Leaderboard
Popular Content
Showing most liked content on 09/27/2011 in all areas
-
8 pointsWas again in talk and i am feeling that i am very near to break through the Data plan things
-
1 pointData Plan Related Unified Data Plans Use it any where On Phone or Tethering Mode (Use on RWorld Password or NetConnect ) (RWorld + NetConnect = SimpleNet) = DONE = Achived as MobileNet All SimpleNet plan must be Activated by SMS short code reducing burden on Web World or Customer Care People = DONE Default SimpleNet plan is Rs 0.50 / Minute / IT MUST BE Volume based like Rs 2 / MB = DONE More Dynamic Combo Plans for Voice + Data Usage = Can be done but not need now EVDO Related Automatic EVDO Activation for Fresh OMH or EVDO Based Devices = Comming Soon Unprovisioned / Old Deactivated OMH / Devidce must have EVDO Deactivated Automatically = Comming Soon Provisioned / Newly Activated OMH / Device must have EVDO Activated automatically = Comming Soon Activation / Reactivation / Deactivation of EVDO must be SMS Based = Will be only via Web World Additional MEID Based PPP Login ID ( A0000012345678@ppp.rcom.co.in) and Password sud be password / So all New Device like Samsung Atlas I500 should not require OS Modification to accomodate MDN / MDN based UID Provisioning = Comming Soon Device Related (Handset Change - Non RUIM) As per the old Methos HCC or Retain MDN both method is confusin HCC is either not available or not working on many devices, Retain MDN is too much time consuming and Device goes in Lost state, I appeal RCDMA to come with Voice Portal for Device Swap so no Funny HCC or Retain MDN is Involved
-
1 pointNear Field Communication NFC or Near Field Communication, is an emerging technology you will start hearing more about in the coming months. NFC is a standards-based, short-range wireless connectivity technology that enables simple and safe two-way interactions between electronic devices. NFC technology allows consumers to perform contactless transactions, access digital content and connect devices with the simplicity of a single touch. NFC technology provides global interoperability of contactless identification and interconnection technologies. You can use an NFC-enabled phone to make fast, convenient purchases, or as an alternative to a travel card. You can also get information such as news or travel updates by touching your phone to an RFID tag embedded in a "smart" poster – or swap electronic business cards with a new contact simply by touching your phones together. NFC phones are usually equipped with a smart chip to keep confidential information such as your credit card details or travel card information secure. You can also use your NFC phone to load blank RFID tags with information and mobile phone services that others can access by touching their phones to them. Nokia, Sony, and Royal Philips Electronics founded the NFC Forum in 2004 in order to promote the short-range wireless connectivity technology. Samsung, Motorola, Microsoft and more than 140 other organizations all joined the party shortly after. Specifications NFC utilizes the frequency band 13.56 MHz. The data transfer rate is 424 kbps, but it can be set at 106 kbps or 212 kbps. There are 3 primary ways NFC can be used on mobile devices: Card Emulation Mode Reader Mode P2P Mode (peer-to-peer mode) In card emulation mode, NFC devices can function as credit cards, debit cards, badges or tickets. This is the mode that would enable the "mobile wallet." In reader mode, NFC devices can read tags. This is most similar to how barcode scanning works today. For example, you can scan a barcode with an app on your mobile phone to access additional information. Eventually, NFC will displace barcode reading as the technology becomes more widespread. In P2P mode, NFC devices can exchange information with each other. For example, two NFC phones could exchange contact info, similar to the way apps like Bump for iPhone and Android allows for contact exchange today, but via a different technology. What could you use NFC for? There are a lot of creative ways to use NFC, but a basic example of how mobile NFC-based payments--the thing most of us will use the technology for--will work is this: You go shopping for shoes. When you find the perfect pair and head up to the cash register, instead of whipping out your wallet and fishing around for a credit card, you just wave your phone over a payment terminal on the counter near the cash register. The catch is you need a phone with NFC chips inside. That phone will need software that enables mobile payments, and the retailer will need to have a point of sale terminal that accepts NFC payments. The purchase will show up on your monthly credit card bill. But let's say this store doesn't have your size? This is where having a smartphone equipped with NFC beats an NFC-equipped debit card: you could potentially wave your phone at a tag on that pair of shoes, and up on your phone's screen would pop places to buy those shoes in