lets spare the argument on GSM v/s CDMA Experienced members kindly view this as a venue to refresh and share updated info. CDMA operators in India CDMA (code division multiple access) is a digital mobile telephone standard which takes a different approach to the other, competing standards: GSM (Global System for Mobile Communications) and TDMA (Time Division Multiple Access). Where GSM and TDMA divide the available bandwidth into 'channels' using a combination of frequency bands and time-slices, CDMA spreads the signal over a wide bandwidth, identifying each channel using unique digital codes. This means it can provide greater bandwidth efficiency, and hence a greater potential number of channels. Traditional uses of spread spectrum are in military operations. Because of the wide bandwidth of a spread spectrum signal, it is very difficult to jam, difficult to interfere with, and difficult to identify. This is in contrast to technologies using a narrower bandwidth of frequencies. Since a wideband spread spectrum signal is very hard to detect, it appears as nothing more than a slight rise in the "noise floor" or interference level. With other technologies, the power of the signal is concentrated in a narrower band, which makes it easier to detect. The narrow band is also more prone to interference than the spread-spectrum of CDMA. Increased privacy is inherent in CDMA technology. CDMA phone calls will be secure from the casual eavesdropper since, unlike an analog conversation, a simple radio receiver will not be able to pick individual digital conversations out of the overall RF radiation in a frequency band. TDMA (time division multiple access) and GSM systems have to add an extra stage of encryption to the signal to ensure privacy, whereas encryption is inherent to the CDMA system. The 1× Evolution-Data Optimised, which is abbreviated as EV-DO or 1× EV-DO, is a wireless radio broadband data standard. It has been adopted by a number of CDMA mobile telecommunications service providers across the world, particularly in the USA, South Korea, Japan, eastern European countries, Australia, Canada, New Zealand and spreading in our very own India The technology was first standardised by 3GPP2 in 2000 as part of the CDMA2000 standards. Qualcomm started to develop EV-DO in 1999 in a bid to produce a 2Mbit/s downlink for stationary communications, according to the requirements of IMT-2000. Originally the DO of the standards acronym stood for 'data only'. However, after being ratified by the International Telecommunications Union (ITU), the 'O' was changed to 'optimised' since 'only' had negative connotations for marketing the technology. EV-DO technology is a direct evolution of the 1× (1×RTT) air interface standard, with its channels carrying data traffic only. HOW DOES IT MATCH UP? In comparison to GPRS and EDGE standards, which have been widely adopted by GSM networks, the 1× EV-DO capability of enabled CDMA2000 networks is much faster. It provides mobile devices (handsets and wireless modem air cards) with air interface speeds of up to 2.4576Mb/s with EV-DO Rev. 0 and even faster speeds of 3.1Mb/s with Rev. A (data only rev A, affectionately known as DORA). Only devices fitted with 1xEV-DO capable chipsets can take advantage of the higher speeds. High speed downlink packet access (HSDPA) is a rival technology for wide band code division multiple access (W-CDMA) networks. HSDPA has the advantage over EV-DO of being able to maintain voice and data channels simultaneously over a single pair of frequencies. The system has some real advantages over WiFi, including the fact that it is always on with seamless roaming. Additionally, the signal can travel on the same cell sites as mobile phones, can download and run video clips in real time, there is no 300ft range from the cell tower or 'hot spot' and there are not so many security issues. DEPLOYMENT AND TECHNOLOGY When deployed alongside a voice network, 1× EV-DO requires a separate radio channel of 1.25MHz. The first revision of the standard was 1x EV-DO Rev. 0 and this is now being superseded by 1× EV-DO Rev. A In addition to the increase in the maximum downlink rate from 2.4576Mb/s in Rev. 0 to 3.1Mb/s, EVDO Rev.A also has a 12-times improvement in the maximum uplink data rate, from .15Mb/s to 1.8Mb/s. EV-DO REVISION B Even Rev. A is now due to be superseded, with the wireless communications market constantly striving for better and faster services. 1× EV-DO Rev B (DORB) specifications have now been developed. EVDO Rev. B is the evolution of Rev. A and in addition to all that is provided in Rev A, provides additional enhancements such as: higher rates per carrier (up to 4.9Mbps on the downlink); higher rates by bundling multiple channels together (this can enhance user experience and enables new services such as high definition video streaming); reducing latency for services such as gaming and video telephony, due to statistical mutiplexing across channels and hybrid frequency re-use which reduces the interference from the adjacent sectors and improves the rates that can be offered especially to the users at the edge of the cell. Where EVDO isn't available, 2G/1xRTT data capability will be present and your EVDO modem or phone will automatically connect to it. While considerably slower than EVDO, 1x is a huge boon - if you find yourself in a remote location with no EVDO