Thursday, August 30, 2007
Vringo bets on video ringtones (America's Network)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
UIGEA Pummels Poker (Online Poker News)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Nokia Stalks Apple, Shares Rise (Forbes)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Nokia barges into mobile services (ZDNet Asia)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
BEYOND THE SLOTS (Colorado Springs Gazette)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Home Surveillance Live from Your Mobile Phone
Continue.
Read More...
[Source: The Mobile Technology Weblog]
Continuous Packet Connectivity (CPC) Is Not Sexy - Part 3
In a previous post I've given a broad overview of a 3GPP release 7 work item called "Continuous Packet Connectivity" (CPC).This feature or rather this set of features aim to improve userexperience by enhancing battery lifetime, reaction time after idletimes and to increase network bandwidth in situations with manysimultaneous voice over IP and other real time service users. Ratherthan introducing a bold new concept, CPC very much works "under thehood" by improving functions that are already present. Part 2 of this mini series has started to look at a first set of features and this part now finishes by looking at the remaining ones:
Discontinuous reception (DRX) in Downlink at the UE (based on section 4.5 of 3GPP TR 25.903):
While a mobile is in activate high speed (HSDPA) mode it has to monitor one or more high speed shared control channels (HS-SCCH) to see when packets are delivered to it on the high speed shared channels. This monitoring is continuous, i.e. the receiver can never be switched off.
For situations when no data is transmitted or the average data transfer rate is much lower than what could be delivered over the high speed shared channels, the base station can instruct the mobile to only listen to selected slots of the shared control channel. The slots which the mobile does not have to observe are aligned as much as possible with the uplink control channel gating (switch off) times. Thus there will be times when the terminal can power down the transmitter unit to conserve energy.
Once more data arrives from the network than what can be delivered with the selected DRX cycle the DRX mode is switched off again and the network can once again schedule data in the downlink continuously.
HS-SCCH-less operation which includes an HS-SCCH less initial transmission (based on section 4.7 and 4.8 of TR 25.903):
This feature is not intended to improve battery performance but to increase the number of simultaneous real time VoIP users in the network.
VoIP service e.g. via IMS requires relatively little bandwidth per user and thus the number of simultaneous users can be high. On the radio link, however, each connection has a certain signaling overhead. Thus, more users mean more signaling overhead which decreases overall available bandwidth for user data. In the case of HSDPA, the main signaling resources are the high speed shared control channels (HS-SCCH). The more active users, the more they proportionally require of the available bandwidth.
HS-SCCH-less operation aims at reducing this overhead. For real time users which require only limited bandwidth, the network can schedule data on high speed downlink channels without prior announcements for the terminal on a shared control channel. This is done as follows: The network instructs the mobile not only to listen to the HS-SCCH but in addition to all packets being transmitted on one of the high speed downlink shared channels. The terminal then attempts to blindly decode all packets received on that shared channel. To make blind decoding easier, packets which are not announced on a shared control channel can only have one of four transmission formats (number of data bits) and are always modulated using QPSK. These restrictions are not an issue for performance since HS-SCCH-less operation is only intended for low bandwidth real time services.
The checksum of a packet is additionally used to identify for which terminal the packet is intended for. This is done by using the terminals MAC address as an input parameter for the checksum algorithm in addition to the data bits. If the terminal can decode a packet correctly and if it can reconstruct the checksum the packet is intended for the terminal. If the checksum does not match then either the packet is intended for a different terminal or a transmission error has occurred. In both cases the packet is discarded.
In case of a transmission error the packet is automatically retransmitted since the terminal did not send an acknowledgement (HARQ ACK). Retransmissions are announced on the shared control channel which requires additional resources but should not happen frequently as most packets should be delivered properly on the first attempt.
And for more on HSDPA and HSUPA
I hope that this introduction to Continuous Packet Connectivity (CPC) answers more questions than it raises. In case some fundamental things remain unclear consider taking a look at my book on mobile communication systems which covers HSDPA and HSUPA from the ground up.
