All about the new SCMAD Certification Exam

All about the new SCMAD Certification Exam

by: Whizlabs Software


The mobile market is envisioned as the next technological wave by leading industry experts. With approximately 150 million mobile phones – roughly 3 times the user base as that of desktop computers – it might well be the case. Due to the fragmented nature of the mobile market, with various manufacturers competing to get their share of the pie, Java is once again poised to be the best programming language for the mobile market with its Write Once, Run Anywhere technology.

The specifications around the Java for Wireless Technology initiative have been proposed and backed by most of the leading mobile phone manufacturers (Nokia, Sony Ericsson, Siemens, TMobile, to name a few) and hence, one can expect device support and continued innovation.

The Java 2 Platform, Micro Edition (J2ME) offers a highly optimized virtual machine which can be used to run Java applications on devices ranging from resource constrained devices like smart cards, pagers, and mobile phones to high end devices like handheld computers and settop boxes.

Keeping the limitations of the mobile devices – both in size and in memory – in mind, the Java Community Process has developed a series of standards constructed in a modular fashion to ensure that various features are standardized while keeping the architecture at an abstract level.

While the J2ME itself includes a lot of other features and is also not limited to mobile phones, the certification concentrates on the developer’s ability to create and install programs for mobile devices, such as cell phones and Personal Digital Assistants (PDAs).

You might want to consider taking this exam

If you are already into writing J2ME applications for mobile devices and want to be recognized for your skills.

If you are a developer who has already written a few programs for wireless devices, the preparation will give you indepth knowledge of various concepts.

If you are a seasoned J2SE/J2EE developer and want to start writing highly optimized Java applications for mobile devices, this certification is a jumpstart for achieving the same.

If you do not have too much of an idea about technologies like Wireless Programming or Game Programming, preparing for this certification will be a great incentive to get a foothold in this technology.

If you want to learn and master the cuttingedge technologies that are round the corner.

This article will provide a basic understanding of the scope of the certification and will also give details about the certification along with the useful resources to get started.

What you need to know?

The Sun Certified Mobile Application Developer (SCMAD) tests the developer’s knowledge in the following five specifications.

Java Technology for the Wireless Industry (JTWI 1.0) JSR185

Connected, Limited, Device Configuration (CLDC 1.0/1.1) JSR030/JSR139

Mobile Information Device Profile (MIDP 2.0) JSR118

Wireless Messaging API (WMA 1.1) JSR120

Mobile Media API (MMAPI 1.1) JSR135

Exam Information


You should have passed the Sun Certified Java Programmer (SCJP) – any version – to appear for this exam.


Details of the certification objectives can be found at the Sun website. The major objectives are

JTWI (JSR 185) and Overview / JTWIcompliant Wireless Applications

CLDC 1.0/1.1

Security (both CLDC and MIDP)


Application Model/ Delivery/Lifecycle/Provisioning

MIDP Persistent Storage

Push Registry



Media using MIDP 2.0 and the Mobile Media API 1.1 (MMAPI)

Wireless Messaging API 1.1 (WMA)

Passing Score & Time

The exam consists of 68 questions, and the pass percentage is 55%. The time allotted for the exam is 150 minutes. The fee for the exam is $150 for U.S. candidates and might vary for other countries. Please visit the Sun certification website for more details.

What you need to do?

This exam might be slightly tougher than the other exams since the technology is fairly new and the community support is limited.

Since the API set is relatively small, you can cover the topics quickly. On an average, it should take you around a week to cover each topic if you are familiar with Java and have written or attempted to write a few programs using J2ME. If you are new to wireless programming, you might want to allocate around 23 months (2 hours a day at least) for preparation.

To prepare for the exam, it we recommend that you do the following:

Download the Java Wireless Toolkit (2.0 or above).

If you have a J2ME enabled cell phone, download the toolkit from that vendor. For example, Nokia and Sony provide free toolkits and emulators that will help you program in those devices.

Download the PDF versions of the specifications mentioned above.

The best way to get an idea about wireless programming is to actually write some programs and deploy them to a cell phone. This will go a long way in your preparation, since the creation and delivery of wireless applications is quite different from that of the standard or enterprise applications. You should develop at least one program for each specification to get a feel of the API. Some of the programs you might want to develop are

A program that takes a name and prints out “Hello ” (tests the UI API)

A simple game or a drawing, like the traditional Paddleball game or various geometric shapes moving in the screen (tests the Game API)

A program to read an image off a website and display it on the phone (tests networking)

A ‘signed’ Hello World! Application (tests security)

A program that plays a simple tune (tests MMAPI)

A program that displays a text message (tests WMA)

A program that calculates tip for various predefined scenarios (tests RMS)

To understand the concepts of J2ME programming, you can read the official J2ME tutorial, which is very comprehensive. Some useful books are also listed in the resources section.

Most of the questions will be codebased and hence, it is very important that you understand how the code is structured for various specifications.

You might want to consider purchasing the SCMAD exam simulator by Whizlabs, which contains numerous questions of varying difficulty levels spread across five mock exams and a quiz and also lots of useful tips for the exam.

Assuming that you have Whizlabs SCMAD Exam Simulator, {available at} you can use the table below as a starting point for developing your preparation timeline.

Week Objective Notes

0 Diagnostic Exam Gives you a feel of what to expect

1 CLDC 1.0/1.1 Basics of the VM and its requirements

2 Application Lifecycle/Provisioning Basics of MIPD and its requirements

34 MIDP UI API Develop and deploy Program 1 after this

5 Networking Develop and deploy Program 3 after this

6 MIDP Persistent Storage Develop and deploy Program 7 after this

78 MIDP Game API Develop and deploy Program 2 after this

9 MMAPI Develop and deploy Program 5 after this

10 WMA Develop and deploy Program 6 after this

11 Push Registry Small, but complicated, and is related to WMA

11 Security Helps in packaging applications securely

12 JTWI Gives an understanding of how the technologies are tied together

12 Mock Exams Test your preparation. Revise weaker sections.

Finally, you can take some mock exams to prepare yourself from a certification standpoint.

Tips and pitfalls

Understand the conceptual difference between a J2ME configuration (like CLDC) and a J2ME profile (like MIDP).

Memorize the software and hardware requirements of the various specifications.

Memorize the class hierarchies of important APIs like Generic Connection Framework, High level and low level UI API, Media classes of MIDP 2.0 and MMAPI 1.1.

The exam tests the understanding of the features and differences between low level and highlevel API for UI programming. So, learn them well.

