...Bluetooth Technology Description of Technology Bluetooth technology was invented in 1994 by a group of engineers at Ericsson, a Swedish owned company. The technology was actually named later on after a 10th century Danish King, King Harald Blatand. The name Blatand means blue tooth in English. Bluetooth technology was designed to eliminate the cables and cords. Bluetooth technology operates via radio transmissions in the ISM band at 2.4 to 2.485GHZ. Bluetooth uses a spread spectrum, frequency hopping, full duplex signal at 1600 hops per second. This 2.4 GHZ band is unlicensed and available in most countries. Impacts of Bluetooth Technology 1. Bluetooth has made a tremendous impact on home security. Peep is a new Bluetooth peephole. This peephole will take a picture when someone knocks on the door and then sends it to your smartphone. BeOn Home is a smart lightbulb made to deter burglars but also will come on in the event of power outage or smoke alarm. This bulb also employs a Bluetooth mesh network to extend the range throughout the house. There is a smart deadbolt called, Danalock Smart Lock. This deadbolt can be operated from your smartphone and has a variety of design and control scheme options. 2. Probably one of the better and most important impacts of Bluetooth is in the automotive industry. With Bluetooth you can pair your phone to your car and go hands free on answering calls. Some of your autos allow you to sync your contacts and even text via speech. Bluetooth...
Words: 619 - Pages: 3
...BlueAnt Bluetooth Speakerphone Managerial Marketing, BUS 620 August 26, 2013 BlueAnt Bluetooth Speakerphone The BlueAnt Bluetooth speakerphone is manufactured by BlueAnt Wireless. BlueAnt Wireless is based out of Melbourne, Aus. BlueAnt Wireless is a global technology company that has established itself as one of the leading Bluetooth and Mobile Entertainment developers (BlueAnt wireless and vlingo partner to deliver free integrated voice application on BlueAnt products, 2011). They are known for their high-tech hands-free, stereo audio streaming and wireless communications products. They partnered with Vlingo to manufacture a truly hands-free Bluetooth speakerphone for the drivers to use their cellphones. According to McEvoy (2011) the speakerphone market is one of few choice and little competition. In this paper, we will review a marketing plan for the BlueAnt Bluetooth speakerphone. BlueAnt Bluetooth Speakerphone The BlueAnt Bluetooth Speakerphone was designed for cellphone users who excessively utilized their cellphone while driving (Shaw, 2010). With its sleek design the BlueAnt Bluetooth Speakerphone connects to the sun visor of the vehicle. Right out of the box it pairs itself with your cellphone and downloads your contacts. After pairing it is ready to be used. At this point the driver can use their voice to make and answer calls with their voice. Marketing Plan SECTION I: Executive Summary The BlueAnt Bluetooth speakerphone is a high-tech speakerphone...
Words: 1790 - Pages: 8
...* * * * * The Possibly not so Smartphone Thomas Blackard ITT Tech * * Since the 1990’s cellphone technology has been sneaking itself into our lives one-text message at a time. We have not only become dependent but addicted to our text trance inducing, video playing, face booking internet device wrapped in plastic and glass. The split second our precious phone could touch social media and the internet it was over, we were hooked and there is no turning back. The cellphone has become the single most used portable computing component of our lives and the most disposable and the most intertwined. We could start our story with vendors or marketers but I will discuss some of the more main stream ideology first, i.e. what makes a smartphone a smartphone by definition. From a technological point the discussion is fairly simple really, you take a small LCD screen, battery, cellular radio, CPU and RAM plus a really cool operating system. Voilà! A cell phone. The advanced micro-technology coupled with highly consumable content and our social interactions make the Internet larger and the world smaller. A user could be texting a colleague in Christ Church who could be doing a Facebook Check-In while texting a Twitter post exposing his or her comments or thoughts to tens of thousands of internet denizens almost simultaneously...
Words: 2141 - Pages: 9
...Bluetooth and Infrared Technology Technology has grown so much over the years, thinking back to my childhood when I first saw a remote control and was over the moon with excitement. No more getting up to change the channels, that was my first thought. The first time I saw a cell phone, having to hold that big clunky thing up to your ear throughout an entire conversation was a chore. Now when you do any of these things, you see such advancements that come from two of the most popular technologies that have come to be. Bluetooth and Infrared, both have been around longer than most of us know. During my research for this paper, I learned that Infrared is where we get our remote controls for TV, for which all 80’s children are grateful, we no longer had to come inside to change the channels for our Moms. I have learned where these technologies came from, what they are used for, the people and companies that buy them, and what we can look forward to in the future. Bluetooth is a wireless technology that allows data to be exchanged over short distances using short wavelength radio transmissions. This technology is built into of plethora of products that allows them to exchange information over a wireless connection, or in basic terms, it allows one device to talk to another without wires. Two devices must be paired together in order to share. Several devices can be connected to a single Bluetooth, such as PDAs, mobile phones, laptops, computers, printers, controllers...
Words: 2492 - Pages: 10
...Wireless Communications are very important in our daily lives. Practically everywhere we turn we can see someone working away on a laptop, an iPad, or some other form of wireless PDA. This form of communication is usually used for personal and professional reasons. There are four main types of wireless technology in play here. The four types of wireless technology is Wi-Fi, Cellular, Bluetooth and WiMAX (Cox, 2013). Wi-Fi is the most popular form of wireless technology that we come to depend on today. Wi-Fi uses IEEE 802.11 specifications to provide secure network connections at home, in the office and in the public at places like libraries, coffee houses. Many business offices have Wi-Fi set up so that their employees can be more mobile using laptops they can retreat from their desk and in to a conference room for a quiet space to work. Wi-Fi connection within a network presents challenges for any IT group with regard to security as well as architecture of the network. Many wireless Routers and AP’s are designed to provide quick speeds and secure connection for Wi-Fi some more powerful than others. Many PDA devices are being designed to act as a hot spot, providing Wi-Fi access to laptops and other devices. This brings me to speak about Cellular technology. When we think of cellular technology, we mostly think about being on the go and needing to make a phone call with a wireless phone. Cellular signals use connected transmitters or cells as Michael Cox calls them to...
