Friday, November 28, 2008

Developing and implementing .NET applications in Linux, Unix, Mac, etc. with Mono 2.0

Microsoft has been promoting their .NET application platform quite some years ago, and supporting the development of .NET applications with their Visual Studio development tools. They even introduced a new programming language named as C# targetting to the .NET frameworks.

If you have the impression that .NET applications can only run on MS Windows platforms, and that you can only develop .NET applications using Visual Studio in MS Windows, probably you are still not aware of Mono which frees up all the .NET developers and their applications to the rest of the world other than Microsoft, which includes Linux, Unix, Solaris, BSD, Mac OS X, etc.

Mono is an open source development platform based on the .NET framework, which allows developers to build Linux and cross-platform applications with improved developer productivity. Mono's .NET implementation is based on the ECMA standards for C# and the Common Language Infrastructure (CLI).

The Mono runtime contains a just-in-time (JIT) compilation engine for a number of processors including x86, SPARC, PowerPC, ARM, S390 (in 32-bit and 64-bit mode), x86_64, IA64 and SPARC for 64-bit modes.

The Mono project started in Ximian since 19 July 2001, which was about 7 months earlier than the release of Visual Studio .NET 2002 (first release of Visual Studio that supports .NET framework) by Microsoft. Ximian was a company that provided free desktop applications for Linux and Unix based on the GNOME platform, and has been acquired by Novell in 2003. Mono is currently sponsored, led and supported by Novell.

Mono version 1.0 was released in June 2004, one year after Visual Studio 2003 was released. Current version of Mono is 2.0.1, which is API complete in regards to .NET 2.0 and supports for Visual Basic.NET as well as C# versions 2.0 and 3.0.

Mono includes compilers, an ECMA-compatible runtime engine (the Common Language Runtime, or CLR), and many libraries. The libraries include Microsoft .NET compatibility libraries (including ADO.NET, System.Windows.Forms and ASP.NET), Mono's own and third party class libraries.Gtk#, a set of .NET bindings for the gtk+ toolkit and assorted GNOME libraries can be found in the latter. This library allows you to build fully native Gnome application using Mono and includes support for user interfaces built with the Glade interface builder. Furthermore, Mono's runtime can be embedded into applications for simplified packaging and shipping. In addition, the Mono project offers an IDE called MonoDevelop, Debugging, and a documentation browser called MonoDoc.

As an open source software, you can download, copy, distribute and use Mono for free. Here is the download page of Mono.

There are a lot of information about Mono in Wikipedia. There are also many resources and documentations about Mono in its official website.

TM revised Lets Talk packages to give more benefits

Recently, TM sent me a notice about the changes in their Let's Talk plans, which would replace the existing from 15 November 2008 onwards.

Here are the new Let's Talk packages:

Let's Talk 38

  • Monthly fee: RM38
  • Local calls: free unlimited
  • National (STD) calls to TM's fixed lines: free 60 minutes/month, thereafter 18 sen/min
  • Calls to mobile & other fixed lines: flat rate @ 25 sen/min
  • International (IDD) call: normal rate

Let's Talk 68

  • Monthly fee: RM68
  • Local calls: free unlimited
  • National (STD) calls to TM's fixed lines: free unlimited
  • Calls to mobile & other fixed lines: free 60 minutes/month, thereafter flat rate @ 25 sen/min
  • International (IDD) call: normal rate

Let's Talk 108

  • Monthly fee: RM108
  • Local calls: free unlimited
  • National (STD) calls to TM's fixed lines: free unlimited
  • Calls to mobile & other fixed lines: free 90 minutes/month, thereafter flat rate @ 20 sen/min
  • International (IDD) call: up to 80% discount. The discount is based on destination country.

Click here for information of the IDD normal and discount rate.

From the "2008 Q1 Communications & Multimedia - Selected Facts & Figures" bulletin published by the Malaysian Communications and Multimedia Commission (MCMC, a.k.a. Suruhanjaya Komunikasi dan Multimedia Malaysia - SKMM), we can notice that TM feels the challenge in sustaining their fixed line subcriptions, while the cellular phone subscription has been growing steadily.

I believe the declination in fixed line subscription could be even greater if not sustained by the Streamyx broadband service which relies on the fixed line infrastructure. However, the emergence of faster and more stable wireless Internet technologies such as 3G Mobile, Worldwide Interoperability for Microwave Access (WiMAX), High-Speed Downlink Packet Access (HSDPA), and so on, will definitely introduce new challenges to the fixed line business of TM.