Read More...
[Source: Martin's Mobile Technology Page]
Mobile Music Achievers Honoured (Scoop.co.nz)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Crisp Wireless Extends Local Content Strategy with Gannett, Bringing Local Newspapers, TV Stations onto Mobile Devices (Broadcast Newsroom)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Poker room fills the room (The Florida Times-Union)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Nokia Barges into Mobile Services (BusinessWeek)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Lost opportunities from SMS Messaging Reach $4.9 B Each Year
Continue.
Read More...
[Source: The Mobile Technology Weblog]
Wednesday, August 29, 2007
Web gambling firm ravaged by US ban (Guardian Unlimited)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
UPDATE: PartyGaming Shares Bounce Off Lows On Customer Growth (Nasdaq)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
PartyGaming says confident on prospects (Reuters.co.uk)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Presidential Elections - A Vote on Online Gambling (Online Casino Reports)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Distributive Networks and SinglePoint Report on Success of Obama Campaign Mobile Tool Application (PR Newswire via Yahoo! News)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Accused: 'I don't get no respect' (Toronto Sun)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
PartyGaming says confident on prospects (Reuters via Yahoo! UK & Ireland News)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
7 arrested after police raid alleged gambling houses (CTV.ca)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
PartyGaming says confident on prospects (Interactive Investor)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Teen Drivers: Time to Say Goodbye to Cellphones
Continue.
Read More...
[Source: The Mobile Technology Weblog]
Is Second Life Even worth Gambling In? (Online Poker News)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
OCZ Technology announces MicroSD Flash cards and adaptors (Press Release) (Addict 3D)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Bluetooth Gets A Major Security Overhaul In Version 2.1
The Bluetooth Special Interest group has recently published version 2.1 of their specification. While the press mostly writes about the new easy pairing mechanisms, 2.1 contains a complete security overhaul.
It looks like this has become quite necessary since two attacks are now known that can break the security of the pairing process. While encrypted Bluetooth transmissions are still secure, intercepting the initial pairing sequence allows a passive attacker that just collects packets to compute the PIN used by both devices. A further attack for which specialized equipment is required can force a Bluetooth device into re-pairing so an attacker does not have to be present during the initial pairing. In practice, re-pairing means entering the PIN again. Users thus do get a warning when somebody tries such an attack.
BT 2.1 changes the pairing process fundamentally and now offers the following modes in what the standard referrs to as "Secure Simple Paring":
Numeric Comparison Protocol: The major difference of this pairing scheme compared to what has been done before is that instead of a PIN, a pair of public/private keys is used by each device together with the Elliptic Curve Diffie-Hellman one way cryptography algorithm. Each device sends its public key to the other side which then uses it to encrypt a secret to be returned. Once the encrypted secret is received, it is decrypted by using the private key. The encryption/decryption only works one way so an attacker intercepting the communication cannot decrypt the secret and thus cannot generate the link keys that identify the devices later on. This kind of authentication and ciphering key generation is very similar to what is done today to protect web pages with SSL/TLS and certificates. To protect against a man in the middle attack the pairing procedure then continues and a 6 digit number is then calculated on both sides and shown to the user. The 6 digit number will only be identical on both sides if the conversation has not been tampered and hence ensures that no third device has intercepted and modified the pairing messages. (Note that a man in the middle attack is not possible in SSL/TLS since it uses a certificate authority and trusted certificates in the browser)
Just Works Protocol: The same as the Numeric Comparison Protocol described above but the 6 digit number calculation process is skipped. While offering no protection against an active man in the middle attack some devices do not have a display to show a 6 digit number. Thus, such a pairing should only be performed when the user can be reasonably certain that no attacker can be close by. The encryption whenever a connection is established later on, however, is not impacted by this weakness and thus even this protocol offers enough protection for most applications. It's also important to point out that the attacker has to be present each time the two devices start to communicate with each other as otherwise the connection establishment will fail.
