?
Solved

How to use the Huawei E169 as phone under Debian/Ubuntu Linux

Posted on 2011-03-14
5
Medium Priority
?
1,338 Views
Last Modified: 2013-12-09
Hello to everyone,

I would like to know if and how to use the Huawei E169 internet key as phone under Debian/Ubuntu Linux. Which kind of tool can I use ? I make this question because I've unlocked the device and now under Windows I can place and receive phone calls through the mobile partner tool that I have taken from the Huawei website. Can I do the same thing under Debian/Ubuntu Linux ? Thanks.
Immagine.jpg
0
Comment
Question by:marietto2008
  • 3
  • 2
5 Comments
 
LVL 25

Expert Comment

by:RobMobility
ID: 35137222
Hi,

Could you try using WINE?

Regards,


RobMobility
0
 
LVL 2

Author Comment

by:marietto2008
ID: 35137593
No,because I want to install Linux on a wi-fi only tablet and I want to make and receive phone calls with it. The tablet runs on an ARM cpu,I don't know if wine can works well on this situation. And I've already tried to run the Huawei mobile partner application for Windows on Linux with Wine,but it didn't work because the device is not recognized.
0
 
LVL 25

Accepted Solution

by:
RobMobility earned 2000 total points
ID: 35138222
Hi,

Perhaps this would point you in the direction of some mobile devices that have had Linux builds prepared for them including voice apps?

http://tuxmobil.org/phones_survey_htc.html

Regards,


RobMobility.
0
 
LVL 2

Author Comment

by:marietto2008
ID: 35149046
Hello,thanks for your help. I've been able to find only this :

http://vocpsystem.com/

it doesn't seems like what I need,but it is the closest. Anyway I can't imagine that someone has not created an application to make and receive phone calls using the UMTS/GSM data card.
0
 
LVL 2

Author Comment

by:marietto2008
ID: 35149050
....under Linux.
0

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
I have written articles previously comparing SARDU and YUMI.  I also included a couple of lines about Easy2boot (easy2boot.com).  I have now been using, and enjoying easy2boot as my sole multiboot utility for some years and realize that it deserves …
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
Suggested Courses
Course of the Month16 days, left to enroll

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question