It is good to know that TM realises their situation, and has taken some action to try to maintain their fixed line business which they have been dominated in the country.

You might probably also interested to read my other article about "is it wise to change your phone plan to Let's Talk?".

Thursday, November 20, 2008

Cellular phones penetration rate

10 years ago, you might find only 1 or 2 out of 10 people around you had a cellular phone. Today, the scenario has reversed, you can hardly find anybody around you without a cellular phone, especially those above 18 years of age.

The graph below shows the number of cellular service subscription in Malaysia over the years.

We can clearly see that prepaid subscription greatly outnumber postpaid subscription. The sum of them in 2007 is already very close to the population of Malaysia.

The graph above can be converted into the one below to show the enetration rate per 100 inhabitants in Malaysia.

As you can see, we have a penetration rate of 85.1% in year 2007, which is quite a high figure. Let's break down that figure by state, and we have the penetration rate in each state for year 2007 as below.

We have a high penetration rate in urban area, such as Kuala Lumpur, Selangor, Penang, etc. Melaka also has a high penetration rate of 85.5% by 2007. The penetration rate in East Malaysia (Sabah & Sarawak) is the lowest, probably caused by the lack of coverage of cellular network in rural areas there.

The next graph compares the penetration rate among ASEAN as well as some other countries. It is a very interesting graph.

In 2007, among the ASEAN countries, Singapore has the highest cellular penetration rate, followed by Malaysia and Thailand.

Notice that in certain places such as Singapore, Australia, Taiwan, UK, Hong Kong, etc., the cellular penetration rate has already gone above 100%. This mean that in those regions, there are quite a lot of people subscribed to more than one cellular number at the same time. Hong Kong has a really high penetration rate that out of 2 people on the street, you can probably find 3 mobile phones from them.

All raw data is obtained from the "2008 Q1 Communications & Multimedia - Selected Facts & Figures" bulletin published by the Malaysian Communications and Multimedia Commission (MCMC, a.k.a. Suruhanjaya Komunikasi dan Multimedia Malaysia - SKMM).

Wednesday, November 19, 2008

How many SMS did you send out last year?

According to data provided in the "Communications & Multimedia - Selected Facts & Figures" bulletin published by the Malaysian Communications and Multimedia Commission (MCMC, a.k.a. Suruhanjaya Komunikasi dan Multimedia Malaysia - SKMM), total amount of SMS sent out by cellular phones in Malaysia in 2007 is 56.8885 billion or 2,590 per subscription SIM card.

This means that on average, we sent out 7.1 SMS per day last year. If you sent out more than 7 SMS everyday, you are contributing more than average to the figure.

The graphs below show the growth of SMS amount sent over the years.

Assuming that each SMS is charged for 5 sen, this will be a hefty RM2.85 billion business for telco operator in 2007, which is still growing exponentially.

Tuesday, November 18, 2008

Simple way to confirm a long term trend reversal

The term "trend reversal" is very common in technical analysis for share, index, commodity, derivative, or other kind of securities. Technical analysis has many kind of complicated signals to catch the "trend reversal" based on price movement, trade volume movement, and/or the combination of both.

However, technical analysis might be too difficult to master for layman like you and me. The "simple way" that I'm going to discuss here is indeed a very simple way. It is so simple that can be described in the sentence below:

"A trend reversal is very possible if a bottomed price doesn't drop beyond its bottom made, or a topped price is unable to produce another record high."

You might want to question that what's so special with the above sentence, every Tom, Dick and Harry also know about it.

But I notice many people doesn't know how to apply this simple and straightforward sentence to their investment strategy.

Believe me, it is really as simple as that, and its accuracy is no worse than using technical analysis. Especially when looking for long term trend, it is particularly effective.

To apply this simple saying to your investment strategy, you need to determine the nature of your target. You need to find out from its historical record that, does it has high volatility with drastic price movement (high beta), or does it pretty stable with low beta?

Then, add in the time factor into the sentence by determining a suitable time period. Your sentence should now sound like this:

"A trend reversal is very possible if a bottomed price doesn't drop beyond its bottom made after X number of days, or a topped price is unable to produce another record high after X number of days."

If the beta is high, apply a larger X factor, otherwise, you may apply a smaller X factor. Your X should not be too large that it takes too long until every Tom, Dick and Harry also know the trend has reversed, as you will lose the opportunity to buy/sell at a less risky position.