connectivity, you will still be able to remain connected! Commonly Used Abbreviations MIN - Mobile Identification Number ESN - Electronic Serial Number PRL - Preferred Roaming List SID - System Identification Number SCM - Station Class Mark CAI - Common Air Interface A Key - Authentication Key NAM - Numeric Assignment Module SPC - Service Programming Code Glossary BREW - is Qualcomm's open source application development platform for wireless devices equipped for CDMA technology. RUIM or R-UIM - is a transferable identification card for mobile phones that belong to the CDMA network. RUIM cards store personal information, including the name and account number, the cell phone number, as well as the contacts' names and numbers. The RUIM cards also store text messages and any other important phone settings. MEID - An ID number that is unique for each new CDMA mobile in the world. It identifies the phone to the network. MEID is a replacement for ESN. It began replacing ESN in 2005 since the pool of ESN numbers has been virtually exhausted due to the number of devices in use. It is equivalent to IMEI in GSM phones. ESN - An ESN is a numeric identifier that uniquely identifies a CDMA phone. The ESN is what a CDMA network uses to identify a phone and determine which subscriber's account, if any, it is linked to. Because of this, when switching from one phone to another, subscribers will have to provide the ESN of the new phone to the network carrier before it can be activated. The ESN is being phased out in favour of the MEID. This is happening because phone manufacturers are literally running out of ESN identifiers. OTA (Over-The-Air) - Any kind of event or transfer that takes place wirelessly using the cellular network as opposed to using a cable or other local connection. PRL - is a database residing in a wireless (primarily CDMA) device, such as a cellphone, that contains information used during the system selection and acquisition process. In the case of RUIM-based CDMA devices, the PRL resides on the RUIM. The PRL indicates which bands, sub bands and service provider identifiers will be scanned and in what priority order. Without a PRL, the device may not be able to roam, i.e. obtain service outside of the home area. Frequently Asked Questions : 1.How can I locate the ESN or MEID number on my phone? All mobile devices are identified by an Electronic Serial Number (ESN) or a Mobile Equipment Indentifier (MEID). Some devices may display the ESN or MEID under the battery, below the battery or on the back of the phone. Behind the Battery: Below the Battery: Back of the Phone: Below are examples of labels that can be found on devices supporting ESN numbers. As ESN Is an 11-digit Electronic Serial Number. An ESN in hexadecimal, or HEX, is represented by 8 characters that are numbers and letters. Below are examples of labels that can be found on devices that support MEID numbers. MEID is always hexadecimal, represented by 14 characters that are numbers and letters. The first digit is always A - F. NOTE: Don't confuse the letter O with the number 0 (zero). It is always a zero. Only letters A-F are in an ESN/MEID. Sourced info from the net and all recognition to them. Found this good report on the technical side of CDMA which you may find interesting. Some of the details provided may be obsolete as it was written a while ago, please verify the same. cdma.pdf Edit - Frequently Asked Questions
-
1 pointNear Field Communication NFC or Near Field Communication, is an emerging technology you will start hearing more about in the coming months. NFC is a standards-based, short-range wireless connectivity technology that enables simple and safe two-way interactions between electronic devices. NFC technology allows consumers to perform contactless transactions, access digital content and connect devices with the simplicity of a single touch. NFC technology provides global interoperability of contactless identification and interconnection technologies. You can use an NFC-enabled phone to make fast, convenient purchases, or as an alternative to a travel card. You can also get information such as news or travel updates by touching your phone to an RFID tag embedded in a "smart" poster – or swap electronic business cards with a new contact simply by touching your phones together. NFC phones are usually equipped with a smart chip to keep confidential information such as your credit card details or travel card information secure. You can also use your NFC phone to load blank RFID tags with information and mobile phone services that others can access by touching their phones to them. Nokia, Sony, and Royal Philips Electronics founded the NFC Forum in 2004 in order to promote the short-range wireless connectivity technology. Samsung, Motorola, Microsoft and more than 140 other organizations all joined the party shortly after. Specifications NFC utilizes the frequency band 13.56 MHz. The data transfer rate is 424 kbps, but it can be set at 106 kbps or 212 kbps. There are 3 primary ways NFC can be used on mobile devices: Card Emulation Mode Reader Mode P2P Mode (peer-to-peer mode) In card emulation mode, NFC devices can function as credit cards, debit cards, badges or tickets. This is the mode that would enable the "mobile wallet." In reader mode, NFC devices can read tags. This is most similar to how barcode scanning works today. For example, you