Understand that differences between the media support of MIDP 2.0 and the MMAPI 1.1.

Apart from the knowledge of writing proper J2ME code, the exam also tests the ability to write valid Java Application Descriptor (JAD) and manifest files that are used to markup the deployment details of an application. So, practice writing the descriptors well and deploy the application in the toolkit to understand the behavior of various deployment tags.

Remember that the exam is a vendor neutral exam. So, you can safely ignore learning the vendor APIs (like the APIs provided by Nokia, Sony Ericsson, and so on).

The best reading material for this exam is the specification document. So, allot enough time to go through these documents and learn the concepts and API well.

Make sure what you read is relevant to the exam objectives. A common pitfall is reading and spending time on things that you may not require for the exam.

As mentioned earlier, try to develop a practical example for each concept as this will help in a better understanding of the concepts.


With a huge customer base and vast popularity, wireless devices are here to stay. As the wireless technology improves and as the next generation devices come into the market with increased bandwidth, the demand for interactive and featurerich wireless applications will greatly increase. Having a knowhow of wireless programming will give you a competitive edge and will prepare you for the future.


J2ME tutorial by Sun Microsystems, Inc. provides a comprehensive list of preparatory resources for the certification exam.

Exam notes by Sathya Srinivasan, to get you started on the certification


Whizlabs SCMAD Certification Forum

SCMAD trail at JavaRanch (You might also want to visit the J2MEtrail)


Wireless Java: Developing with J2ME by Jonathan Knudsen

Wireless J2ME Platform Programming by Vartan Piroumian

J2ME: The Complete Reference by James Keogh

Enterprise J2ME: Developing Mobile Java Applications by Michael Juntao Yuan

Exam Simulators

There are many ways to prepare for certification exams, one of them being through the use of exam simulators. With these you cannot just identify your weak areas, but also get a feel of the test environment.

Whizlabs has launched worlds’ firstever SCMAD (J2ME Certification) exam simulator {available at}that ensures your success in the exam with its highquality mock tests and quick revision tips for the exam.

About The Author

Whizlabs (, an ISO Certified company, is a leading provider of IT skill assessment and certification exam preparation tools. Whizlabsก suite of offerings include กIT Certification Exam simulators and Instructorled, Online Trainingsก for various exams by Sun, IBM, Oracle, Microsoft, BEA, Cisco, and other leading IT vendors and กIT skill Assessment Management Solutionก for Corporations, Training Institutes, and Universities.

In its first 3 years of inception Whizlabs has helped 300,000 software professionals in realizing their dream of acquiring IT Certifications of their interest.

Whizlabs offerings have fuelled the career growth of IT professionals working in 321 Fortune 500 companies spread in 118 countries across the globe.

The author can be contacted at [email protected]

*First Published at Whizlabs’ site.

This article was posted on August 03, 2004

by Whizlabs Software

The security risks and ways to decrease vulnerabil

The security risks and ways to decrease vulnerabilities in a 802.11b wireless environment

by: Richard Johnson


This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from happening. Wireless networks have not been around for many years. Federal Express has been using a type of wireless networks, common to the 802.11 networks used today, but the general public has recently just started to use wireless networking technology. Because of weak security that exists in wireless networks, companies such as Best Buy have decided to postpone the rollout of wireless technology. The United States Government has done likewise and is suspending the use of wireless until a more universal, secure solution is available.


What is Wireless?

Wireless LANs or WiFi is a technology used to connect computers and devices together. Wireless LANs give persons more mobility and flexibility by allowing workers to stay connected to the Internet and to the network as they roam from one coverage area to another. This increases efficiency by allowing data to be entered and accessed on site.

Besides being very simple to install, WLANs are easy to understand and use. With few exceptions, everything to do with wired LANs applies to wireless LANs. They function like, and are commonly connected to, wired Ethernet networks.

The Wireless Ethernet Compatibility Alliance [WECA] is the industry organization that certifies 802.11 products that are deemed to meet a base standard of interoperability. The first family of products to be certified by WECA is that based on the 802.11b standard. This set of products is what we will be studying. Also more standards exist such as 802.11a and 802.11g.

The original 802.11 standard was published in 1999 and provides for data rates at up to 2 Mbps at 2.4 GHz, using either FHSS or DSSS. Since that time many task groups have been formed to create supplements and enhancements to the original 802.11 standard.

The 802.11b TG created a supplement to the original 802.11 standard, called 802.11b, which has become the industry standard for WLANs. It uses DSSS and provides data rates up to 11 Mbps at 2.4 Ghz. 802.11b will eventually be replaced by standards which have better QoS features, and better security.

Network Topology

There are two main topologies in wireless networks which can be configured:

Peertopeer (ad hoc mode) – This configuration is identical to its wired counterpart, except without the wires. Two or more devices can talk to each other without an AP.

Client/Server (infrastructure networking) – This configuration is identical to its wired counterpart, except without the wires. This is the most common wireless network used today, and what most of the concepts in this paper apply to.

Benefits of Wireless LANs

WLANs can be used to replace wired LANs, or as an extension of a wired infrastructure. It costs far less to deploy a wireless LAN than to deploy a wired one. A major cost of installing and modifying a wired network is the expense to run network and power cables, all in accordance with local building codes. Example of additional applications where the decision to deploy WLANs include:

Additions or moves of computers.

Installation of temporary networks

Installation of hardtowire locations

Wireless LANs give you more mobility and flexibility by allowing you to stay connected to the Internet and to the network as you roam.

Cons of Wireless LANs

Wireless LANs are a relatively new technology which has only been around since 1999. With any new technology, standards are always improving, but in the beginning are unreliable and insecure. Wired networks send traffic over a dedicated line that is physically private; WLANs send their traffic over shared space, airwaves. This introduces interference from other traffic and the need for additional security. Besides interference from other wireless LAN devices, the 2.4 GHz is also used by cordless phones and microwaves.

Security Issues of WLANs


Wardriving is a process in which an individual uses a wireless device such as a laptop or PDA to drive around looking for wireless networks. Some people do this as a hobby and map out different wireless networks which they find. Other people, who can be considered hackers, will look for wireless networks and then break into the networks. If a wireless is not secure, it can be fairly easy to break into the network and obtain confidential information. Even with security, hackers can break the security and hack. One of the most prevalent tools used on PDAs and Microsoft windows devices is, Network Stumbler, which can be downloaded at Equipped with the software and device, a person can map out wireless access points if a GPS unit is attached. Adding an antenna to the wireless card increases the capabilities of WiFi. More information can be found at: and to name a few.