A good X value for common stock is 1 month, which you need to adjust based on the volatility of your target. Beware that X would be of not much meaning if it is higher than 3 months.

Let's take an example. ICAP (5108) made a bottom on 29-Oct-2008 at the price of 1.15. Let's say you give it a 2 months period for your observation. Therefore, if by 29-Dec-2008, the price of ICAP is still all the way staying above 1.15, and there is no short term tendency sign for it to fall back to 1.15, you can predict that 1.15 made on 29-Oct-2008 is its bottom, and you can start accumulating it at the price near to its bottom.

Of course, this is just a simple and stupid method, which is not bullet proof. But it is a good method, because by the time your simple "signal" triggered with this method, you will notice that almost all the technical analysis indicators are pointing to a bullish position, since technical analysis is meant to sense the trend in a much faster timeframe. So, technically speaking, you are quite unlikely to be wrong, unless market affected by unforeseen sudden factor.

Disclaimer: This article is intended for sharing of point of view only. It is not an advice or recommendation to buy or sell any of the mentioned stock counters. You should do your own homework before trading in Bursa Malaysia.

Friday, November 14, 2008

Top 10 CIO priorities for 2009

Recently, the US National Association of State Chief Information Officers (NASCIO) released the US State CIO's Top Ten Policy and Technology Priorities for 2009 based on their annual survey done.

The lists has reflected the budgetary uncertainty faced by state governments in the face of an extended economic downturn. But by prioritizing their IT strategies, the lists can serve as a good reference and roadmap for ICT solution providers hoping to grow their US state government business.

The Top 10 Priority for Strategies, Management Processes and Solutions are:

  1. Consolidation: Centralizing; consolidating services, operations, resources and infrastructure.
  2. Shared Services: Business models, sharing resources, services and infrastructure.
  3. Budget and Cost Control: Managing budget reduction, strategies for savings, reducing or avoiding costs; activity based costing.
  4. Security: Security safeguards, enterprise policies, data protection and insider threat.
  5. Electronic Records/Digital Preservation/E-Discovery: Strategies, policies, legal issues, opportunities for shared services and emergency preparedness.
  6. ERP Strategy: Acquisition, implementation, expansion and upgrade.
  7. Green IT: Policies, energy efficiency, power management, green procurement and e-waste.
  8. Transparency: Open government, performance measures and data, and accountability.
  9. Health Information Technology: Assessment, partnering and implementation.
  10. Governance: Improving IT and data governance.

The Top 10 Priority for Technologies, Applications and Tools are:

  1. Virtualization: Storage, computing and data center.
  2. Document/Content/E-mail management: Active, repository, archiving and digital preservation.
  3. Legacy application: Modernization and upgrade.
  4. Networking: Voice and data communications and unified communications.
  5. Web 2.0: Services, collaboration technologies and social computing.
  6. Green IT: Technologies and Solutions.
  7. Identity and Access Management.
  8. Geospatial Analysis and Geographic Information Systems (GIS).
  9. Business Intelligence and Analytical Applications.
  10. Mobile Workforce Enablement.

I wonder if any similar survey has been done for government and corporates CIOs in our local region.

Thursday, November 13, 2008

Bill Clinton to give lecture in Malaysia

Great news! There is an opportunity to listen to the lecture of Bill Clinton (former president of US) in Malaysia, and the ticket will be given free of charge.

On 6 December 2008, Clinton will present the inaugural BC Sekhar memorial lecture organised by the Sekhar Foundation (founded by Datuk Vinod Balachandra Sekhar, president and founder of Petra Group) and the Asian Strategy & Leadership Institute (ASLI).

In that event, he will also receive the BC Sekhar Medal for Transformational Leadership, a new award given to individuals who have demonstrated a lifetime of commitment to bringing about positive change in the world. The medal would be awarded to Clinton for his tireless work to tackle the root causes of poverty in the world. Other factors included his steadfast commitment to foster understanding in divided communities and his determination to see people working together in friendship to bring about change.

Clinton will be in Kuala Lumpur for about 2 days right after the Clinton Global Initiative meeting in Hong Kong.

If you are interested in attending, just send an email to with your name, address, contact number and MyKAD or passport number from 1pm today (13 November 2008). Up to 500 members of the public will be given seats for the lecture.