Passkey Protocol: In this protocol a passkey (PIN) which has been entered by the user in both devices is used just as in the original Bluetooth specification. The way the PIN is used during the pairing process, however, is fundamentally different. Again public/private key pairs and random numbers are used by each device to generate the link keys. The PIN is just used to prevent a man in the middle attack as follows: For each bit a commitment message is generated by both devices by using a one way algorithm that takes the public keys of both sides, a random number generated individually by each side and the bit of the PIN to be committed as input parameters. Afterwards the commitments are exchanged between the devices. Once this is done, device A then sends the random number it has used to generate the commitment. This allows device B to verify that the commitment message was not tampered with. If the message was correct, device B sends its random number to device A so it can also check that the message was correct. For the following bit the order in which the random numbers are exchanged is reversed, i.e. device B has to send the random number first. A device in the middle can thus not forge commitments since it does not know the PIN and the random numbers are only exchanged after the commitment. Since commitments are given in an alternating fashion a device in the middle can only get one bit of the PIN from each side before it has to start guessing the value of the bit.
Out Of Band Protocol: And finally, Bluetooth 2.1 also allows using out of band exchange of security information such as via NFC (Near Field Communication) during the pairing process. This makes things even easier and more secure by only requiring two devices to come very close during the paging process. Both active and passive NFC is supported. In active mode, the NFC device is connected to the Bluetooth chip and can both transmit and receive authentication information. Some devices such as headsets do not have room for the extra NFC hardware. In such a case a passive NFC tag is used which could be attached to the manual or the box of the device. Pairing is then initiated by a device with an active NFC component which is held close to a passive NFC tag. The passive NFC tag then transmits all information required to start the pairing process.
Here are some links for the technical deep-dive:
Read More...
[Source: Martin's Mobile Technology Page]
Tuesday, August 28, 2007
MyxerTones(TM) Announces Industry's First Web-to-Mobile Advertising Program (Business Wire via Yahoo! Finance)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Orange Park poker room gets hearing (The Florida Times-Union)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
The new wireless playing field (America's Network)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Online Gambling's American Underworld (NPR)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Miami firm unleashes personalized avatars (Miami Herald)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Bluetooth Gets A Major Security Overhaul In Version 2.1
The Bluetooth Special Interest group has recently published version 2.1 of their specification. While the press mostly writes about the new easy pairing mechanisms, 2.1 contains a complete security overhaul.
It looks like this has become quite necessary since two attacks are now known that can break the security of the pairing process. While encrypted Bluetooth transmissions are still secure, intercepting the initial pairing sequence allows a passive attacker that just collects packets to compute the PIN used by both devices. A further attack for which specialized equipment is required can force a Bluetooth device into re-pairing so an attacker must not be present during the initial pairing. In practice, re-pairing means entering the PIN again. Users thus do get a warning when somebody tries such an attack.
BT 2.1 changes the pairing process fundamentally and now offers the following modes in what the standard referrs to as "Secure Simple Paring":
Numeric Comparison Protocol: The major difference of this pairing scheme compared to what has been done before is that instead of a PIN, a pair of public/private keys is used by each device together with the Elliptic Curve Diffie-Hellman one way cryptography algorithm. Each device sends its public key to the other side which then uses it to encrypt a secret to be returned. Once the encrypted secret is received, it is decrypted by using the private key. The encryption/decryption only works one way so an attacker intercepting the communication can not decrypt the secret and thus can not generate the link keys that identify the devices later on. This kind of authentication and ciphering key generation is very similar to what is done today to protect web pages with SSL/TLS and certificates. To protect against a man in the middle attack the pairing procedure then continues and a 6 digit number is then calculated on both sides and shown to the user. The 6 digit number will only be identical on both sides if the conversation has not been tampered and hence ensures that no third device has intercepted and modified the pairing messages. (Note that a man in the middle attack is not possible in SSL/TLS since it uses a certificate authority and trusted certificates in the browser)
Just Works Protocol: The same as the Numeric Comparison Protocol described above but the 6 digit number calculation process is skipped. While offering no protection against an active man in the middle attack some devices do not have a display to show a 6 digit number. Thus, such a pairing should only be performed when the user can be reasonably certain that no attacker can be close by. The encryption whenever a connection is established later on, however, is not impacted by this weakness and thus even this protocol offers enough protection for most applications. It's also important to point out that the attacker has to be present each time the two devices start to communicate with each other as otherwise the connection establishment will fail.
