Solved

API and wap

Posted on 2001-09-18
6
250 Views
Last Modified: 2013-12-27
how to export data from an API interface to a WAP phone.
0
Comment
Question by:rprp1234
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 

Author Comment

by:rprp1234
ID: 6498804
if people couldnt able to understand my question, here i'm breifing..

i've an interface in an applicaton, say the page is an html page. in that html interface i've fields where the user will enter values when the user submits the values,
then the values should be sent to a respected user's wap device.

If any one knows how to do, or any links regarding this will be welcome.
kindly reply
0
 
LVL 44

Accepted Solution

by:
bruintje earned 50 total points
ID: 6498995
Hi rprp1234,

the wap faq's
http://www.wapforum.org/faqs/
http://www.devx.com/wireless/articles/WAP/WAPFAQ.asp

a bit overwhelming
http://directory.google.com/Top/Computers/Mobile_Computing/Wireless_Data/WAP/Forums_and_Resources/

also take a look at the wapalize site with it's tag reference etc....http://www.wapalize.co.uk/

basically what you're trying to do is nothing else then building a normal website, instead of the big user interface you're looking at a tiny one with a big constraint on resources of a few k per packet....

be sure to read up on the other end of the application here at the vbxml site
http://www.vbxml.com/wap/articles/wap_usability/default.asp

HTH:O)Bruintje
0
 
LVL 1

Expert Comment

by:Moondancer
ID: 6710030
Please update and finalize your open questions.

Thanks,

Moondancer
Community Support Moderator @ Experts Exchange
0

Featured Post

Are You Ransomware's Next Victim?

Worried about ransomware attacks hitting your organization?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with WatchGuard Total Security!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Coaxial cable bending There are several factors that govern the selection of coaxial cable for your Machine to Machine (M2M) application: the location of cable runs, either indoor or outdoor, inside or outside an enclosure, maximum bending and the…
Today sees the launch of a new case study, focusing on BYOD technologies we have been working with for some time now.  But with the advent of 802.11ac wireless technologies and the story behind our landmark developments, we would like to share this …
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question