Feeds

Motorola embedding Bluetooth in printers and copiers

Lets see if the demos work

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Motorola has announced a strategy for working with OEMs to embed Bluetooth wireless networking technology into devices such as desktop printers, copiers and medical imaging equipment.

The idea is to build Bluetooth technology natively into a device rather than adding it via a plug-in module containing a transceiver chip. This would potentially provide advantages including fewer components, tighter integration and a lower overall cost for devices featuring the short range radio networking technology.

Motorola will collaborate with OEMs throughout the year and anticipates the first Bluetooth wireless technology platforms to be available early in 2002.

According to Motorola, its embedded Bluetooth solution will give equipment manufacturers a wider choice of computing platforms onto which they can outfit wireless networking capabilities.

Motorola Computer Group will enable its embedded Bluetooth technology to run on three operating systems Linux, VxWorks, and Microsoft's Windows 2000 and on two types of processor, PowerPC and Intel.

Motorola will be exhibiting an embedded single-board computer enabled with Bluetooth wireless technology at the Embedded Systems Conference in San Francisco between April 10 to 12.

Demonstrations of Bluetooth technology went notably awry at the CeBIT exhibition in Hangover last month, and it'll be interesting to see if this slightly different approach works any better.

A number of firms in the industry have successfully demonstrated Bluetooth and the problems that cropped up at CeBIT were largely due to a lack of standardised software code for Bluetooth, which remains an issue. ®

External links

Motorola Unveils Strategy to Provide Embedded Bluetooth Computing Solutions

Related stories

Bluetooth demos flop at CeBIT
Bluetooth not vapourware, survey shocker
Bluetooth range boosted to 50m
Microsoft ambushes Bluetooth
We're backing Bluetooth, Intel reiterates

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.