Passkey Protocol: In this protocol a passkey (PIN) which has been entered by the user in both devices is used just as in the original Bluetooth specification. The way the PIN is used during the pairing process, however, is fundamentally different. Again public/private key pairs and random numbers are used by each device to generate the link keys. The PIN is just used to prevent a man in the middle attack as follows: For each bit a commitment message is generated by both devices by using a one way algorithm that takes the public keys of both sides, a random number generated individually by each side and the bit of the PIN to be committed as input parameters. Afterwards the commitments are exchanged between the devices. Once this is done, device A then sends the random number it has used to generate the commitment. This allows device B to verify that the commitment message was not tampered with. If the message was correct, device B sends its random number to device A so it can also check that the message was correct. For the following bit the order in which the random numbers are exchanged is reversed, i.e. device B has to send the random number first. A device in the middle can thus not forge commitments since it does not know the PIN and the random numbers are only exchanged after the commitment. Since commitments are given in an alternating fashion a device in the middle can only get one bit of the PIN from each side before it has to start guessing the value of the bit.
Out Of Band Protocol: And finally, Bluetooth 2.1 also allows using out of band exchange of security information such as via NFC (Near Field Communication) during the pairing process. This makes things even easier and more secure by only requiring two devices to come very close during the paging process. Both active and passive NFC is supported. In active mode, the NFC device is connected to the Bluetooth chip and can both transmit and receive authentication information. Some devices such as headsets do not have room for the extra NFC hardware. In such a case a passive NFC tag is used which could be attached to the manual or the box of the device. Pairing is then initiated by a device with an active NFC component which is held close to a passive NFC tag. The passive NFC tag then transmits all information required to start the pairing process.
Here are some links for the technical deep-dive:
Read More...
[Source: Martin's Mobile Technology Page]
Customer calls (Agencyfaqs!)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Monday, August 27, 2007
Commercial Break (Online Casino Reports)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Vringo Bets on Video Ringtones (BusinessWeek Online via Yahoo! Asia News)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Nokia Launches 2nd Personal Navigation Device
Continue.
Read More...
[Source: The Mobile Technology Weblog]
Cell phones' role in an educational setting (The Citizen of Laconia)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
US student wins first leg in Asia Pacific poker tour (AFP via Yahoo! News)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Awaiting recount, gambling foes emboldened (Charleston Daily Mail)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
CPays Joins B4Playing Program (PRWeb via Yahoo! News)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Sunday, August 26, 2007
Tipping when playing Poker (Online Poker News)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
American wireless users are in a bind (The Indianapolis Star)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Free online resources can help teachers, students (The Springfield News-Leader)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Ex-Tatts chiefs to tell all (Herald Sun)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Saturday, August 25, 2007
Inc. Magazine Reveals Its 26th Annual List of America's 500 Fastest-Growing Private Companies (Marketwire via Yahoo! Finance)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
AT&T Expands Wireless Offerings for Customers With Disabilities (ThomasNet)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
84% of U.S. will have mobiles by year-end
One might ask how more than 100% of the population could have mobile phones and the answer is that certain "uber-connected" people will have multiple cellphone subscriptions. One might have their personal cellphone and a business line or just like to have multiple phones.
In fact, according to an article from last year, 30 countries had already exceeded 100% cell phone penetration and some countries, such as the UK, Sweden and Italy have already exceeded 110%!
Read More...
[Source: Mobile Phone Blog]
Salem officials make their pitch for video gambling (Eagle-Tribune Online)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Investors seek safety - Toronto Star
Investors seek safety Toronto Star, Canada - How did a growing number of defaults on subprime mortgages home loans to borrowers with weak credit histories lead to a global financial crisis? ... |
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
HACKED - iPhone unlocked; 17yr old genius

This was bound to happen, and it is exciting from a hackers point of view.