the right size online and have them shipped to you. And what if you shop at this particular department store often? Your phone could also keep track of your points or rewards from the store and you could be sent mobile coupons that you'd use your phone to redeem. NFC in Action A remarkably diverse and ever-expanding universe of NFC use cases is being explored and brought to market all around the world. Today, both research organizations and commercial enterprises are putting NFC to work in widely diverse areas. See these NFC uses cases in action by visiting NFC Forum on Youtube A Day in the Life NFC technology has the power to bring new simplicity and convenience to many aspects of a typical person's daily life, as this example illustrates: How does NFC work? Let’s start with the basics. NFC is a short range high frequency wireless connectivity technology, which allows electronic devices, in close proximity, to communicate. NFC enabled devices can connect and communicate with other devices without any physical contact. In many ways it’s similar to Bluetooth, but instead of manually configuring two devices to work together, the devices establish a connection automatically when they are close enough. NFC operates at the 13.56MHz radio frequency band, which is unregulated and universally available, so that there are no licenses required to operate at this frequency. The data is transferred at a speed of up to 424Kbps and the distance is usually between 4cm to 10cm. When devices are brought within this range, the electromagnetic radio fields of both devices interact and magnetic inductive coupling takes place that facilitates communication between the devices. There are two types of NFC devices—an initiator that initiates the communication and controls the data exchange, and a receiver (or the target device) that responds to the requests from the initiator. NFC has active and passive modes of operation—active, where both devices generate an RF signal to exchange data, and passive, where only one NFC device generates an RF field and the second device or target transfers the data back to the initiator via load modulation technique. Although the NFC data transfer rate is lower than Bluetooth and Wi-Fi, the connection is secured and far more trustworthy due to the short transmission range. NFC connection is also more reliable compared to a physical connection as the connection won’t degrade due to contact wear, corrosion and dirt. NFC technology follows several standards such as ISO (18092), ECMA (340) and ETSI in addition to being compatible to Philips' MIFARE (ISO 14443 A) and Sony's FeliCa smart card protocols. NFC in Mobile: 3 Ways It's Implemented on Phones In mobile phones, there are three different ways that NFC can be implemented : Fully Integrated into the handset - NFC, especially in newer devices, can be fully integrated into the handset. That means that the NFC controller (the piece that does the actual communication) and the secure element (the secure storage area connected to the NFC controller) are both integrated into the handset itself. One example of a fully integrated NFC handset is the Google Nexus S, Google's latest flagship phone built in partnership with Samsung. On a SIM card - Alternately, NFC can be integrated into a SIM card - the card that identifies a mobile subscriber on an operator's cellular network. On a memory card - NFC technology can also be integrated on a microSD card, which is a removable storage card that uses flash memory. Many mobile phone owners use microSD cards to store photos, videos, apps and other files in order to save storage space on the phone itself. For phones that don't have a microSD card slot, accessories like cases or "sleeves" can be used instead. For example, Visa introduced a case for the iPhone which contains a microSD card manufactured by Device Fidelity to bring NFC technology to iPhone users. Security aspects Eavesdropping The RF signal for the wireless data transfer can be picked up with antennas. The distance from which an attacker is able to eavesdrop the RF signal depends on numerous parameters, but is typically a small number of meters. Also, eavesdropping is extremely affected by the communication mode. A passive device that does not generate its own RF field is much harder to eavesdrop on than an active device. One Open source device that is able to eavesdrop on passive and active NFC communications is the Proxmark instrument. Data Corruption Instead of just listening an attacker can also try to modify the data which is transmitted via the NFC interface. In the simplest case the attacker just wants to disturb the communication such that the receiver is not able to understand the data sent by the other device. Data corruption can be achieved by transmitting valid frequencies of the data spectrum at a correct time. The correct time can be calculated if the attacker has a good understanding of the used modulation scheme and coding. This attack is not too