Warchalking is a method of marking wireless networks by using chalk most commonly. Wardriving is usually the method used to search for networks, and then the person will mark the network with chalk that gives information about the network. Some of the information would include, what the network name is, whether the network has security, and possibly the contact information of who owns the network. If your wireless network is Warchalked and you don’t realize it, your network can be used and/or broken into faster, because of information shown about your network.

Eavesdropping & Espionage

Because wireless communication is broadcast over radio waves, eavesdroppers who just listen over the airwaves can easily pick up unencrypted messages. These intruders put businesses at risk of exposing sensitive information to corporate espionage. Wireless LAN Security – What Hackers Know That You Don’t Copyright 2002

Internal Vulnerabilities

Within an organization network security can be compromised by ways such as, Rouge WLANs (or Rouge Aps), Insecure Network Configuration, and Accidental Associations to name a few.

Rouge Access Points – An employee of an organization might hook up an access point without the permission or even knowledge of IT. This is simple to do, all a person has to do is plug an Access point or wireless router into an existing live LAN jack and they are on the network. One statistic in 2001 by Gartner said that, ขat least 20 percent of enterprises already have rouge access points.ข Another type of attack would be if, someone from outside the organization, enters into the workplace and adds an Access Point by means of Social Engineering.

Insecure Network Configurations Many companies think that if they are using a firewall or a technology such as VPN, they are automatically secure. This is not necessarily true because all security holes, big and small, can be exploited. Also if devices and technologies, such as VPNs, firewalls or routers, are misconfigured, the network can be compromised.

Accidental Associations – This can happen if a wireless network is setup using the same SSID as your network and within range of your wireless device. You may accidentally associate with their network without your knowledge. Connecting to another wireless LAN can divulge passwords or sensitive document to anyone on the neighboring network. Wireless LAN Security – What Hackers Know That You Don’t Copyright 2002

Social Engineering – Social Engineering is one of the most effective and scariest types of attacks that can be done. This type of attack really scares me and can be done for many other purposes besides compromising security in wireless networks. A scenario: Someone dressed up as a support person from Cisco enters the workplace. The secretary sees his fake credentials and lets him get pass the front desk. The impersonator walks from cubicle to cubicle, collecting user names and passwords as he/she goes. After finding a hidden corner, which seems to be lightly traveled, he plugs an insecure Access Point into the network. At the same time he configures the Access Point to not broadcast its SSID and modifies a few other settings to make it hard for the IT department to find this Rouge Access Point. He then leaves without ever being questioned by anyone because it looks like he just fits in. Now, all he has to do is be within 300 feet from the access point, (more if he added an antenna), and now has access to all kinds of secure documents and data. This can be a devastating blow to any corporation and could eventually lead to bankruptcy if the secrets of the company were revealed to competitors.

Bruce Schneier came to my classroom and said the following about Social Engineering, ขSomeone is just trying to do their job, and be nice. Someone takes advantage of that by targeting this human nature. Social Engineering is unsolvable.ข

Securing Wireless Networks

According to Bruce Schneier and others such as Kevin Mitnick, you can never have a totally secure computing environment. What is often suggested is to try and control the damage which can be done if security is breached. One can try many different tools on the market which can help prevent security breaches.

WEP – WEP supports both 64 and 128bit keys. Both are vulnerable, however, because the initialization vector is only 24bits long in each case. Its RC4 algorithm, which is used securely in other implementations, such as SSL, is quite vulnerable in WEP. Http:// Wireless Insecurities By Dale Gardner. Different tools exist to break WEP keys, including AirSnort, which can be found at Although this method is not a secure solution, it can be used to help slowdown an attacker if other means are not possible financially or otherwise.

VPN and IPSec IPSec VPNs let companies connect remote offices or wireless connections using the public Internet rather than expensive leased lines or a managed data service. Encryption and authentication systems protect the data as it crosses the public network, so companies don’t have to sacrifice data privacy and integrity for lower costs. A lot of VPNกs exist on the market today. An important note about VPNs is, interoperability does not really exist, and whatever you use for your server has to be the same brand as your clients most of the time. Some VPNs include:


BroadConnex Networks



Computer Associates

DMZ – Adding this to your network enables you to put your wireless network on an untrusted segment of your network.

Firewalls – Firewalls are all over the place. Firewalls range from hardware to software versions. By adding a firewall between the wireless network and wired network helps prevent hackers from accessing your wired network. This paper doesn’t go into specifics about different firewalls and how to set them up, but there are many. Some of the firewalls include:

ZoneAlarm (an inexpensive based software firewall)

Symantec has many different firewalls depending what you require.

PKI Publickey infrastructure (PKI) is the combination of software, encryption technologies, and services that enables enterprises to protect the security of their communications and business transactions on the Internet. What is PKI?

Site Surveys – Site Surveys involve using a software package and a wireless device to probe your network for Access Points and security risks.

Proactive Approaches

Since wireless technology is insecure, companies or anyone can take a proactive approach to try and identify hackers trying to gain access via wireless networks.

Honeypots – are fake networks setup to try and lure in hackers. This enables administrators to find out more about what type of techniques hackers are using to gain access. One product is Mantrap created by Symantec.

ขManTrap has the unique ability to detect both host and networkbased attacks, providing hybrid detection in a single solution. No matter how an internal or external attacker tries to compromise the system, Symantec ManTrapกs decoy sensors will deliver holistic detection and response and provide detailed information through its system of data collection modules.ข

Intrusion Detection – Intrusion Detection is software that monitors traffic on the network. It sounds out a warning if a hacker it trying to access the network. One such free product is Snort.

ขBefore we proceed, there are a few basic concepts you should understand about Snort. There are three main modes in which Snort can be configured: sniffer, packet logger, and network intrusion detection system. Sniffer mode simply reads the packets off of the network and displays them for you in a continuous stream on the console. Packet logger mode logs the packets to the disk. Network intrusion detection mode is the most complex and configurable configuration, allowing Snort to analyze network traffic for matches against a user defined rule set and perform several actions based upon what it sees.ข

Network Monitoring Network Monitoring would be products such as snort that monitor the flow of traffic over the network.

Quick tips and tricks

When setting up wireless networks and access points there are a few quick steps that can be taken to immediately secure the network, even though it does not make it secure. Some of these ways include:

Change your default SSID: each router or access point comes with a default SSID. By changing this it can take longer for an attacker to know what type of device he is trying to hack.