But for the rest of us who thought about bringing the iPhone TMobile, read this comment:
"The hack, which Hotz posted Thursday to his blog, is complicated and requires skill with both soldering and software. It takes him about two hours to perform."
Well, the software part is not too tough if you are comfortable running commands through a terminal/shell. But Soldering?? No thanks, I have seen the inside of an iPod, tiny parts with lots of room for error. Switching out a battery is a challenge, so I simply can't imagine taking a soldering gun to my $600 baby. AT&T it is!
Article on Yahoo
George's Blog with details
Read More...
[Source: Mobile Phone Blog]
Friday, August 24, 2007
If WiMAX Becomes a 3G (IMT-2000) Standard, What's Left for 4G?
Now that 3G systems such as UMTS are under full deployment, the industry is looking forward to what comes next. While some say that WiMAX is a 4G system, the IEEE and the WiMAX forum think that 802.16e is rather a 3G technology and have asked the ITU (International Telecommunication Union) to include this standard into its IMT-2000 specification (International Mobile Telecommunications 2000). This specification is generally accepted as being the umbrella defining which standards are to be considered 3G.
This is mainly a political move since in many regions of the world, frequencies are reserved for 3G IMT-2000 systems. If WiMAX were included in IMT-2000, and it looks like it will be in the near future, some frequency bands such as the 2.5 GHz IMT-2000 extension band in Europe could be used for WiMAX without changing policies.
So what remains for IMT-Advanced, the ITU umbrella name for future 4G technologies?
Currently there is still no no clear definition by ITU of the characteristics of future 4G IMT-Advanced systems. The ITU-R M.1645 recommendation gives first hints but leaves the door wide open:
It is predicted that potential new radio interface(s) will need to support data rates of up to approximately 100 Mbit/s for high mobility such as mobile access and up to approximately 1 Gbit/s for low mobility such as nomadic/local wireless access, by around the year 2010 [...]
These data rate figures and the relationship to the degree of mobility (Fig. 2) should be seen as targets for research and investigation of the basic technologies necessary to implement the framework. Future system specifications and designs will be based on the results of the research and investigations.
When WiMAX is compared to the potential requirements above it's quite clear that the current 802.16e standard would not qualify as a 4G IMT-Advanced standard since data rates even under ideal conditions are much lower.
3GPP's Long Term Evolution (LTE) project will also have difficulties fulfilling these requirements. Even with the recently proposed 4x4 MIMO, data rates in a 20 MHz carrier would not exceed 326 MBit/s. And that's already a long stretch since putting 4 antennas in a small device or on a rooftop will be far from simple in practice. If WiMAX is accepted as a 3G IMT-2000 technology, how can LTE with a similar performance be accepted as a 4G IMT-Advanced technology?
Additionally, one should also not forget that IMT-2000 systems such as UMTS are still evolving. UMTS is a good example. With HSDPA and HSUPA, user speeds now exceed the 2 MBit/s which were initially foreseen for IMT-2000 systems. But development hasn't stopped here. Recent new developments in 3GPP Release 7 and 8 called HSPA+, which will include MIMO technology and other enhancements, will bring the evolved UMTS technology to the same capacity levels as what is currently predicted for LTE on a 5 MHz carrier. HSPA+ is clearly not a 4G IMT-Advanced system since it enhances a current 3G IMT-2000 radio technology. Thus, HSPA+ categorized as a 'enhanced IMT-2000 system'.
Maybe that's the reason why the IEEE 802.16 working group is already looking forward and has started work on 802.16m with the stated goal of reaching top speeds of 1 GBit/s.
When looking at current research it's clear that the transmission speed requirements described in ITU-R M.1645 can only be achieved in a frequency band of 100+ MHz. This is quite a challenge since such large bands are few. Thus, I have my doubts whether these requirements will remain in place for the final definition of 4G IMT-Advanced.