Wednesday, November 12, 2008

Malaysian household monthly income distribution 2007

Today, there is a report in the Chinapress newspaper which provides us a set of figures about the Malaysian household monthly income distribution based on Household Income Survey (HIS) done in year 2007 by the Department of Statistics Malaysia. Here are the figures:

With the data above, we can derive the constituent of household by ethnic which has participated in the HIS 2007, as shown below. The percentage is pretty much in line with the ethnic group percentage of population of Malaysia.

And we can interprete the data in the table with a bar graph like this:

You can compare this graph with the one in my earlier article posted on 18 September 2008, which is based on data from a different source. With no surprise, they look very alike. The graph above is able to show more information. What can you see from it?

Remember there is another pie chart in my earlier article posted on 18 September 2008? You can compare it with this one which is based on our new set of data. They are pretty much the same, aren't they?

Now look at another graph to reveal more information. What can you see from it?

If you see each of the income group vertically, you can actually rank how each ethnic group performs for each of the income group. The Kadazan and Orang Asli have a big population in the lower income group, and very low percentage in the higher income group. Majority of the Chinese are in the 5k-10k income group.

You can also clearly see the "M shape" in the Chinese and Indian lines, and the formation of "M" in other ethnic groups can also be sensed.

What else can you see from the graphs above?

Satyam acquires Motorola software development center (SDC) in Cyberjaya

India's Satyam Computer Services Ltd, which is the 4th largest IT solutions and service provider and has its own building block in Cyberjaya Malaysia, has just initiated an acquisition to its Cyberjaya neighbour - the software development center (SDC) of Motorola in Malaysia.

On the recent Monday, the 128 staff in Motorola SDC were briefed about the acquisition, that all of them, together with the SDC’s assets, will be diverted from Motorola to Satyam by the end of the year. Anyhow, they are assured by the management that their contractual bonus for the year will not be affected.

The SDC is part of Motorola's Home and Network Mobility business and focuses on network management system development. After the acquisition, Motorola will outsource the business to Satyam and get the same level of service as before.

Both Satyam and Motorola are listed in New York Stock Exchange (NYSE). To date, Satyam has a staff strength of over 500 in Malaysia.

Monday, November 10, 2008

WPA Wi-Fi encryption cracked!

If you are using a wireless network, especially in office environment, you should be well awared that running Wi-Fi without any encryption is a big no-no, and that the depreciated Wired Equivalent Privacy (WEP) encryption is extremely weak and can be cracked within seconds. As such, you probably are using Wi-Fi Protected Access (WPA) encryption to protect your Wi-Fi from unauthorized access and/or information stealing/leaking.

But now, bad news is that 2 German researchers - Martin Beck and Erik Tews - have found a way to crack the Temporal Key Integrity Protocol (TKIP, which was supposed to fix all problems with WEP) of WPA encryption within minutes, and they are going to share their cracking tools to the public during the PacSec Conference in Tokyo this 12-13 November 2008. In fact, some of the code used in the attack was already quietly added into the Aircrack-ng Wi-Fi encryption hacking tool about two weeks ago.

In short: WPA is no longer secured!

So what can you do to safeguard the security of your wireless network? Ensure that your wireless access points and equipments support WPA2, and switch over to it. WPA2
implements the mandatory elements of IEEE 802.11i standard, and is still uncracked by now, if it doesn't make use of the TKIP, and is instead set to use Advanced Encryption System (AES) with its Cipher Block Chaining Message Authentication Code Protocol (CCMP).

Click here to read more about this new crack on WPA Wi-Fi encryption.

Hardening PHP security with Suhosin

Suhosin (수호신) is a Korean word that means “guardian-angel”, originally developed by Stefan Esser, a German developer who loves Korean language.

Originated from the Hardened-PHP project, Suhosin is an advanced protection system for PHP installations. It was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core.

There are 2 parts in Suhosin:

  • Patch to PHP that hardens the Zend engine to protect from possible buffer overflows and related vulnerabilities.
  • Standalone Suhosin extension module for PHP to provide many security features that are not present in PHP itself.
Both of them can work together, or the extension module alone can be used.

Some of the features of Suhosin are:
  • Logging of errors to syslog or arbitrary logfiles
  • Create blacklists and whitelists per virtual host
  • Filter on GET and POST requests, file uploads, and cookies
  • Transparent encryption of sessions and cookies
  • Set memory limits
  • ... and many more
If your web applications are developed in PHP, you should seriously consider installing Suhosin to harden its security. It is already included in most major Linux distributions. Search for "php5-suhosin" or "php-suhosin" in your Linux distribution to install it.

