Jump to content
Reliance Jio & Reliance Mobile Discussion Forums

Chirag

Moderators
  • Content count

    2,438
  • Joined

  • Last visited

Everything posted by Chirag

  1. Effective R-Connect Speeds

    I think, Tiger's got a definitely good deal with the speeds he gets!! I work in 7-8KBps downloads, and getting 22-24kBps downloads at Kazaa is definitely something quite good in 1000 bucks! I get 7-8kBps speeds in 750/month. Waiting for Reliance Broadband!
  2. Handset Warranty / Insurance

    oh wow, thts quite some info! Abt those 160 bucks .. but damn all operators do charge something or the other if the phone gets locked. Its like a service charge. Whtever! But do post abt the UNICDMA thing somewhere in the forum for ppl like me! I forget things very easily!
  3. oops.. I guess i beg to differ at all those places. I dont earn to get a materialistic life! Anyways, as far as we had a discussion once over Colour handsets, I guess Samsung is quite sturdy and tamper proof (u cant do much abt the ringtones there). Niket, try meeting a few ppl who use these phones, maybe u can get much better info from them!
  4. Why Does My Rconnect Become Dormant Always

    Y dont u try logging the amt of time u've used RConnect for, and make sure u note down the time from loggin in to Loggin out. And then check the same in the forthcoming bills. I think tht the way Greens says, it works.
  5. Covers For Lg Rd2130?

    The only issue with lamination is that it does not allow heat generated to be released. So i guess if u can take care of that then Lamination is definitely a better option. After all it hardly takes 10-15 bucks these days to get a lamination done. And its much better to get it done than let the handset get dirty!
  6. Phone Book Transfer @ RWorld

    True enuf... But then y wud they give the option for an UPLOAD on a RIM no.???
  7. Can't read? Talking phones will help Hemangi Balse in Mumbai | April 24, 2004 09:21 IST Rediff.com Illiterate but want to use a mobile phone? Not to worry -- help is at hand, courtesy Reliance Infocomm. The Ambani company is launching speech-based applications. Quite simply, that means that an illiterate villager or urban dweller has merely to mention the name of the person he or she wants to talk to and, presto, the mobile phone will do the rest of the job -- by scanning a Reliance phone directory. More to the point, an illiterate person can speak in any of several Indian languages and dialects. So a villager in the western ghats of Maharashtra (who speaks a different Marathi dialect) can speak in his dialect into the phone, without pressing too many buttons. Nor does he have to buy a new mobile phone. Says Mahesh Prasad, president, applications and solutions group, Reliance Infocomm: "We are working on a network-based technology that is independent of handsets. This will mean that the current handsets can be used to recognise and transmit voice signals." Prasad declines to say when the service will be launched, but others expect it to be launched in a few months. How do these voice-based commands work? The handset will recognise the command, translate it into text, retrieve the phone number of the person being telephoned from the data base, translate the data into voice and transmit it to the user's handset. Globally, much work has been done to recognising speech in English (in various dialects). However, the biggest challenge is to offer this in various Indian languages with several dialects, besides commercialising these services, says Prasad. Reliance Infocomm has already set up a dedicated team to look at the permutations and combinations of speech-based applications and products for customers. According to the 2001 census, 34.62 per cent of India's population is illiterate. Reliance's current effort is clearly aimed at expanding the mobile services market. Reliance is working on several "futuristic applications" for its R-World. It will soon be launching an application to make a mobile phone more accessible to the blind. This application, for which Tandem Infotech received a Dhirubhai Ambani Developers Programme award, enables a visually impaired person to "hear" missed calls or an SMS (which is automatically read out to him) and dial back the number. Though the application is meant to directly benefit the blind, it is also expected to be a high utility tool for anyone using a mobile phone.
  8. Handset Warranty / Insurance

    Yokel, can u cook up some reason to prove that ur phone wasn't involved in an accident ?? hehehe.. so in other words, Insurance is only for the phone being damaged for any problem within the phone? And not any external damages? Then dont ppl get insurance cover when the top LCD glass cracks?? The Glass itself costs some 350 bucks i guess!
  9. No wonder they are calling back for their B/W handsets! So soon we can expect Certified Used B/W handsets for sale from RWW as well! Tht shud be dirt cheap compared to Rs.6350/- for a new B/W handset!! Well having a mobile these days is no big thing. and having a B/w handset is considered "cheap"! Now this is wht Reliance knows! An average indian has got far more spending power. And hence they want them to spend(to fill their own pockets ) No offence meant, but they have the best marketing policies! None can beat them there! So guys, jump on to the Colour Hungama! "Spend" is the keyword here!
  10. R I C Interviews

    Nice stuff... Quite some Inspiration!
  11. I guess thats the least they could offer! And anyways, vingan rightly pointed out that their Color handsets r absolutely overpriced! When they cud reduce the rates of the B/W handsets, y dont we see the same for these ones?
  12. Connecting RIM To A Wi-fi Network

    Hackers on the move Tuesday 25 May 2004 Computerweekly.com As more employers are issuing mobile devices, the problem of securing company data is becoming ever more acute. Danny Bradbury looks at the threats firms need to address Many employees want to cut their companies' apron strings, go mobile and go on the road. But although mobile computing has many benefits, security has to be a key consideration. Experts believe that a mobile computing culture will never be as secure as fixed line access behind a firewall because of the insecurities inherent in radio-based networks such as Wi-Fi and Bluetooth. "The obvious answer is that sealed, Lan-based access will always be more secure," says Mike Smart, worldwide vice-president of product management and engineering at mobile security services company Gric. "Radio frequencies can be scanned." Smart says that most of his clients' mobile employees are more aware of the potential security dangers than non-mobile users and are more on their guard. Conversely, working behind a firewall on a terrestrial Lan can lull IT managers and end-users into a false sense of security, says Phil Robinson, managing consultant at security services company IRM. Some of his clients are very poor at securing their Lans and are failing to put network access controls in place. He recalls one or two clients that had no access control mechanism for workers inside the firewall. "If you have a network port connection, you can access the system holding the crown jewels," he says. But although some hope that firms will take extra care with their mobile networks, statistics suggest otherwise. Research released by the DTI at the InfoSecurity event in April revealed that 68% of the 1,000 UK firms interviewed provide some form of remote access (up 20% from two years ago), but 50% of those companies still have no security procedures to manage mobile devices. Given the number of potential threats to mobile users, this is particularly worrying. The range of exploits run from the low-tech, such as tricking legitimate users into giving away access information, through to the high-tech, such as "blue jacking" (hacking into Bluetooth devices), and "man-in-the-middle" attacks on Wi-Fi devices. This involves placing a rogue wireless access point in the vicinity of your PC which impersonates a genuine access point, passing on your connection to the genuine network while intercepting data. Ian Hughes, wireless security consultant at British Telecom's technology research and IT operations business BT Exact, advises users of public Wi-Fi hotspots to use a personal firewall on their notebook PCs while ensuring that file and print sharing is disabled. The security mechanisms built into wireless networks all have their problems, he says. The Wired Equivalent Privacy protocol, part of the original 802.11b standard, is easy to crack using open source software such as Airsnort, and concerns have also been raised over the Wi-Fi Protected Access security protocol that is a precursor to 802.11i. Hughes is sceptical of the 802.1x protocol, which is designed as a security overlay for wireless networks. "If you read it as per the IEEE standard, then natively it only authenticates one-way, but there are extensions to it," he says. "You have to be clear which version you are talking about." Unfortunately, simply encrypting data will not stop an infected or vulnerable machine from polluting the rest of the network. The move towards autonomic and policy-based security is designed to mitigate this risk. Companies such as Cisco with its self-defending network initiative are producing network agents that analyse devices when they connect and make decisions based on the results. This could lead to a mobile device with an operating system lacking the relevant security patches is quarantined onto part of a network with reduced functionality, or simply refused access altogether. The problem with such security mechanisms is that they concentrate on the device rather than the user behind it, meaning that if a machine is stolen or used illicitly by another party, it could become a conduit for attack. Ideally, firms should deploy two-factor security, says Smart. This would encompass something you have, such as a smartcard, in addition to something you know, such as a password. However, the DTI survey reveals that just 6% of companies opted for two-factor authentication when using mobile devices. This low level of interest combined with the easy-to-lose factor of mobile devices makes data on mobile clients particularly vulnerable, even before it travels over a network connection. Consequently, it is important to encrypt data on the mobile device itself, says Chris Knowles, consultancy practice leader with Computacenter. The problem with encrypting data has been processor power, says Ollie Whitehouse, director of security architecture at security consultancy @Stake. Many encryption algor-ithms chew up CPU time, leaving small footprint devices unable to cope. He suggests elliptic curve cryptography, as used by companies such as Certicom, as a solution because of the lower processing overhead. But PDAs and smartphones carry other security challenges. As most of them are purchased and owned by individuals rather than distributed by employers, this can make them a security nightmare. With so many makes and models and with many requiring a return to the service centre for security firmware upgrades, even policy-based or autonomic security architectures will run into difficulties handling PDAs and phones, says Whitehouse. Some of these devices are prone to bluejacking attacks. Nokia, for example, is releasing software upgrades for selected phones to address this problem in the summer. When dealing with phones and PDAs, the best approach is to deploy a management policy governing how data is held and synchronised on the corporate network. By taking a universal approach you will be able to mitigate the risks, but the smaller and more varied the device, the more of a security risk it creates in any mobile computing infrastructure. This article is part of Computer Weekly's Special Report on mobile IT produced in association with Vodafone
  13. Weird enuf! Wrong SMS that took her life SUCHANDANA GUPTA TIMES NEWS NETWORK[ TUESDAY, MAY 25, 2004 05:00:16 AM ] Rediff.com BHOPAL: "Sorry, you have failed." These are the words that snuffed the life out of 17-year-old Aditi Jeena. It was like any other Sunday morning at the Jeenas'. Aditi's parents and younger sister had gone for their morning walk. It was then that Aditi received news of class XII CBSE results. She SMSed her roll number only to be told she had failed. Her family returned to find her hanging from the ceiling fan. They had little joy in the fact that she had actually passed with 62 per cent aggregate. Police say they are investigating the suicide and the possibility that the cellular service provider gave out the wrong result. One of the theories is that Aditi may have keyed in a wrong roll number. Additional superintendent of police, Indore, Rakesh Gupta, in-charge of the case says, "... We are first trying to find out whether she had dialled the right roll number. And it is quite likely that she must have because no one takes such a strong decision to end one's life if he or she is not sure."
  14. Clear Voice & Voice Privacy