Does It Really Matter If A Technology Is 3.5G, 3.9G or 4G?
While discussions are ongoing the best one can do is to look at HSPA+, WiMAX, LTE and other future developments as "Beyond 3G" systems. After all, from a user point of view it doesn't matter if a technology is IMT-2000, Enhanced IMT-2000 or IMT-Advanced as long as data rate, coverage and other attributes of the network can keep up with the growing data traffic.
A whitepaper produced by 3G Americas has some further thoughts on the topic.
As always, comments are welcome!
Read More...
[Source: Martin's Mobile Technology Page]
State cops get poker winnings (The Scranton Times-Tribune)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Use Your Camera Phone as a Scanner - COMOMBO

Very interesting idea, there have been times that I wanted this functionality in a pinch, like when you want to take a snapshot of a whiteboard that is about to be erased (and you cannot afford the cool whiteboards that electronically copy everything you write on it).
I am using a Samsung Blade cell phone (A900) on Sprint. The software is FREE for now.
I had to register an account first, and wait for an email. I would rather simply be able to download the application without waiting...I am sure they will lose people downloading the app during this process. I want INSTANT gratification...and while waiting for the email, I might forget to follow up and lost interest (which I almost did as three emails arrived while waiting for COMOMBO and I got sidetracked).
Ok, I am activated now, and back on the site. After activating, then logging in, I am directed back to the page with the three product offerings. The natural thing to do was click the 'Freeware' button, but that takes me back to registering?? Then I notice in the top navigation a 'download' link. Aha, maybe I need to go here. Note to COMOMBO, make it STUPID SIMPLE for your users to get your products.
At the download page, I can choose to have the software go to my PC, or type the URL directly into my phone, or have a SMS sent to me with the address.
I choose option 3, having a SMS sent to me. I am going thru the process, and I discover that only Nokia and SonyEricsson phones work. My Samsung Blade wont make the cut...well, I happen to have a SE z520. But, this phone is not listed. I choose the z610i, hoping it will work on my phone.
Text message is sent. COMOMBO doesnt seem to use a top notch SMS aggregator, as the SMS does not come in the first minute. SMS did not arrive within 10 minutes, so I am going to go right to the URL using my cell phone.
Again, no z520 listed, I select the z610i link and download the application (194kb). Application installs, but doesnt work. And, I realize the z520 has a crappy camera! Now I try with the Blade, even though its not supported. I chose the Nokia:E65 link and it failed. Tried the E70 next, and it too failed. Trying a SE link, model K550i link. Failed.
Basically, I am not able to try the software :^(. Hopefully I will get an email from them when my devices are supported.
Recommendations:
1. support more phones
2. auto detect phone make/model on WAP site
Read More...
[Source: Mobile Phone Blog]
Gambling machine orders not clear to local business owner (CentralOhio.com)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
New Mobile Game: Castlevania: Order of Shadows

Konami Digital Entertainment reinforced its commitment to the mobile games market today by announcing a new mobile game based on one of the companys legendary videogame brands - Castlevania. Featuring never-before-seen game play, storyline features and original music, Castlevania: Order of Shadows for the mobile platform will be available next month on most major carriers, including AT&T, T-Mobile and Verizon Networks.
As a worldwide leader in high quality, multi-platform videogames, Konami is looking to raise the entertainment standard of games for mobile phones, said Joe Morris, Vice President of Konami Mobile. Mobile technology has exploded, providing powerful new tools to enhance todays mobile gaming experiences. Konamis esteemed game developers will be creating original titles based on the companys top franchises including Castlevania, Metal Gear Solid Mobile, Contra and others.
IGN has an interview with the game's lead designer, Tyrone Rodriguez that you can read here.
This kind of commitment from leading publishers like Konami will help the awareness of mobile gaming and help drive this business significantly as gamers realize that they can have their favorite titles with them wherever they are.
Read More...
