Saturday, January 5, 2008

Linux Phone Standards (LiPS)

Targets interoperability & marketability of Linux-based mobile phones through shared open standards and implementationsSOPHIA ANTIPOLIS, FRANCE, December 10, 2007—The Linux Phone Standards (LiPS) Forum today announced completion of the LiPS Release 1.0 specifications, fulfilling the commitment announced in June of this year. With this release, LiPS enables mobile industry players to achieve basic interoperability for applications and services deployed on Linux-based phones, benefiting Linux-based software stack suppliers, mobile device OEMs and regional and global telecom operators. These specifications include the LiPS Reference Model, Telephony, Messaging, Calendaring and Scheduling, Presence, User Interface Services, Address Book and Voice Call Enablers APIs.In contrast to recent announcements...

Tutorial on MIDI and Music Synthesis

IntroductionThe Musical Instrument Digital Interface (MIDI) protocol has been widely accepted and utilized by musicians and composers since its conception in the 1982/1983 time frame. MIDI data is a very efficient method of representing musical performance information, and this makes MIDI an attractive protocol not only for composers or performers, but also for computer applications which produce sound, such as multimedia presentations or computer games. However, the lack of standardization of synthesizer capabilities hindered applications developers and presented new MIDI users with a rather steep learning curve to overcome.Fortunately, thanks...

Perl, Sockets and TCP/IP Networking

An simplified introduction to socketsSockets are a mechanism that allows programs to communicate, either on the same machine or across a network. The way it works is pretty simple: Each machine on a network is identified by some address. In this tutorial we will talk about tcp/ip networking, so by network address we mean an IP address. (like 192.168.4.4) Apart from the IP address that specifies a machine, each machine has a number of ports that allow handling multiple connections simultaneously.A program that wishes to receive a connection from another program, asks the operating system to create a socket and bind it to some port. Then the program sits and listens on the socket it has created to receive incoming connections. The other program also creates a socket for communicating witht he...

Friday, January 4, 2008

Basic Concepts of SMS Technology

In the following sections, we will introduce to you some basic concepts of the SMS technology.1. Validity Period of an SMS MessagePreferences - Do not show adsAn SMS message is stored temporarily in the SMS center if the recipient mobile phone is offline. It is possible to specify the period after which the SMS message will be deleted from the SMS center so that the SMS message will not be forwarded to the recipient mobile phone when it becomes online. This period is called the validity period.Here is an example that illustrates how validity period can be used. Suppose you find a very interesting program that is showing on TV now. You think your friend may want to watch it. So, you send a text message to tell your friend about the TV program. Let's say the TV program lasts for an hour. Your...

Setting Mikrotik VPN / PPTP

PPTP Server :- Mikrotik OS 2.9.0 Stable (Latest Version)SERVER MIKROTIK :- CPU and motherboard : advanced 4th generation (core frequency 100MHz or more), 5th generation (Intel Pentium, Cyrix 6X86, AMD K5 or comparable) or newer uniprocessor Intel IA-32 (i386) compatible (multiple processors are not supported)- RAM :minimum 32 MiB, maximum 1 GiB; 64 MiB or more recommended- STORAGE medium :standard ATA/IDE interface controller and drive (not supported SCSI, USB controllers n drives, RAID controllers that require additional drivers) minimum of 64 Mb space; Flash and Microdrive devices may be connected using an adapted with ATA interface.NOTE : If your machine have SATA Drive, ensure that your Machine BIOS, support COMBINED / LEGACY mode at SATA CONTROLLER (ini pengalaman pribadi), klo enggak...

IIS Security Checklist

The following checklist is a summary of the security points which should be checked prior to bringing an IIS server online. In cases where these points are not followed, the admin may want to securely document the known security issues for referral should a security compromise occur.General assumptions:No IIS on a domain controllerInstall only services needed (ftp, www, smtp, nntp). Mailing out does NOT require smtp; use CDOSYS.DLL (a COM based method native to Windows) or a 3rd party executable like blat.exe for web applications that require outgoing mail.Virtual directories are NEVER used across servers.The underlying Windows OS has been secured.Only system administrators are local administrators.Design GuidelinesWebsites should NEVER be on the system drive.Setup SSL if transmitted information...