complicated, but it does not allow the attacker to manipulate the actual data. It is basically a Denial of Service attack. Data Modification In data modification the attacker wants the receiving device to actually receive some valid, but manipulated data. This is very different from just data corruption. The feasibility of this attack highly depends on the applied strength of the amplitude modulation. This is because the decoding of the signal is different for 100% and 10% modulation. Data Insertion This means that the attacker inserts messages into the data exchange between two devices. But this is only possible, in case the answering device needs a very long time to answer. The attacker could then send his data earlier than the valid receiver. The insertion will be successful, only, if the inserted data can be transmitted, before the original device starts with the answer. If both data streams overlap, the data will be corrupted. Relay attack Because NFC devices usually include ISO/IEC 14443 protocols, the relay attacks described are also feasible on NFC. For this attack the adversary has to forward the request of the reader to the victim and relay back its answer to the reader in real time, in order to carry out a task pretending to be the owner of the victim’s smart card. Recommended Solutions Secure Channel for NFC Establishing a secure channel between two NFC devices is clearly the best approach to protect against eavesdropping and any kind of data modification attack. Due to the inherent protection of NFC against Man-in-the-Middle-Attacks it is rather easy and straightforward to setup a secure channel. A standard key agreement protocol like Diffie-Hellmann based on RSA [4] or Elliptic Curves could be applied to establish a shared secret between two devices. Because Man-in-the-Middle is no threat, the standard, unauthenticated version of Diffie-Hellman works perfectly. The shared secret can then be used to derive a symmetric key like 3DES or AES, which is then used for the secure channel providing confidentiality, integrity, and authenticity of the transmitted data. Various modes of operation for 3DES and AES could be used for such a secure channel. Does Your Phone Have NFC? If you're not sure if your phone has NFC (or if you're thinking of buying one that does), NFC World has a great list of current, planned and rumored handsets that support the technology. You can see that list here. Some notable phones available now that offer NFC capabilities include, as mentioned above, the Google Nexus S, as well as the Samsung Galaxy II (select models), Nokia C7, Nokia C7-00 and the Samsung Wave 578. Also Apple is rumoured to be adding NFC chips to the next version of the iPhone. In India, Tata Docomo has signed an agreement with US-based Xius to test NFC solution in Hyderabad. On which Kesav got a dedicated thread going here Initially on offer will be operator based services like mobile phone top-up (expectedly), as well as content like ringtones and wallpapers. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Reference : cnet, readwriteweb, shanzai.com, nokia.uk, nfc-forum.org, Graz University of Technology Edit : Updated post with Security aspects of NFC
-
1 pointI have been in a recent entrant to this forum and I must admit I am loving it. Have learnt a lot about Androids in particular and CDMA in general. The mods are super, everyone is helpful and people have been more than open about discussions. Anything and everything seems to be welcome as long as it is decent and relevant. There has been one issue that I have kind of been facing (or maybe something that has been troubling me, if that is the word), I kind of feel like a leecher at times. I keep extracting a lot out of this, but have not been really able to contribute even my wee bit back to this community. Now considering myself as a total newbie in this fascinating world, I really don't know what I can do. I am sure the same issue has been haunting a lot of people out here. Take the classic case of my first topic itself. I wanted a suggestion for a phone and people really poured their hearts out while they suggested a proper handset to me. Amongst all the discussions, everyone continued to remain neutral and not really put down or promote any particular phone. It was fascinating, to say the least, to learn about everything and finally myself walk into the deep waters of Android. Having done that, now I kind of feel like I too want to contribute something back, in return. But what do I do? I really have no clue. I am not so technologically savvy, esp about the mobile world that I can talk as intelligently as a lot of people out here. Please suggest how many of us can pay back what we get out here.... Something I am sure other newbies too must be asking. Any suggestion welcome. If practical, surely would oblige. Regards Rahul
-
1 pointRimWeb is great. I get News, up-coming technology, Deals, Buying & selling platform, knowledge.. What else can I expect ?