[Source: Mobile Phone Blog]
Digitial 'handcuffs' chafe wireless users (KARE 11 Minneapolis-St. Paul)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Matsushita Battery to Share Expenses on Recall of BL-5C Batteries
Continue.
Read More...
[Source: The Mobile Technology Weblog]
If you build it, they will come: Google sees big boost in mobile traffic (Ars Technica)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Thursday, August 23, 2007
Mobile Bicycle Computer Gets Java Verified Gold Signature of Quality (PRWeb via Yahoo! News)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
9 Squared and Univision Mvil Partner to Distribute Mobile Content (Marketwire via Yahoo! Finance)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Truckstop Gambling (WPSD Paducah)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Scientists contact Owls via Cellphones!
Continue.
Read More...
[Source: The Mobile Technology Weblog]
TV Out on the Nokia N95 - Part 6: The problems with TV Out, and how they could be solved (All About Symbian)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Handcuffs chafe wireless users (USA Today)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Mobile Bicycle Computer Gets Java Verified Gold Signature of Quality (PRWeb)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
UK Ban of Gambling Adverts from Questionable Territories (Online Poker News)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Double Down Stud Video Poker (Online Poker News)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Wednesday, August 22, 2007
Acision Launches Multi-platform Visual Voicemail
Continue.
Read More...
[Source: The Mobile Technology Weblog]
Myxer(TM) Platform Helps Bandvillage ''Mobilize'' Music (Business Wire via Yahoo! Finance)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Russian brothers acquitted of poker extortion (Newsday)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Qatar: Bluetooth-equipped Nokia 2760 launched (Zawya)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Asian ISP bets on gambling (Addict 3D)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Court sides with state in fight over Indian gambling (El Paso Times)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Luddites Prevailing in Mobile Phone Market (BWCS)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Asian ISP bets on gambling (Infomatics)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Tuesday, August 21, 2007
Survey: Mobile Users Spurn New Services (BusinessWeek)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Casinos Collect Jackpot on TV Spots (Online Casino Reports)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Poor Customer Service "Killing" Wireless Users
Continue.
Read More...
[Source: The Mobile Technology Weblog]
Court deals setback to gambling plan (Houston Chronicle)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Dennis the Menace Goes Mobile
Continue.
Read More...
[Source: The Mobile Technology Weblog]
Appeals court sides with state in fight over Indian gambling (News 8 Austin)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
CGC introduces bluetooth-equipped Nokia 2760 camera phone (AME Info)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
World Poker Tour(R) Bets on Casino-With CryptoLogic (Marketwire via Yahoo! Finance)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Appeals court sides with state in fight over Indian gambling (News 8 Austin)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Shopping with cell phones (The Buffalo News)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Monday, August 20, 2007
Sicap AG: Swisscom Customers Get Easy Content Transfer on Sicap and Futuredial Technologies (FinanzNachrichten)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Mobile users yearning for the simple life (Silicon.com)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Blowing the whistle on sports gambling (Sarasota Herald-Tribune)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
ADD YOUR VOICE (Long Beach Press-Telegram)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Homerisms can be taken a bit too far (Seattle Times)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Gambler at Indiana casino wasn't betting on soiled seat (Hattiesburg American)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Saturday, August 18, 2007
WVNCC graduates first poker dealers (The Steubenville Herald-Star)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Consumers Still Annoyed with Mobile Ads
Continue.
Read More...
[Source: The Mobile Technology Weblog]
A (WiMAX) world without SIM cards
A recent blog entry of mine on WiMAX terminals with and without support of EAP-SIM and thus SIM cards for authentication has provoked a number of interesting responses. What I take away from them is that first devices will probably not have a SIM card.
So the next logical question is how authentication is done in the absence of a SIM card!? I can see two basic approaches:
1. A device comes with a built in certificate. That's straight forward. The user goes to a shop, buys a device, it gets activated for him and he's set. While this is all nice and well the trouble starts when the device breaks or the user wants to use the services of another operator. No way with this model.
