Feeds

Bluetooth finally reaches ten (years, not users)

Happy 'toothday - or is it?

High performance access to file storage

Last week the Bluetooth Special Interest Group celebrated ten years since its formation for the purpose of defining and promoting the radio-networking standard that was supposed to link everything together. But has Bluetooth actually done anything more than enable everyone to look like a twat with a glowing blue ear?

When originally proposed, as a cable replacement, Bluetooth was promised to provide everything from wireless internet access to mesh networks, but the reality has turned out to be a lot more mundane. The standard is now looking to competitors to create the functionality it originally promised.

Things started to change during the long wait for Bluetooth hardware: with developers (this author included) reduced to creating applications using PDAs with Wi-Fi cards as proof-of-concept to keep investors interested – something that became more practical as Wi-Fi reduced in cost and increased in ubiquity. By the time Bluetooth devices became available Wi-Fi was well on the way to becoming the default wireless standard, despite the greater flexibility Bluetooth offered.

Like pulling teeth

Bluetooth is defined by a number of profiles - ways in which the wireless devices were expected to be used. The standard was then developed to make those usage models possible, though that was no guarantee that anyone would ever use them.

Most notable of these lost profiles is the Intercom Profile: enabling two people to speak to each other from opposite sides of a room – up to ten metres apart. The fact that shouting has a roughly equivalent range was apparently missed by the SIG, and even upping the range to 100 metres (in perfect conditions) didn't get that particular profile widely deployed.

Almost as odd as the Intercom profile was the idea of Scatternets. With every Bluetooth device able to communicate with seven other devices, it was also possible for any Bluetooth device to host one network while being a participant in another, and route communications between the two. Unfortunately, most devices struggle to maintain two Bluetooth connections even now, let alone route information between networks. Last year we asked Mike Foley, head of the Bluetooth SIG, if he could point us in the direction of someone, anyone, who was using Bluetooth Scatternets in anger – he couldn't.

The LAN Access Profile wasn't as ambitious as Scatternets, it was simply undercut by Wi-Fi which could offer higher speeds with less apparent complexity. Bluetooth fans, this author amongst them, would moan on about battery life and the fact that 1Mb/sec was more than enough for accessing email and web pages, but the Wi-Fi crowd simply had an easier sell – "it's like Ethernet, only without wires". You can still buy Bluetooth access points, though not a lot of devices support the profile these days.

But not everything the SIG did was wrong; the headset profile that attracted little attention in the early days of Bluetooth has proved to be its saviour ever since. Mobile phone shops love selling accessories - the margin is greater and the sales process easier - but there's a limit to how many novelty clip-cases one can flog. So when Bluetooth started to appear in phones the shops quickly realised they could make a mint selling headsets.

In Europe the shops have very close relationships with the network operators, who are the handset manufacturer's biggest customers. When the shops suddenly demanded Bluetooth on handsets, the operators took their demand to the manufacturers, who happily complied. In the USA shops are more independent, which goes some way towards explaining why Bluetooth hasn't hit America in the same way, at least not yet.

The popularity of headsets has created a perception that Bluetooth is a mobile phone technology for carrying voice - a long way from the desktop-cable-replacement originally envisioned. The SIG continues trying to change that perception, launching applications such as TransSend to try and get people using Bluetooth for something other than looking demented while talking on the phone, but the perception is hard to break.

SANS - Survey on application security programs

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
Turnbull gave NBN Co NO RULES to plan blackspot upgrades
NBN Co faces huge future Telstra bills and reduces fibre footprint
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.