For more information about downloading and installing Suhosin, click here.

Securing Apache web with ModSecurity

If you are hosting your websites with Apache web server, which is mostly the case if your web server is running on Linux platform, you should seriously consider installing ModSecurity to provide intrusion detection and prevention for your web applications.

ModSecurity is an open source, free web application firewall (WAF) Apache module. According to Forrester Research, it is the most widely deployed web application firewall nowadays.

WAFs are deployed to establish an external security layer that increases security, detects and prevents attacks before they reach web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection, cross-site scripting, path traversal, etc.

Features of ModSecurity includes:

  • HTTP Traffic Logging - ModSecurity makes full HTTP transaction logging possible, allowing complete requests and responses to be logged.
  • Real-Time Monitoring and Attack Detection - ModSecurity can monitor the HTTP traffic in real time in order to detect attacks. In this case, ModSecurity operates as a web intrusion detection tool, allowing you to react to suspicious events that take place at your web systems.
  • Attack Prevention and Just-in-time Patching - ModSecurity can also act immediately to prevent attacks from reaching your web applications.

ModSecurity supports the following security models:
  • Negative Security Model - Looks for known bad, malicious requests. This method is effective at blocking a large number of automated attacks, however it is not the best approach for identifying new attack vectors.

  • Positive Security Model - When positive security model is deployed, only requests that are known to be valid are accepted, with everything else rejected. This approach works best with applications that are heavily used but rarely updated.

  • Virtual Patching - With ModSecurity, applications can be patched from the outside, without touching the application source code (and even without any access to it), making your systems secure until a proper patch is produced.

  • Extrusion Detection Model - ModSecurity can also monitor outbound data and identify and block information disclosure issues such as leaking detailed error messages or Credit Card Numbers, etc.

ModSecurity is included in all the major Linux distributions. Look for "libapache2-mod-security" or just "mod_security" in your Linux distribution to install it.

Click here for detailed documentations about ModSecurity.

Friday, November 7, 2008

Lower EPF contribution from 11% to 8% for 2 years from Jan 2009

Following an announcement made by Deputy Prime Minister and Finance Minister YAB Datuk Seri Najib Tun Abdul Razak during the winding up speech for the Ministry of Finance on the 2009 Budget on Tuesday 4 November 2008, the Employees Provident Fund (EPF, a.k.a. Kumpulan Wang Simpanan Pekerja, KWSP) has now made an official statement on the execution of this decision.

The reduction of the employees’ contribution to EPF from 11 % down to 8 % will be made automatically, effective from January 2009 until December 2010 wage. The employers' 12% contribution remains the same.

This means that if you don't explicitly inform EPF to maintain your 11% contribution as before, by January 2009 onwards, your contribution will be automatically reduced to 8% for the next 2 years. If you intend to maintain your 11% contribution, or any portion other than 8%, you have to inform your employer, as well as submit the "Form KWSP 17A (AHL) - Khas" to EPF office.

As at 31 December 2007, the total membership of EPF stood at 11.69 million. A total contributions amounting to RM28.93 billion were made during year 2007. Assuming the figure does not change too much in 2009 and 2010, a 3% reduction will mean (RM28.93 billion/23% x 3% x 2 years) = RM7.55 billion to be freed up for spending in the economy, in the optimistic case that all EPF contributors opt for the rate cut and don't maintain the 11% contribution rate by submitting the "Form KWSP 17A (AHL) - Khas".

This is not a high figure to stimulate the national economy, but it does facilitate a similar effect of lowering the bank interest rate, which is happening in many other nations right now. This also hints that the Malaysian government is trying hard to avoid an interest rate cut, which would probably further weakening the forex exchange rate of Malaysian Ringgit.

As an employee, this change in contribution rate means that if your monthly salary is RM2k, you will have an additional RM60 monthly disposible income; if your monthly salary is RM5k, then your figure will be RM150; and if your monthly salary is RM10k, it will be RM300.

Should you opt for the lower contribution rate, or should you submit the "Form KWSP 17A (AHL) - Khas" and maintain your normal 11% contributions? One thing to consider is that since the economic climate is not so favourable this year, we won't expect a good dividend payout by EPF to be announced.

I would say that it is not a bad idea to reduce your EPF contributions, and spend your money wisely to make more value from it. For example, you can use it for personal development (education, books, workshops, ...), investments, insurance, etc. just to name a few. However, if you think that you are not a wise person in money spending, you might want to opt for maintaining your 11% contributions to EPF as a form of "force saving".

What do you think?

Click here to download the "Form KWSP 17A (AHL) - Khas" for individual employee.

Click here to download the "Form KWSP 17AA (AHL) Khas" for employers who wish to apply on behalf of more than two employees.

Tuesday, November 4, 2008

Watch Honda ASIMO live in road tours

Honda ASIMO (アシモ), named after "Advanced Step in Innovative Mobility", is an intelligent multifunctional robot of 130cm tall with 54kg weight, made of magnesium alloy covered with plastic resin.

It is an innovative result from 22 years of R&D in Honda, showcasing their determination and belief in the Power of Dreams.

Today, ASIMO can run up to 6km/h and in circular pattern, walk at various speed up to 2.7km/h, climb stairs, and is able to recognise distance, position and details of people with Honda's IC Tag.

ASIMO can also perform the task of a receptionist, information guide or carry out delivery service using a tray or cart. It can also act in sync with people, for example, walking with you while holding your hands.

Eager to watch ASIMO in action? You can meet with him in the upcoming road tours as follow:

  • 14-16 Nov 2008 - New Wing, 1 Utama Shopping Centre, Selangor.
  • 20-23 Nov 2008 - City Square Shopping Centre, Johor Bahru.
  • 27-30 Nov 2008 - Queensbay Mall, Penang.
There will be exciting games, ASIMO prizes and limited edition of ASIMO goodies available during the road tours.

Click here to learn more about the wonders of ASIMO.

Sunday, November 2, 2008

Pairing Sony Ericsson P1i with HBH-PV710 bluetooth headset

Sony Ericsson HBH-PV710 is a mid-range bluetooth headset with 3 buttons, one for call handling, another 2 for sound volume control. It does not have fancy features such as automatic sound adjustment, background noise reduction, etc. However, for a retail price of only RM128, it is still a good pick and value for money.

It can share the same charger with my Sony Ericsson P1i handphone, as well as using the CDS-65 Desk Stand that comes along with P1i as its charger. Of course, it also comes with its own charger, which can also be used by P1i.

The printed user guide of HBH-PV710 is written in 4 languages, which the layout is quite inconvenient for the reader. The flow of document is also quite confusing. Therefore, I decided to reproduce the guide here in a more readable way, for my future reference and also for other HBH bluetooth headset users' reference. Here is it:

After purchase, before usage:

  • You need to charge up the bluetooth headset for 8 hours before usage.
  • In future, when you see the headset's red light is flashing, it is time for it to recharge.

First time usage:

  • Turn on the bluetooth function in your handphone.
  • Make sure the bluetooth of your handphone is visible to other devices.

  • Press and hold the "call handling" button of your bluetooth headset for 3-5 seconds, until you see the indicator light flashes red and green.
  • If the headset only flashes green, press and hold both the "volume control" buttons of your bluetooth headset for 3-5 seconds, until you see the indicator light flashes red and green.
  • Your handphone should now find the bluetooth headset, and lists it in its bluetooth device listing. Tap on it and connect to it. When passcode is asked, key in "0000".
  • The headset beeps and the indicator light flashes green when the pairing is successful. It is ready to use now.
  • To turn off the headset after use, press and hold the "call handling" button of your bluetooth headset for 3-5 seconds, until the flashing indicator light turns off.

Subsequent usage:

  • Turn on the bluetooth function in your handphone.
  • Turn on the bluetooth headset.
  • The pairing should occur automatically. Here are the screens of P1i before and after the pairing. Note that the bluetooth icon in the taskbar will change to headset icon when the headset is in use.

        Before pairing                            After pairing

Using the headset:
  • Answer incoming call - press the "call handling" button once.
  • Reject incoming call - press and hold the "call handling" button for about 2 seconds.
  • Making call - use your handphone to dial the number and talk with your headset.
  • Using voice command to dial, redial, answer and reject calls - record and enable voice commands in your phone. Say the "magic words" to your headset.
  • Transfer audio between headset and handphone - selection can be made on the phone.

Hint: Click on the "Older Posts" link to continue reading, or click here for a listing of all my past 3 months articles.