2. Another model would be to use a username and password to be supplied by the user. It could work in a similar fashion as with Wireless LAN today. I can also imagine user installable certificates. While both being a bit more complicated then pre-installed certificates it would preserve the flexibility the SIM card approach offers today.
I like and depend on flexibility since I travel a lot and a device locked to a single network is useless for me. While I am certainly not the average user I am sure the majority would prefer openness over being locked into a single garden.
If you have further information on this topic, please leave a comment.
Read More...
[Source: Martin's Mobile Technology Page]
AT&T Launches Mobile Backup Application
Continue.
Read More...
[Source: The Mobile Technology Weblog]
Dates: IBC Conference: Thursday 6th - Monday 10th September 2007 (InfoBolsa)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Markets (August 17) (The Hindu)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Domino's Offers Pizza by TXT in UK
Continue.
Read More...
[Source: The Mobile Technology Weblog]
Business Briefings Place Mobile Multimedia Trends in Spotlight at IBC 2007 (Broadcast Newsroom)
Read More...
[Source: Yahoo! News Search Results for mobile technology and ringtones]
Mobile Social Networking to Reach 3B by 2012
Continue.
Read More...
[Source: The Mobile Technology Weblog]
Friday, August 17, 2007
Product Review - Mobile ecards from AmericanGreetings.com

I just tried out American Greetings new mobile ecard service.
It is a web-to-mobile greeting card service where customers can send specially designed e-cards to mobile phones on major US wireless carriers.
The service is in beta (which means it doesn't work perfectly) but it's available on their site so I decided to try it out.
In order to use the service, you must register at AmericanGreetings.com and sign up for the 30 day "trial" period. After the trial period, a membership costs $14.00 per year. I didn't take the time to research all of the membership benefits but for about $1 a month I figured it was worth a shot.
Once you register, you're now able to send mobile ecards for free. They have a pretty limited selection right now - 11 birthday greetings and 10 "just because" greetings.
You can preview and personalize the greeting and then select 1) send to a phone or 2) send to an email address. By selecting send to a phone, you then input the recipients mobile phone number, sender's name, sender's mobile phone number and a brief mobile ecard message.
You then hit send your ecard and the message is sent to the recipient. A couple of notes on the service up to this point:
1) Mobile ecards can only be sent to mobile phones using one of the following carriers: Verizon Wireless, Sprint, Cingular, and Cellular One. Not sure why T-Mobile isn't on the list yet but I'm sure they're coming. Of course, most people don't know who their recipient's carrier is, so American Greetings allows you to verify the recipient's mobile number by doing a carrier look-up. This is a great feature and I'd suggest they move this up in the "order path" to alleviate any consumer frustration. If you've gotten to this point and are ready to send a birthday greeting and then find out your friends phone is not compatible, you've wasted a fair amount of time.
2) Characters typed in "sender's name" and "mobile message" both count toward a 28 character limit which gets displayed in the SMS message. I assume this is a technical requirement but it can be limiting.
I first tried sending an ecard to my phone - a Samsung ZX10 on AT&T - and the service worked great. I received a message from shortcode 28309 with a link to view the ecard. The card was optimized for the screen but unfortuntaely there was no sound. I'm unclear if this is a known issue.
I then tried sending another card to my sister-in-law who has a Samsung SCH-U740 on Verizon. I used the compatibility verification tool and it said the phone was compatible but unfortunately it didn't work. The good news is that she did receive something that told her I had sent a message and I also received an email message that said "The delivery of your mobile ecard to XXX-XX-XXXX was unsuccessful."
I'm painfully familiar with how difficult this business is, so having the service work pretty well 1 out of 2 times is not surprising. Clearly more testing needs to be done, but with some more work this service could be very useful and fun. Now that I am a subscriber, I will be using the service and will be excited to see how it improves over the coming months.
Read More...
[Source: Mobile Phone Blog]
Betting on video gambling (Daily Breeze)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]
Don't glamorize gambling (The Acorn)
Read More...
[Source: Yahoo! News Search Results for gambling and poker]