can scan a barcode with an app on your mobile phone to access additional information. Eventually, NFC will displace barcode reading as the technology becomes more widespread. In P2P mode, NFC devices can exchange information with each other. For example, two NFC phones could exchange contact info, similar to the way apps like Bump for iPhone and Android allows for contact exchange today, but via a different technology. What could you use NFC for? There are a lot of creative ways to use NFC, but a basic example of how mobile NFC-based payments--the thing most of us will use the technology for--will work is this: You go shopping for shoes. When you find the perfect pair and head up to the cash register, instead of whipping out your wallet and fishing around for a credit card, you just wave your phone over a payment terminal on the counter near the cash register. The catch is you need a phone with NFC chips inside. That phone will need software that enables mobile payments, and the retailer will need to have a point of sale terminal that accepts NFC payments. The purchase will show up on your monthly credit card bill. But let's say this store doesn't have your size? This is where having a smartphone equipped with NFC beats an NFC-equipped debit card: you could potentially wave your phone at a tag on that pair of shoes, and up on your phone's screen would pop places to buy those shoes in the right size online and have them shipped to you. And what if you shop at this particular department store often? Your phone could also keep track of your points or rewards from the store and you could be sent mobile coupons that you'd use your phone to redeem. NFC in Action A remarkably diverse and ever-expanding universe of NFC use cases is being explored and brought to market all around the world. Today, both research organizations and commercial enterprises are putting NFC to work in widely diverse areas. See these NFC uses cases in action by visiting NFC Forum on Youtube A Day in the Life NFC technology has the power to bring new simplicity and convenience to many aspects of a typical person's daily life, as this example illustrates: How does NFC work? Let’s start with the basics. NFC is a short range high frequency wireless connectivity technology, which allows electronic devices, in close proximity, to communicate. NFC enabled devices can connect and communicate with other devices without any physical contact. In many ways it’s similar to Bluetooth, but instead of manually configuring two devices to work together, the devices establish a connection automatically when they are close enough. NFC operates at the 13.56MHz radio frequency band, which is unregulated and universally available, so that there are no licenses required to operate at this frequency. The data is transferred at a speed of up to 424Kbps and the distance is usually between 4cm to 10cm. When devices are brought within this range, the electromagnetic radio fields of both devices interact and magnetic inductive coupling takes place that facilitates communication between the devices. There are two types of NFC devices—an initiator that initiates the communication and controls the data exchange, and a receiver (or the target device) that responds to the requests from the initiator. NFC has active and passive modes of operation—active, where both devices generate an RF signal to exchange data, and passive, where only one NFC device generates an RF field and the second device or target transfers the data back to the initiator via load modulation technique. Although the NFC data transfer rate is lower than Bluetooth and Wi-Fi, the connection is secured and far more trustworthy due to the short transmission range. NFC connection is also more reliable compared to a physical connection as the connection won’t degrade due to contact wear, corrosion and dirt. NFC technology follows several standards such as ISO (18092), ECMA (340) and ETSI in addition to being compatible to Philips' MIFARE (ISO 14443 A) and Sony's FeliCa smart card protocols. NFC in Mobile: 3 Ways It's Implemented on Phones In mobile phones, there are three different ways that NFC can be implemented : Fully Integrated into the handset - NFC, especially in newer devices, can be fully integrated into the handset. That means that the NFC controller (the piece that does the actual communication) and the secure element (the secure storage area connected to the NFC controller) are both integrated into the handset itself. One example of a fully integrated NFC handset is the Google Nexus S, Google's latest flagship phone built in partnership with Samsung. On a SIM card - Alternately, NFC can be integrated into a SIM card - the card that identifies a mobile subscriber on an operator's cellular network. On a memory card - NFC technology can also be integrated on a microSD card, which is a removable storage card that uses flash memory. Many mobile phone owners use microSD cards to store photos, videos, apps and other files in order to save storage space on the phone itself. For phones that don't have a microSD card slot, accessories like cases or "sleeves" can be used instead. For example, Visa introduced a case for the iPhone which contains a microSD card manufactured by Device Fidelity to bring NFC technology to iPhone users. Security aspects Eavesdropping The RF signal for the wireless data transfer can be picked