Change the default password – generic default passwords are assigned to access points and routers. Sometimes the password is admin. By changing this password, the attacker cannot modify settings on your router as easily.

Disable broadcasting SSID: By default APกs broadcast their SSIDs, if you shutoff this setting it is harder for outsiders to find your AP.

Enable MAC filtering: WARNING: this can only work in smaller environments where a centralized access list does not need to be maintained. You can enable only specific wireless cards to access the AP by only enabling those MAC addresses.

Turn off shares: If security is important, scanning for shares and turning off the shares on the network can help. Also encrypting sensitive data can prevent hackers from accessing the data.

Put your wireless access points in a hard to find and reach spot.

Keep your drivers on all wireless equipment updated. This helps patch existing security vulnerabilities.

Read current press releases about emerging wireless news.

About The Author

Richard J Johnson

Network+ Certified

RJ Computer Consulting

[email protected]

This article was posted on February 24, 2003

by Richard Johnson

Google Wireless Search Away From Home

Google Wireless Search Away From Home

by: Jakob Jelling

For so many web surfers, itกs almost automatic to type in to our address bar when we want to search. So big and wellknown is Google that many browsers have a builtin search box or typed shortcut for Google searches. In fact, we tend to associate Google with search so much now that the word itself is commonly used as a verb, as in กlet me Google thatก. Itกs much the same as BandAid, Kleenex, and Xerox, where the brand name is so pervasive that itกs very often substituted for the generic function of the item the brand is applied to. We’re used to searching from home, where weกve had Internet access for years now. But Google Wireless search is also available for use from Internetready cell phones and some wireless PDA devices such as PalmOne and Palm VII.

To search from Google Wireless, you will need access to the Internet through your wireless device. This can usually be arranged through your cellular carrier if you don’t already have it. You can search the กmobile webก, which is a collection of web pages that have been designed specifically for wireless devices. With Google Wireless search, you can also search all of Google, and the search results will be translated into a type of display language that your mobile device can interpret.

On a cell phone, searches are performed using the keypad on the phone and GNS, or Google Number Search. This is a form of search input that Google has developed to help make your wireless searches easier and faster. On PDAs, you can use the builtin keyboard or touchscreen keyboard. For the Palm VII, you will need to download special software to access Google Wireless search.

By Jakob Jelling

About The Author

Jakob Jelling is the founder of Visit his website for the latest on planning, building, promoting and maintaining websites.

This article was posted on October 11, 2004

by Jakob Jelling

Shopping from your cell phone with Froogle Wireles

Shopping from your cell phone with Froogle Wireless

by: Jakob Jelling

Many surfers already know about Froogle, Googleกs shopping portal that is still in beta testing. Google has now expanded their Froogle service so that it is available on WMLenabled cellular phones. Most newer cell phones that can connect to the Internet have this capability.

Users just need to enter in their cell phone browser, enter their product search terms, and scroll through results to find what they’re looking for. The biggest advantage of this Froogle Wireless feature for consumers is the ability to comparison shop, no matter where they are.

Most people who have shopped on the Internet know you can often find significantly lower prices online if you are willing to wait for shipment. The problem in the past was that it was difficult to comparison shop between virtual merchants and brick & mortar stores.

As an example, when most of us are shopping at our local computer store, and notice they have blank CDs on sale, our first instinct is to stock up because the price looks so good by comparison to their regular price. But with an Internetready cell phone and Froogle Wireless, you would be able to search Froogle right from the store, and compare blank CD prices from online merchants with the sale price at the store. Taking into account shipping costs, whether you need the CDs immediately, and local sales taxes, you can then make an informed decision as to the true value of the sale price.

Since Froogle and Froogle Wireless are both in beta testing, some nicetohave features such as sorting by price aren’t yet available. This can be a problem when using a slower connection over a cell phone, but keep an eye out for improvements Froogle Wireless will likely help you save money in realtime very soon!

By Jakob Jelling

About The Author

Jakob Jelling is the founder of Visit his website for the latest on planning, building, promoting and maintaining websites.

This article was posted on September 29, 2004

by Jakob Jelling

Securing Your Wireless Home Network

Securing Your Wireless Home Network

by: Rick Rouse

Do you have a wireless network installed in your home? Chances are that you do. If so, did you know that hackers might be using your Internet connection without your knowledge or consent?

Itกs called กDriveBy Clickingก and it is becoming more and more popular all the time. Here is how it works:

A hacker drives through a residential neighborhood with a laptop computer equipped with a wireless network adapter. If a wireless router isn’t configured for secure communications the hackerกs laptop can detect the signal, stop his car, and access the Internet using the unsuspecting homeownerกs Internet connection.

He can send spam emails (potentially getting the homeowner in trouble) and even access sensitive information on the hostกs computer. Scary stuff, huh?

If you have a wireless router you can protect yourself with these tips:

Place your wireless router in a location that is as far away from the street or the closest neighborกs house as possible.

Change your routerกs password from the factory default (which most กcompetentก hackers are familiar with) to a new one.

If you have file sharing enabled on your PC be surer to activate password protection.

Enable encryption (WEP) in your routerกs configuration settings.

Be alert for clues that someone else is using your Internet Connection or home network. These include excessive Internet traffic through your cable or DSL modem (the data lights will flash more than usual) and a sluggish PC with lots of unsual hard drive activity.

Taking the time to secure your wireless network from cyberintruders could save you lots of headaches and losses (monetary and otherwise) in the future.

About The Author

Rick Rouse is the owner of RLROUSE Directory & Informational Resources ( Submit your URL to RLROUSE Directory and all of our partner sites for only 29.95!

This article was posted on January 06

by Rick Rouse

Smartphones Beyond Voice to Information and Ente

Smartphones Beyond Voice to Information and Entertainment

by: Sam Subramanian

Smartphones are poised to become the information center and entertainment device of choice. Increasing adoption and usage of smartphones bodes well not only for smartphone makers but also for the wireless industry as a whole.

Investments in shares of wireless technology companies and wireless service providers have been particularly profitable in the postdot com era. The wireless industry is in a sweet spot of the technology space. Bountiful business opportunities exist as wireless usage continues to increase in both developed and emerging markets. And driving this usage higher are new products such as smartphones whose capabilities are being augmented by the deployment of third generation (3G) wireless networks.

FeatureRich Smartphones.

