Sunday, September 23, 2007

Bluetooth Technology



Since its introduction in Scandinavia in 1998, Bluetooth technology has become increasingly popular and is being adopted by more and more companies every day. The creation and use of Bluetooth has lead to the need of far less wires in and around the workplace. The list of Bluetooth enabled devices is ever expanding and includes cell phones, printers, desktops, laptops, peripherals, medical devices and many more. Recently both Sony and Nintendo adopted Bluetooth technology for the wireless controllers in their seventh generation gaming stations, the Playstation3 and the Wii.

According to the company’s website, Bluetooth technology works by sending data wirelessly through an open wireless frequency ISM band between 2.4 and 2.4835 GHz. Once paired, up to eight Bluetooth devices can connect automatically by using the ISM (industrial, scientific and medical) bands which force other ISM equipment to accept any signal being sent over the frequency. This group of eight devices is called a Personal Area Network or a piconet and the technology also allows for communication between piconets.

What distinguishes Bluetooth devices from other devices that operate at 2.4 GHz is the use of extremely low power signals produced by their low cost microchips. The technology also avoids other non-Bluetooth devices by using a technique called spread spectrum frequency hopping. By using this technique, once paired Bluetooth devices will communicate wirelessly by changing to one of 79 frequencies over 1600 times a second. This reduces the chances of interference from a wireless phone or a local Wi-Fi signal.

In the past, questions of security have always been present when talking about wireless technologies. Bluetooth has several security features built in so that companies and users can feel safe about adopting the technology. A passkey is needed when pairing Bluetooth devices and once the pairing is established it uses 128bit encryption to protect the information from being stolen. As newer versions of Bluetooth are developed and the current range of 30 feet is extended, new security features will also be implemented to keep the information being shared secure.

Bluetooth has been adopted globally by many industry leaders including Apple, Microsoft, Lenovo, Audi, Motorola, Nokia, Toyota and many more. As Bluetooth becomes more recognized companies will benefit from the fact that people will began to search out products that are Bluetooth enabled adding value to the products being sold. Companies could also send advertisements to Bluetooth enabled cell phones or PDAs as people walked by their stores announcing deals and promotions.

In the future Bluetooth devices could communicate in certain locations and adjust the devices settings accordingly. An example of this could be as you enter a classroom or a movie theatre a device would send a signal to your cell phone telling it to turn off the ringer. Other applications could be used in the hotel or car rental industries. When someone would go to check into a hotel, the persons PDA or cell phone would be able to send personal information to the teller at the desk. It could also be used in supermarkets where someone’s credit card information could be transferred to the cash register and in return a receipt could be sent back to the PDA or cell phone eliminating the need for paper.

Companies could create virtually wireless offices and because Bluetooth is automatic, companies could save large amounts on IT. Bluetooth technology could also have a huge impact on the health care industry eliminating the use for wires and allowing for doctors to get constant updates about a patient’s health without visiting the room. Best of all, it’s CHEAP !

As mentioned above, the downside to Bluetooth is the security of wireless technology. The threat of being hacked and information being stolen is always greater with wireless technologies. Several securite concerns like Bluejacking, Bluesnarfing and Bluebugging also exist. Bluejacking (video) is similar to spam mail in that people send information that is unwanted and possibly dangerous to the device. Bluesnarfing is done by professional hackers and allows the hacker to use the cell phone as if it was their own and Bluebugging is similar to Bluesnarfing but it also allows the hacker to listen to the persons conversations.

The usages for Bluetooth technology and the devices that will use the technology are limitless. Wireless technologies are the way of the future and Bluetooth technology will be a main player in the expansion of this market.

References:

Accenture (2007). Six cool uses for Bluetooth beyond the desktop. Retrieved September 20, 2007, from http://www.accenture.com/Global/Services/By_Industry/Communications/Access_Newsletter/Article_Index/SixDesktop.htm

Bluetooth Web site. (2007).
Retrieved September 20, 2007, from
http://www.bluetooth.com/Bluetooth/Learn/Technology/


The Bluetooth Guide Web site. (2007).
Retrieved September 20, 2007, from
http://www.bluetomorrow.com/


Wikipedia, Bluetooth page. (2007).
Retrieved September 20, 2007, from
http://en.wikipedia.org/wiki/Bluetooth#Social_concerns


No comments: