Feeds

Bluetooth finally reaches ten (years, not users)

Happy 'toothday - or is it?

High performance access to file storage

Stereo headphones are something punters can understand, as a derivation from a technology already providing mono sound - brushing aside the fact that the two mechanisms are technically unrelated. Sending music to a speaker system naturally follows on from that, but still pegs the technology as an audio-streaming solution rather than anything more serious.

The sad thing about Bluetooth is that its most powerful feature is the one that puts off the majority of users. The Service Discovery Protocol, which allows a device to cast around and introduce itself to other devices, then ask those devices what services they can provide, is superb, and should provide an elegant user experience. Unfortunately appalling interface design, and the popularity of the technology, have conspired to make pairing two Bluetooth devices far more complicated than it needs to be.

Hello, is there anybody out there?

So complex, indeed, that the Bluetooth SIG is now adopting NFC (Near Field Communications) as a way of exchanging credentials by tapping two devices together.

Bluetooth's other great drawback - speed - is also being addressed by using Bluetooth to set up and maintain Wi-Fi or Ultra-Wide-Band connections where two Bluetooth devices discover they have a high-speed option in common.

Even the supposed strength of Bluetooth, the low power consumption, is being challenged by the technology-formerly-known-as-WiBree – now to be called "Bluetooth Ultra" or something like that. Whatever it ends up being christened, the low-power standard shares nothing with its parent beyond a frequency and some branding.

Bluetooth has always been a collection of standards, nicking data formats and protocols from other systems and sending them over Bluetooth-radio connections - but soon the Bluetooth-radio itself might simply be a channel that allows devices to negotiate a better way of communicating.

In another ten years I'm confident all my electronics will be using Bluetooth, but whether that standard will share more than a brand with what I'm using today is more debatable. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.