Smartphones are more than mobile phones. A smartphone is a mobile phone with builtin functions of a personal digital assistant. Smartphones pack a diverse range of features and functionalities into the handset that makes them a mobile information center and entertainment device for the user.

Smartphones commonly include features such as web browsing, email, and multimedia capabilities. Certain models have enough horse power to run complex software applications such as enterprise customer relationship software and car navigation programs.

A fullfeatured QWERTYtype keyboard, MP3 player, and Geo Positioning Systems capability are becoming common among higherend smartphones. Instant messaging is a cool feature making its way into the mainstream.

Smartphones, A Growing Segment of the Handset Market.

Smartphones represent a small, yet rapidly growing, segment of the handset market. According to Strategy Analytics, smartphone sales at 17.5 million units in 2004 accounted for 3% of the worldwide sales of 684 million handsets. However, this represents a significant jump from the 8.2 million units sold in 2003.

The demand for smartphones is projected to grow rapidly in the coming years. By 2009, the number of smartphone units sold is estimated to reach 125 million or 16% of total handset sales worldwide. This implies a 48% compound annual growth rate in smartphone unit shipments over the 20042009 period.

Smartphone Early Adoption Led by Asia and Europe.

Adoption of smartphones has been particularly rapid in Asia and Europe. The aggressive deployment of advanced wireless networks in these regions has encouraged early adoption of smartphones.

The Asia Pacific region currently accounts for about 37% of global smartphone sales with South Korea and Japan being leaders in smartphone usage. The European market accounts for 27% of global smartphone sales. Analysts expect smartphone sales in Europe to exceed sales in the Asian market in the coming years. North America’s market share in smartphone sales was expected to reach 25% by the end of 2004.

Nokia, the 800 lb. Gorilla of Smartphones.

Nokia (NYSE: NOK) is by far the dominant global smartphone manufacturer. The Finnish company is currently estimated to command half to twothirds share of the global smartphone market.

Nokia recently introduced its featurerich Nokia 7710 smartphone in Europe and Africa. The widescreen Nokia 7710 smartphone includes a full Internet browser, an integrated music player, a camera with 2x digital zoom, and a FM radio. One of the nifty features of the Nokia 7710 smartphone is its ability to make weblogging mobile. Users can post pictures and text from the Nokia 7710 smartphone directly to the web through the ‘moblog’ client.

Nokia is also expected to introduce the Nokia 3230 smartphone in the first quarter of 2005. The Nokia 3230 smartphone features a video recorder and ‘Movie Director’ that will allow 1 hour of video to be captured.

Nokia is now increasingly looking at software licensing deals to help differentiate itself from its competitors. Nokia has recently signed licensing deals with Macromedia and RealNetworks. Nokia is also said to be working on handsets that will receive wireless television feeds.

Smartphone Investment Implications.

The increasing adoption of smartphones augurs well not only for Nokia but also for other smartphone manufacturers like palmOne (Nasdaq: PLMO) and Research In Motion (Nasdaq: RIMM). palmOne recently introduced the GSM edition of its Treo 650 smartphone. Research in Motion recently released the latest model in its BlackBerry 7100 series, the 7100g.

The incorporation of additional features and functionalities that make smartphones the portable information center and entertainment device of choice has bullish implications beyond just manufacturers of smartphones.

Wireless service providers like Vodafone (NYSE: VOD) should see their average revenue per user being buffeted with increasing use of valueadded services that smartphones enable.

Then too, the increasing adoption and usage of smartphones will require the rollout of 3G wireless networks in earnest, translating into business opportunities for wireless network equipment providers such as Ericsson (Nasdaq: ERICY).

Notes: This report is for information purposes only. Nothing herein should be construed as an offer to buy or sell securities or to give individual investment advice. This report does not have regard to the specific investment objectives, financial situation, and particular needs of any specific person who may receive this report. The information contained in this report is obtained from various sources believed to be accurate and is provided without warranties of any kind. AlphaProfit Investments, LLC does not represent that this information, including any third party information, is accurate or complete and it should not be relied upon as such. AlphaProfit Investments, LLC is not responsible for any errors or omissions herein. Opinions expressed herein reflect the opinion of AlphaProfit Investments, LLC and are subject to change without notice. AlphaProfit Investments, LLC disclaims any liability for any direct or incidental loss incurred by applying any of the information in this report. The thirdparty trademarks or service marks appearing within this report are the property of their respective owners. All other trademarks appearing herein are the property of AlphaProfit Investments, LLC. Copyright © 2005 AlphaProfit Investments, LLC. All rights reserved.

About The Author

Sam Subramanian, PhD, MBA is Managing Principal of AlphaProfit Investments, LLC. He edits the AlphaProfit Sector Investorsก Newsletter™, a publication that discusses investments using Fidelity mutual funds. For the 5 year period ending December 31, 2004, during which the Dow Jones Wilshire 5000 Total Market Index declined 6.9%, the AlphaProfit model portfolios increased by up to 186.2%, an average annual return of 23.4%. To learn more about AlphaProfit and to subscribe to the FREE newsletter, visit

This article was posted on February 19

by Sam Subramanian

Where on Earth is your Websitee?

Where on Earth is your Websitee?

by: Robert McCourty

Youกve just finished congratulating your marketing team. After six months of concentrated effort you can now actually find your own company web site within the search engines. Everyone is busy handshaking and back patting when a voice from the back of the room rises above the din. กYeah this is great! Can’t wait until we can find ourselves on wireless devices.ก

All conversation comes to an abrupt halt. Eyes widen. Everyone turns to the freshfaced intern standing in the corner with a can of V8 juice in one hand and a PALM device in the other. You, being the Department Manager, barely managing to control your voice not to mention your temper, ask the now nearly frozen with panic intern, กWhat do you mean find ourselves on wireless? We just spent thousands on our web site visibility campaign!ก กWell… Explains the sheepish intern, ‘there is no GPS or GIS locational data within our source code. Without it, most wireless appliances won’t be able to access our site.ก

Guess what? The intern is absolutely correct. Anyone interested in selling goods and services via the Internet will soon be required to have some form Geographic Location data coded into your web pages. There are approximately 200 satellites currently orbiting the Earth. (even Nasa won’t confirm the exact number) Some are in geosynchronous or geostationary orbit 27,000 miles above your head. The Global Positioning System (GPS) is the name given to the mechanism of providing satellite ephemerides (กorbitsก) data to the general public, under the auspices of the International Earth Rotation Service Terrestrial Reference Frame (ITRF). Sounds like Star Wars doesn’t it? Itกs pretty close. The NAVSTAR GPS system is a satellitebased radionavigation system developed and operated by the U.S. Department of Defense (DOD).

The NAVSTAR system permits land, sea, and airborne users to determine their threedimensional position, velocity, 24 hours a day, in all weather, anywhere in the world, with amazing precision.

Wireless devices, WAP, Cellular, SATphones and a whole host of newly emerging appliances and indeed, new software applications, will all utilize some form of GPS or more likely GIS data retrieval. GIS stand for Geographic Information System and relies on exact Latitude and Longitude coordinates for location purposes.

Several car manufacturers currently utilize GPS for onboard driver assistance and the Marine and Trucking Industries have been using it for years. Obviously your web site is a stable beast. It sits on a server somewhere and doesn’t move much, so at first glance it seems quite unplausible youกll need GIS Locational Data within your source code. On the contrary. One aspect your web site represents is your businessกs physical location(s) and if people are going to try to find your services and products, shouldn’t you at the very least, tell them where it is and how to get there?

Letกs look at it from the other end of the spectrum. The end user approach. Letกs say you’re vacationing in a new city for the first time. Once you get settled into your Hotel room, whatกs the first thing you want to find? Restaurants? Bank machines? Stores? So you pull out your handheld, wireless, device, log onto the web and search for กItalian Food in San Francisco.ก Five Hundred results come back so you click the new กlocationก feature on your handheld (which knows exactly where you are) and ten Italian restaurants, who were smart enough to code their web sites with GIS data, light up on the screen. Guess which restaurants didn’t get selected? The other four hundred and ninety. Starting to get the picture?

How does this affect you and your web site marketing? GIS Latitude and Longitude coordinates will soon be a must have on every web site operators and web developerกs list and an absolute necessity for anyone wishing to trade good and services via the Internet. This data may relate to the physical location of the web site or where the site is being served from (if applicable) or where the actual business represented by the site is physically located. There may be multiple web site locations and coding involved, if for example, you have a franchise with multiple locations, each location will probably need a page of itกs own with the correct corresponding location data.

If you run a homebased business, I doubt if the coordinates to your living room are going to be necessary, but you should provide the latitude and longitude of the closest city or town. Large corporations such as banks may want to code the exact location of every automated teller machine across the country.

Industry standards and the methods of serving out this data are still in the development phases but itกs a safe bet to assume there are plenty of people working on the solutions right now and given the speed of technology, implementation will probably be much sooner than later. Give yourself an edge. Find out where in the world your web site is…before your web site is nowhere to be found.

About The Author

Robert McCourty is a founding partner and the Marketing Director of Metamend Software and Design Ltd., a cutting edge search engine optimization (SEO) and web site promotion and marketing company. Scores of Metamend Client web sites rank near or on top of the search engines for their respective search terms.

[email protected]

This article was posted on November 27, 2003

by Robert McCourty

Recycling Mobile Phones

Recycling Mobile Phones

by: S. Housley

Recycle Cell Phones
Technological advancements providing users with improved reception through integrated antenna systems, reduced size and weight of cell phones, along with numerous feature sets, and storage improvements have caused the bulk of cellular phone users and enthusiasts to upgrade to new and improved handsets. The low cost of cell phones and the added technological improvements mean that the majority of cellular phone users are on their 2nd or 3rd generation hand set.
Environmental Concerns
What many don’t realize is that in many cases, the materials used to construct cell phones are toxic. Toxic elements found in many of todayกs cell phones can include arsenic, in semiconductors and lead in the solder material. While the materials in a single phone are minimal consider the number of discarded cell phones in the relatively short time the technology has been available. The placement of these devices in landfills will cause long lasting damage and harm to the environment.
Recycling aged wireless equipment is a sensible alternative. Valuable materials can be recovered from used wireless devices in a number of different ways. In some cases, certain components may be separated by manual or simple mechanical means. The components can often be reused or melted down for alternative uses.
Cell Phone Disposal What Options Exist?
Cell Phone Disposal What Options Exist? The cell phone industry, understanding concerns related to the disposal of cell phones and PDAs have created alternatives to both refurbish and recycle the materials in older style cellular phones.
Wireless Recycling ReCellular Inc. is the largest recycler and reseller of used wireless phones and accessories in the wireless industry. A pioneer in charitable recycling arrangements, ReCellular has wellestablished partnerships with Easter Seals, the March of Dimes, and National Organization on Disability, Goodwill Industries, and The Body Shop. In addition, over 2,000 grassroots organizations from Boy Scout troops to religious organizations around the country work to collect wireless phones to support their philanthropic efforts. Charities can raise funds by increasing community awareness and acting as a wireless collection center.
Wireless Foundation Wireless Foundation refurbishes and provides cell phones to victims of domestic violence so that they can be used in the event of an emergency. The Call To Protect campaign also collects wireless phones to benefit victims of domestic violence. Proceeds from the sale of phones help fund agencies that fight domestic violence and are used to support educational efforts of the Wireless Foundation. Other phones are refurbished and become lifelines for domestic violence victims when faced with an emergency situation.
Recycle Wireless Phones Cellular Telecommunications & Internet Association (CTIA*) and its member companies are committed to the goal of sustainable development and the environmentally sound management of their wireless products at endoflife. Through its Wireless . . . The New Recyclable program, CTIA is educating the public on the options available for properly recycling used wireless devices. The program seeks to promote the collection of used wireless devices and ensure that collected wireless products will be managed properly. The site provides a directory of collection options.
AT&T Wireless Through the AT&T Wireless Reuse & Recycle program, consumers are invited to bring unwanted wireless phones, accessories and batteries (regardless of the manufacturer or carrier) to an AT&T Wireless retail store for recycling. AT&T Wireless is the first wireless carrier to partner with Keep America Beautiful, a nationally recognized nonprofit organization that focuses on waste impact minimization, litter prevention, beautification, community improvement and improvement of public places. Proceeds from the recycling of wireless phones, batteries and accessories are donated to Keep America Beautiful.
Call2Recycle RBRC’s Call2Recycle™ program collects used cellular phones to benefit the environment and charitable organizations. With the help of consumers and 30,000 participating retail locations, RBRCกs do their part in helping to keep cell phones out of the landfills.
HopeLine The HopeLine phone recycling program is an exclusive program that uses wireless services and equipment to assist victims in emergency domestic violence situations. HopeLine collects wireless phones that are no longer being used. The used phones are either refurbished and recycled or sold. With the funds raised from the sale of the refurbished phones, Verizon Wireless purchases wireless phones and donates airtime to victims of domestic violence through human services and law enforcement agencies.