up with antennas. The distance from which an attacker is able to eavesdrop the RF signal depends on numerous parameters, but is typically a small number of meters. Also, eavesdropping is extremely affected by the communication mode. A passive device that does not generate its own RF field is much harder to eavesdrop on than an active device. One Open source device that is able to eavesdrop on passive and active NFC communications is the Proxmark instrument. Data Corruption Instead of just listening an attacker can also try to modify the data which is transmitted via the NFC interface. In the simplest case the attacker just wants to disturb the communication such that the receiver is not able to understand the data sent by the other device. Data corruption can be achieved by transmitting valid frequencies of the data spectrum at a correct time. The correct time can be calculated if the attacker has a good understanding of the used modulation scheme and coding. This attack is not too complicated, but it does not allow the attacker to manipulate the actual data. It is basically a Denial of Service attack. Data Modification In data modification the attacker wants the receiving device to actually receive some valid, but manipulated data. This is very different from just data corruption. The feasibility of this attack highly depends on the applied strength of the amplitude modulation. This is because the decoding of the signal is different for 100% and 10% modulation. Data Insertion This means that the attacker inserts messages into the data exchange between two devices. But this is only possible, in case the answering device needs a very long time to answer. The attacker could then send his data earlier than the valid receiver. The insertion will be successful, only, if the inserted data can be transmitted, before the original device starts with the answer. If both data streams overlap, the data will be corrupted. Relay attack Because NFC devices usually include ISO/IEC 14443 protocols, the relay attacks described are also feasible on NFC. For this attack the adversary has to forward the request of the reader to the victim and relay back its answer to the reader in real time, in order to carry out a task pretending to be the owner of the victim’s smart card. Recommended Solutions Secure Channel for NFC Establishing a secure channel between two NFC devices is clearly the best approach to protect against eavesdropping and any kind of data modification attack. Due to the inherent protection of NFC against Man-in-the-Middle-Attacks it is rather easy and straightforward to setup a secure channel. A standard key agreement protocol like Diffie-Hellmann based on RSA [4] or Elliptic Curves could be applied to establish a shared secret between two devices. Because Man-in-the-Middle is no threat, the standard, unauthenticated version of Diffie-Hellman works perfectly. The shared secret can then be used to derive a symmetric key like 3DES or AES, which is then used for the secure channel providing confidentiality, integrity, and authenticity of the transmitted data. Various modes of operation for 3DES and AES could be used for such a secure channel. Does Your Phone Have NFC? If you're not sure if your phone has NFC (or if you're thinking of buying one that does), NFC World has a great list of current, planned and rumored handsets that support the technology. You can see that list here. Some notable phones available now that offer NFC capabilities include, as mentioned above, the Google Nexus S, as well as the Samsung Galaxy II (select models), Nokia C7, Nokia C7-00 and the Samsung Wave 578. Also Apple is rumoured to be adding NFC chips to the next version of the iPhone. In India, Tata Docomo has signed an agreement with US-based Xius to test NFC solution in Hyderabad. On which Kesav got a dedicated thread going here Initially on offer will be operator based services like mobile phone top-up (expectedly), as well as content like ringtones and wallpapers. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Reference : cnet, readwriteweb, shanzai.com, nokia.uk, nfc-forum.org, Graz University of Technology Edit : Updated post with Security aspects of NFC
-
1 pointLTE has been all over the news this year - Reliance Industries (RIL) looks set to deploy TD-LTE services in 2011 in India, WiMax v/s LTE, The Indian government have approved Qualcomm’s investment in four fixed broadband services that will use LTE... Let us try to understand what LTE is all about. Long Term Evolution (LTE), is a new radio platform that is the primary technology behind 4G – the evolution of 3G networks. Where 3G made mobile data a reality, 4G will make it a much better one. It has been in development for around 10 years now, and has begun to see some releases worldwide. The very first LTE network was launched by TeliaSonera in Norway and Sweden, Verizon launched their LTE service in 38 markets in late 2010. Elsewhere the network is still at the trial stage. Boiled down to it’s basics, here is what LTE does: Theoretical download peak data rates up to 100 Mbps and upload peak data rates up to 50 Mbps with 20 MHz bandwidth Reduced latency to 10 msec round-trip time between user equipment and base station More capacity than 3G – an LTE network can support more users in a single area Larger cell size. A single LTE cell tower can cover up to 100km. While that size