-
1 pointWell this is not a deal site actually in the strict sense.. But something very different.. It brings one whacky product everyday.. Yesterday it was gun shaped ice cubes.. Today it is The iMousePad.. De-Evolution.. Even if you are not inclined to buy any products, it's hell lot of fun just to read the description and overall whacky and free flowing attitude of the site... Worth a Dekho >> http://www.whack.in/
-
1 pointTry this if it works... Use Discount Code MYDLIMT to get Rs 5,600 Off from the listed price of Rs 28,000.. Samsung Galaxy S 2 at Rs 22,400 >> http://www.mydala.co...axy-S-II-I9100-
-
1 pointLight Field Camera The first light field camera will be launched by Lytro pictures. Go to their website to play with pictures. Its amazing. What is the light field? The light field is a core concept in imaging science, representing fundamentally more powerful data than in regular photographs. The light field fully defines how a scene appears. It is the amount of light traveling in every direction through every point in space – it’s all the light rays in a scene. Conventional cameras cannot record the light field. How does a light field camera capture the light rays? Recording light fields requires an innovative, entirely new kind of sensor called a light field sensor. The light field sensor captures the color, intensity and vector direction of the rays of light. This directional information is completely lost with traditional camera sensors, which simply add up all the light rays and record them as a single amount of light. How do light field cameras make use of the additional information? By substituting powerful software for many of the internal parts of regular cameras, light field processing introduces new capabilities that were never before possible. Sophisticated algorithms use the full light field to unleash new ways to make and view pictures. Relying on software rather than components can improve performance, from increased speed of picture taking to the potential for capturing better pictures in low light. It also creates new opportunities to innovate on camera lenses, controls and design. How are light field pictures different? The way we communicate visually is evolving rapidly, and people’s expectations are changing in lockstep. Light field cameras offer astonishing capabilities. They allow both the picture taker and the viewer to focus pictures after they’re snapped, shift their perspective of the scene, and even switch seamlessly between 2D and 3D views. With these amazing capabilities, pictures become immersive, interactive visual stories that were never before possible – they become living pictures. Source: www.lytro.com
-
1 pointYou can add NFC to any phone using Sidetap NFC microsd cards. Tyfone is a pioneer in neutral secure element based mobile services infrastructure. Its mobile software platform and SideTap memory card secure element with optional integrated antenna enables services secure enough to manage Debit, Pre-paid and Credit Cards IDs as well as other identities such as Driver's License, Health Records, and Passports.
-
1 pointTrue, it seems the one inbuilt in IPB simply blocks/prevents duplicates from being created. The one on VB lists 5 threads with similar thread titles when the user types the new thread title. But that is a very useful plugin, anyone knowing Ajax here and familar with IPB, they can build and integrate it. We do have moderation preview anyway so not a big issue but would be good to have.
-
1 pointhttp://www.swingnote.com/tools/texttohex.php Use above website this will make your work easier
-
1 pointA Real Monster Laptop - Acer Aspire Ethos AS8951G-9600 Check the Full Review Here >> http://computershopp...os-as8951g-9600 Processor: 2GHz Intel Core i7-2630QM Memory: 8GB RAM Storage: 750GB hard drive Optical Drive: Blu-ray reader/DVD±RW Screen: 18.4 inches (1,920x1,080 native resolution) Graphics: Nvidia GeForce GT555M (2GB) Speakers: Six speakers tucked in the chassis, including a down-firing subwoofer on the bottom. Combined with the Dolby Home Theater v4 Audio Enhancement technology Touchpad: 4.5 inches by 2.5 inches, When detached, used as a Multimedia Remote Weight: 8.6 pounds Dimensions (HWD): 1.5x17.3x11.6 inches Operating System: Windows 7 Home Premium (64-bit) The left edge of the AS8951G-9600 houses a smorgasbord of ports: VGA, HDMI, USB 3.0, eSATA/USB combo, mic, headphone, and even FireWire. The memory card reader is around the front, while the optical drive, LAN jack, and three more USB ports reside on the right edge. The roomy touch pad pops out of its cradle to double as a multimedia remote. The keyboard deck of the Aspire Ethos AS8951G-9600 is large enough to accommodate a full-sized keyboard, dedicated number pad, a roomy touch pad, and a fighter jet or two.