About The Author

Sharon Housley manages marketing for NotePage, Inc. a company specializing in alphanumeric paging, SMS and wireless messaging software solutions. Other sites by Sharon can be found at, and

This article was posted on July 08, 2004

by S. Housley

Prepaid Wireless: Is It Right For You?

Prepaid Wireless: Is It Right For You?

by: Edwin Mazanke

Just about every leading mobile phone provider now offers some sort of prepaid calling plan in order to fit their customersก budgets. But is is right for you?

The first question youกll need to ask yourself is how often youกll use your wireless phone?

Since the biggest benefit of a prepaid wireless phone is there is no monthly contract, youกll pay a little more for the prepaid minutes you purchase. But if you plan on using your phone strictly on an asneeded basis for emergencies, etc., a prepaid wireless program could be just what you’re looking for.

The biggest mistake most people make when choosing to go prepaid is not reading the กfine printก of the providersก terms and conditions.

In most cases, the prepaid minutes you purchase will expire after a certain period of time, usually two or three months down the road. What this means is, if you buy 300 minutes today and fail to purchase more minutes anytime during the next few months, the unused portion of those 300 minutes will be unuseable!

This is sort of a convenient way to force you to keep on purchasing minutes even if you don’t actually need them.

Another thing to watch out for is a daily minimum. Many providers will charge you $1.00 for each day you use your wireless phone. So if you get a prepaid wireless phone with the intention of making one twominute call every day of the month, in addition to using 60 minutes of airtime, some providers will also charge you an additional $30 for the month, since you used the phone all 30 days.

Not a very good deal.

Out of all the prepaid wireless deals out there, TracFone seems to have the most competitive prices and terms of service. Although TracFone minutes expire after three months unless you purchase additional minutes (just like all the other companies), they also have a oneyear activation service which is perfect for people just needing a wireless phone for emergency purposes. The deal changes from month to month, but usually provides for one year of activation, without requiring you to purchase additional minutes for a whole year. Thus, your monthly cost should average about $8.00 and youกll have a wireless phone with a few hundred minutes that will be good for the whole year.

The choices seem endless, but it pays to educate yourself about prepaid wireless phone plans.

About The Author

Edwin Mazanke

For more information on prepaid wireless phones and service, visit

This article was posted on September 05

by Edwin Mazanke

Wireless Networking Basics

Wireless Networking Basics

by: Lana Hampton

Wireless networking is simple in theory: just install a wireless network adapter in each computer and forget about drilling holes and running cable. When you deal with equipment based on the 802.11b (or WiFi) standard, unfortunately, the reality often falls short of claimed specifications. Your wireless network will have a limited range youกve probably experienced a decrease in speed at a certain distance from an access point. Thatกs why you must adjust the location and configuration of your wireless setup to obtain the best possible performance, range, and reliability. Follow expert advice and your connection will be faster across longer distancesand youกll have fewer dropped connections.
Pick the best location: The farther your wireless networked computer is from a wireless access pointand the greater the number of solid objects that stand in the waythe slower your connection will be. To optimize your networkกs speed and range, position your wireless access point at least a few feet above the floor and away from metal objects, particularly large appliances like refrigerators. Though most manuals for networking products tell you to position the access point in the middle of the coverage area, itกs often better to identify the locations where you expect to use a computer and put the access point where it will be in a direct line of sight (or close to it) to as many of those places as possible.
Don’t waste time worrying about กdead spotsก if no one is likely to use a computer there. Once your wireless network is up and running, even slight changes in your wireless network cardกs position (say, a shift in the orientation of your laptop as you recline on the couch) may dramatically improve throughput or even restore a dropped connection.
For larger areasor areas with many obstructionsyour only option may be to shell out the cash for multiple access points. If you go this route, youกll find that wireless setup is easy: Simply make sure that the access points have identical settings. Virtually all wireless network adapters support กroamingก: In areas where access point coverage overlaps, the adapter will latch on to the strongest signal.

About The Author

Lana Hampton makes it easy to find the right wireless product for your needs. Visit today for the latest wireless information.

This article was posted on August 02

by Lana Hampton

WiFi vs. WiMax

WiFi vs. WiMax

by: Dennis Schooley, BBA, CA

WiFi vs. WiMax – Wi Do I Care?

Wi Fi Fo Fum, I think I smell the blood…oops wrong tale. This story doesn’t involve giants, but it does involve giant leaps forward in technology that will affect us all.

The other day I was watching two kids play. Each had a tin can up to their ear and they were speaking to each other on the ‘phone’. Talk about technological leaps. Yes, the string that I used as a kid to hook up this intricate communication system had disappeared, and they were now wireless!

When I was Batman back then, the string always kept me close enough to Robin so we could hear each other, even around the corner of a cinder block wall. Unrestricted by ‘the magic string’ these kids tended to drift out of range from time to time. Showing true genius, they engaged Billy’s little brother to position himself on middle ground, and he relayed wireless messages back and forth. They called him ‘tower’. I laughed.

It really is a reflection of a changing world. We’ve gone from HiFi to WiFi, and next on the endless chain is WiMax. The transition from ‘High Fidelity’, which simply related to sound quality, to ‘Wireless Fidelity’ or WiFi, took about thirtyeleven years. The transition to WiMax is already in play, yet most of us haven’t figured out what WiFi is really all about.

According to the ‘Webopedia’, the term is promulgated by the WiFi Alliance, and is short for Wireless Fidelity as I indicated above. What it means is that you can access the Internet from a laptop computer with the right stuff (wireless card) in various locations without the burden of a physical wire.

Hold it – Webopedia? Yikes! Yes, it’s real, and it defines and explains web ‘stuff’. I guess Babe Ruth probably thought that Encyclopedias were on the bleeding edge, yet I wrote my 7th grade essay all about him using that standard, great source of knowledge. Makes you wonder what ‘pedia’ is next doesn’t it?

It goes on to say that any products tested and approved as WiFi certified (a registered trademark) by the WiFi Alliance are certified as interoperable with each other, even if from different manufacturers.

That’s kind of like Fords & Toyotas use the same gas to make them go, and their owners use the same ramps and highways to pick up milk, or go to the cottage. Even Hudson Hornets used a leaded version of the same fuel.

An example where this wasn’t so well planned is the access to the electricity grids in Europe as opposed to North America. The same plugs don’t work in both places.

