Feeds

WTF is... Bluetooth 4.0?

It's in the iPhone 4S, but does it matter?

3 Big data security analytics techniques

Bluetooth goes fourth

Created by Nokia researchers in 2001 - when it was dubbed Wibree - Bluetooth Low Energy has a range of around half that of ‘classic’ Bluetooth - 50m to the latter's 100m - and a relatively low real-world throughput of 260Kb/s.

It’s not designed for voice communications. Instead, it's intended to allow devices to send data intermittently for a long time, using very little power - 0.01 to 0.5W - running for many months on a small button battery, with quick connection set-up times helping conserve power.

Nordic Semi µBlue Bluetooth 4.0 chip

Nordic Semi's µBlue chip has BT 4.0 on board

It’s possible for a BT LE device to scan for other gadgets, authenticate a link to one, send it data and then disconnect all in as little as 3ms.

One of the first devices to use the technology is a wireless heart-rate monitor for fitness fiends, based on a chip from Nordic Semiconductor. Existing gadgets like this one tend to be tied to a specific brand of receiver, often in a watch, like the well known Polar range, but Bluetooth 4.0 should make it easier to create devices that will work with a range of receivers.

More interestingly, the standard allows a device to use a computer or a phone to connect to its associated web service very simply. So a smart electricity meter might request that your computer establishes it a connection to send the latest reading to your power provider, for example.

Broadcom's BCM43142 802.11n Wi-Fi and BT 4.0 chip

Broadcom's BCM43142 chip, which provides 802.11n Wi-Fi and BT 4.0
Source: PCOnline

A Bluetooth 4.0 fitness device will automatically be able to send details to a health website, using your phone to provide the connection transparently. It should also be possible for a device to supply information that will help a phone or computer decide which apps are capable of using and presenting the data the gadget will be sending.

The Bluetooth SIG, the organisation that oversees the standard, expects most of the phones that will ship in 2012 to include the technology, thanks to its lower power consumption and silicon costs - it'll come for free in the way that most Bluetooth functionality is now built into devices' Wi-Fi chippery.

SANS - Survey on application security programs

Next page: The future is Blue?

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.