will be greatly diminished in a heavy urban area, it’s still a lot better than 3G Compatability - LTE is designed to be compatible with existing standards Ease of upgrade - Part of the reason it has taken so long to develop LTE is that it is planning forward a lot. The networks are being designed so that implementing upgrades further down the line will be much easier. TD-LTE has been gathering steam over the last few months, and now a lot of operators are experimenting with it. It stands for Time Division LTE, and was developed by China Mobile over the last three years. To keep this as simple as possible, here are the essential differences and similarities between TD-LTE and classic LTE: They run on different bands of the wireless spectrum. But the part of the spectrum that would carry the TD-LTE signal is much cheaper, and has much less traffic. TD-LTE and LTE are so similar that the same chip can access both networks – which is much easier for handset manufacturers. The other standard for 4G, WiMAX, is not particularly compatible with LTE. There’s talk that it WILL be compatible in the future, but it’s not at the moment. TD-LTE, however, can be pretty cheaply and easily upgraded to from WiMAX. A novel radio access technology is implemented by LTE, which bodes well for IP-based traffic largely. Another advantage of this technology is its offering an uncomplicated upgrading track from existing 3G networks. A mobile networks core architecture also may evolve from LTE that would be known as System Architecture Evolution, which can effectuate significant perormance augmentations over 3G. This technology, further can enhance spectral efficiency with double the efficacy of 3G and HSPA standards. The numerous wireless broadband networks of the times can exploit the higher data speeds and capacity evolved here, as good as any other media application. Other significant advantages presented by this technology are - cost reduction per bit, services increment at low costs, Usage flexibility of new, as well as existing frequency bands, open interfaces, simple architecture, and a considerable reduction in terminal power consumption. LTE can co-exist with earlier 3GPP radio technologies, even in adjacent channels, and calls can be handed over to and from all 3GPP’s previous radio access technologies. What is LTE architecture? The evolved architecture comprises E-UTRAN (Evolved UTRAN) on the access side and EPC (Evolved Packet Core) on the core side. The figure below shows the evolved system architecture More technical info here Since it is a evolving technology, experts are requested to give their opinion and the post will be modified accordingly To see the latest LTE deployments and commitments check LTE Maps Sourced info from missphones, gomonews
-
1 pointBooked my long lusting Toyota Fortuner, Silver Colour, wait period about 3 months; on road price at Faridabad 22,25,134/- http://www.team-bhp....ive-review.html Edit: Booking cancelled with 36 Toyota, Faridabad and shifted to Commercial Toyota, Haldwani; Saved a cool Rs. 1 lac on road tax; Now OTR is 21,22,798/
-
1 pointMTS To Launch BlackBerry Smartphone and Services In India.. This Month... Will Start With Curve 8530 Source MTS Official Webpage For Blackberry http://www.mtsindia.in/blackberry/ FAQ http://www.mtsindia....berry/faqs.html MTS the CDMA Mobile and Data Services of Sistema Shyam TeleServices Ltd (SSTL), which nationally operates its telecom services with over 11 million wireless customers is all set to launch BlacKBerry Smartphone and Services on its network in few days. In an endeavor to stay true to its data centric-voice enabled strategy to provide innovative telecom solutions to the customers, MTS will launch BlackBerry Curve 8530 smartphone with Free Unlimited Internet Plan, Free Talk Time and Free 100 SMS per day as an inaugural offer to customer who buy the device from the operator. Initially MTS BlackBerry Services will be launched in 7 cities – Delhi, Mumbai, Pune (Maharashtra), Jaipur, Bangalaore, Chennai and Kolkata. The company will launch BlackBerry Internet Services (BIS) , BlackBerry Enterprise Services (BES) and BlackBerry Enterprise Services Plus (BES Plus). The operator has not shared the exact date of launch and tariff plans with us but we will keep you posted as and when we get any lead. We have also come to know that MTS will allocate a Special Customer Care Number 955 for Blackberry services from its own network.
-
1 pointFew Links are broken so I am trying to upload all files to new server..... wait for update
-
1 pointFor EVDO, you need to have the following, -You should be using OMH Sim Card. This sim card is with the Diamond picture on it. Most probably if you have purchased the handset from Reliance you would have already got it alongwith phone. Otherwise you need to have one. -EVDO is to be activated from Reliance Backend. For activating EVDO, call up Reliance Customer Care at *222 and tell them that you are using an OMH Sim Phone and want to subscribe to high speed internet and live TV and for this you need EVDO to be activated on your number. This will take some time and you will have to constantly follow up. If it is not resolved call at *355 which is the Reliance Netconnect department and ask for EVDO activation. Once EVDO activation is done, you can subscribe to any Netconnect Plan or use the Per Minute plan and enjoy EVDO speed.