Rather than making that mistake, the Alliance has created an accepted standard so that manufacturers create equipment, and the like, that can be used in a similar fashion to access the web. That means that your laptop, regardless of brand, will use the same ‘hotspots’ to get access. Hotspots are areas where the facility, like Starbucks or the hotel that owns the lobby, has put in the proper equipment to provide access from your wireless card to the great big cloud called the Internet. The wireless card is the gas for the Fords & Toyotas, and the hotspot is the on ramp.

And therein lie both the beauty and the problem. The beauty is that I can access the web from Starbucks in Atlanta, as well as a hotel lobby in Vancouver. If you’ve ever seen someone doing the hippyhippy shake with their computer in their hands, you’re probably witnessing the problem. WiFi access is limited in both speed and distance. The twisting person was probably trying to get a more consistent signal in the ‘hotspot’.

Enter WiMax. That’s not Max Smart and his wireless shoe communications, but it is the next generation of WiFi. According to it ขwill connect you to the Internet at faster speeds and from much longer ranges than current wireless technology allows.ข They go on to say ขWiMax promises up to a ten mile range without wires, and broadband speeds without cable or T1.ข

The result – we are absolved from the penance of viewing way too many hippyhippy shakes. Well, not so fast, don’t throw out your dancin’ shoes quite yet. It’s not on the WalMart shelves for next Christmas, but there are a lot of indicators that it’s real, and it’s just around the corner.

First of all, it is an acronym for Worldwide Interoperability For Microwave Access, and it has actually been in the works for quite a while now. An article titled ‘FCC Move Could Boost WiMax’, states ขA number of vendors and carriers have announced products, testing, or support for the standard in the last month, including Intel, Nokia, AT&T, BellSouth, Sprint, and Motorola.ข These companies aren’t akin to Duke’s Pool Room – these are the big boys.

The article continues to say, ขCongress has been lobbied for months now to free more frequencies for wireless broadband.ข

AlcaTel states that WiMax will ขbridge the digital divide by delivering broadband in lowdensity areas.ข If you really study that statement, you can see where we are in the world today. Where governments once ensured that all residents were able to receive phone service in the Ma Bell days, that lingo is now being used in relation to broadband access to the Internet. May everybody have equal access is the refrain, but only if it’s high speed!

So instead of hotspot hopping, WiMax will provide true wireless mobility. And there’s more. In an article by Al Senia of America’s Network, he states that ‘Phone manufacturers such as Samsung and LG are expected to introduce WiFi handsets compatible with this service by year’s end.ข

O.K., so that’s VoIP, except it’s wireless VoIP in hotspots. Next is WiMax, with widearea wireless VoIP.

To be sure, there are quality and security issues to be resolved, whether that’s for surfing, voice applications, or a gazillion other Internet applications, before wider market acceptance is achieved. However, I attended a recent presentation by the Gartner Group, where the presenter stated emphatically that security is not an ‘if’ but rather ‘how much’. His meaning was clearly that the level of security required for business applications will be achieved, and that commercial providers will find the economic model that works. Ditto for quality.

We used to trade information at the speed of the Pony Express, when the air was just filled with farm smells. Now when the air is filled with zeros and ones, information is transferred at speeds faster than Clark Kent. If we’re to remain on competitive even ground, we had better pay attention to these applications that are on the horizon. We have to assume that our competitors are paying attention.

It took a century to transform from Alexander Bell’s basic invention to wireless phones. However, in the last decade alone, the Internet has met with wide acceptance by business, VoIP has become more common, WiFi and WiFi VoIP is now a reality, and WiMax and wide area wireless VoIP is very nearly on the market.

In the past, I’ve often used an example of future possibilities by alluding to a chip in our eyebrows that can transmit holographic images around the globe. That’s not even that farfetched anymore, so I guess I’ll have to come up with a better example. I’m going to have to track down the Jetsons and Star Trek reruns.

ขGrandpa, why is the sky blue?ข That’s always been a puzzler. What on earth are you going to say when the question is ขGrandpa, why is the sky zeros and ones?ข That’s when you ask yourself, ขWi me?ข

That begs another question. Where do all the zeros and ones go when they’re used up? Is there a big Z&O dump somewhere? Or should that be backwards – OZ. Oh, that Wizard, I knew he was up to something.

About The Author

Dennis Schooley, BBA, CA

Dennis Schooley is the Founder of Schooley Mitchell Telecom Consultants, a Professional Services Franchise Company. He writes for publication, as well as for and, in the subject areas of Franchising, and Technology for the Layman., 8883116477, [email protected].

[email protected]

This article was posted on September 07, 2005

by Dennis Schooley, BBA, CA

The Apple Mac mini It Fits Anywhere And It is Th

The Apple Mac mini It Fits Anywhere And It is The Most Affordable Mac Ever!

by: Bonnie Archer

Mac OS X, the worlds most advanced operating system! Just connect, plug, and your playing. The Apple Mac mini will work with either Mac or PCcompatible peripherals, this makes it easier than ever to upgrade from and older Mac or PC system. All you have to do is connect your USB mouse and keyboard, then hook up your DVI or VGA display (our adapter is included). Then just plug it in, turn it on and your ready to go.

Now this is power packed into a small package Apple has outdone themselves! Under the sleek anodized aluminum styling of the Mac mini is a G4 processor, room for up to 1GB PC2700 main memory, a Radeon 9200 graphics chip, and a large enough hard drive, up to 80 GB, to store todays digital media.

With the mini connections you can hookup your digital devices like cameras, iPod, printer, camcorder, and your keyboard. There is even a audio/headphone jack. You can customize this Mac with some great extra options after you select your Mac mini.

You have the choice to use your own keyboard and mouse or choose the Apple Wireless keyboard and mouse and free yourself from the clutter of cables. You will need the Bluetooth module and with it you will also be able to have wireless access to printers, cell phones, PDAs, input devices and other peripherals. Or add a AirPort Extreme Card and have the freedom of wireless networking from anywhere in your home. Although you must have these features added when ordering your Mac or they will have to be added by an authorized service provider because they are not userinstallable.

A slotloading SuperDrive added will let you play and burn both CDs and DVDs. So be sure to check out the most advanced, convenient, and affordable Mac in history!

Check It Out!!

About The Author

Bonnie Archer is a successful author and publisher of A great source of information about computers and computer accessories.

[email protected]

This article was posted on April 25

by Bonnie Archer