    Anuj, its certainly a fone feature, but it mite also be a network enabled feature... coz i remember when Airtel Launched itself in Mumbai, they made a big entry by showcasing their Voice Clarity Network feature. So maybe it shud also be something related to the network capabilities. As far as CustCare guys go, u cant expect them to know much!
  15. Reset Memory In R-world

    Did u use the RESET R-MENU Option from R-Menu or the RESET option from R-World??
  16. BIRTHDAY WISHES!

    Wow. seems like quite some b'days last two months! Wish u'll luck n love guys! Am partying on ur names here!
  17. Well if u read the posts from Page1 of this thread, u'll know tht the nos. would completely change now! u cant jus add a 93 before an existing no.! Coz my Rel no. cud be the same as some other Rel no. in another city! Sopes, the entire no. would change.. Now, how well they do it is quite a question. But i guess they'd follow BSNL's numbering scheme for the first 5 digits of the new no., but the next 5 digits u get is ur pure luck now! hopefully they shud retain the old nos. last 5 digits atleast!
  18. Bad Quality of Key Pad

    Yeh its sickening when the keypad wears off... But i recently saw some good Nokia GSM Handsets with the same problem! I guess, Phone Covers r the order of the day! But 400 bucks for a keypad??
  19. T9 Dictionaries

    Oh i thot it was something real big ... Have done this plenty of times.. But the issue is that after sometime, the new word gets erased from the Dictionary.. Its not permanently stored! Any idea over this?
  20. Difference Between Line 1 & Line 2

    huh? I am wondering whether u guys have never used 2 nos. on one phone ever? Its like a very old thing in mumbai. Orange(Hutch) provides this service of having 2 nos on 1 Sim Card for almost a yr now! I dont really know whether both Line1 n Line2 can b active together. But its surely something interesting! Where employees of companies do prefer to have official n personal nos. on the same phone, and simple ppl having small biz also can have this service! the best part is tht u dont require 2 different phone books!! Its almost like having 2 cellphones at a same time! Lets see when Reliance Officially starts the service. But as of now, they've activated Line2 as well for the phones, coz ppl accidentally go into Line2 and wonder y they r not able to make n receive calls... and get frustrated with the phone!!! so they have allowed the same no. to function on Line2 as well... Though CustomerCare dudes, dont acknowledge this fact. But i am able to use both the lines as of now!
  21. T9 Dictionaries

    Yusuf.. Am jus wondering if u mind letting out the way to add words to the T9 Dictionary here! :)Hope we get some very interesting stuff from u!
  22. Need More Avatars

    Hope u guys found the new Avatars.. Its listed as MSN Avatars, got them from the MSN Messenger site!
  23. BIRTHDAY WISHES!

    Have a gr8 day man!!!
  24. Reset Memory In R-world

    Does the RESET Memory of R-World ... removes jus the R-World Cache or the memory of the phone? i.e. the Phone Book etc?
  25. Clear Voice & Voice Privacy

    I guess the Conversations r tapped anyways! Even the ones where u get romantic
×