Words: 725 - Pages: 3
...Technology: Friend Technology is very much a part of modern life. Many people see technology as force that has escaped from human control. Technology helps improve the quality of life. By doing many of mundane tasks, so that people can spend more time. In today’s world, three modern technologies have become a major part in people`s everyday lives: the computer, cell phone and GPS device. Society uses the computer for a myriad of things from looking up facts to shopping online, but one of the biggest uses of the internet is social networking. The cellphone allows people to talk to any one of their friends. Because the GPS device is automated, it lets the driver focus on the road instead of the map. Although those three technologies may seem quite different, each one gives us convenience, speed, and freedom. Out of all the technology we have come across through the years, mobile telephony has become the most explosive development. It has added the convenience of reaching anyone no matter where they are. It has revolutionized long distance communication and has made the lives of generations easier through constant connection. Cell phones allow a college student to consult with peers and teachers about uncertainties on a project. A cell phone can save the life of a ten year old woman in a car accident, who is able to dial 911 from the seat of her car. As cell phones exploded in today’s lifestyle, so did the programs that come with it. Text messaging became popular...
Words: 1052 - Pages: 5
...386 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.11, November 2008 MOBILE LEARNING: AN APPLICATION OF MOBILE AND WIRELESS TECHNOLOGIES IN NIGERIAN LEARNING SYSTEM. Boyinbode O. K. and Akinyede R. O. Department of Computer Science, Federal University of Technology Akure, Nigeria Abstract Mobile learning (M-Learning) is the point where mobile computing and e-learning intersect to produce an anytime, anywhere learning experiences. Advances in mobile technologies have enhanced M-learning tools at just the right moment to meet the need for more costeffective just in time training options-learning on the go. Electronic Learning offer methods, which decrease the limitations of traditional education but M-learning offers more. This paper discusses the existing devices and technologies appropriate to realize Mobile learning, its advantages over e-learning, and challenges to its adoption of in Nigeria. Keywords: e-Learning, m-learning, mobile computing, SMS, MMS disadvantages lead to search for new and more effective educational methods. E-learning offers new methods for education based on computer internet technology. Mlearning is the intersection of mobile computing and elearning [5]; M-learning has the ability to learn everywhere at every time without permanent physical connection to cable networks. Mobile and Wireless technologies are being used in diverse areas such as travel, education, stock trading, military, package delivery, disaster recovery...
Words: 4432 - Pages: 18
...captured my attention. A few years ago I first heard of the name Bluetooth. Along with the interesting name, a “futuristic” scenario was embossed in my memory whereby a cell phone would communicate with one’s fridge at home and then notify the owner that the milk-supply was running low. This may seem a little far-fetched but it may very well be a reality and a standard in a few decades. Bluetooth’s primary purpose is to enable short-range wireless voice and data communications anywhere in the world. The way Bluetooth actually works by allowing users to connect to a wide range of telecommunication and computer devices without cables, namely mobile phones, portable computers, personal handheld devices, as well as connection to the Internet (bluetooth.com, ‘how it works’). In the following, I will further explain what, how and where Bluetooth works and what the potential use of this new technology is. The Bluetooth name comes from a Scandinavian king Harald Blatand, where “Blatand” is translated to “Blue Tooth” (Miller Michael, page 26). This king was known for uniting countries just as the Bluetooth technology is intended to unite countries with its open specification. There were five founding companies of the Bluetooth Special Interest Group (SIG): Ericsson, Intel Corporation, IBM, Nokia Corporation and Toshiba Corporation. These companies formed the core group known as the “promoter” companies of the Bluetooth specification. The SIG was first...
Words: 1942 - Pages: 8
...Bricks-and-Mortar IT Strategy Online retailers have been gleaning information about their customers’ merchandise browsing and buying habits Value Proposition Technology needed to improve brick and mortar retailers Personalized recommendations Targeted advertisements Improved cross-selling tactics Tracking customer count inside the store Physical Layout of Stores Personalized recommendations Personalized notifications can be sent to the customer's cellphone device Targeted ads Value Proposition i.e. coupons for shoes if customer has spent extended time in the shoe department Improved cross-selling tactics Up selling, different products that customers are unaware of, a item that compliments another item Tracking customer count inside the store Ensures adequate staffing levels Physical Layout of Stores Helps a retailer develop product placement strategies. Recognize returning shoppers Consumers on average are enrolled in 7.4 loyalty programs 53 percent of these members stop participating in at least one loyalty program a year Irrelevant reward offerings (68 percent) and slow reward accumulation (50 percent) as top barriers Value Proposition Effectively improve the customers in-store experience using technology to benefit and value the customer If customers think that they are benefiting then they will be more willing to provide information. Personalized (targeted) marketing has potential...
Words: 813 - Pages: 4
...Video Baby Monitor with Bluetooth Cody Snodgrass Keller School of Management Marketing Management Professor: Harold Leffall 1/19/2014 Situation Analysis: Since this type of monitor already exists trying to persuade people to buy this one instead of the competitions. The macro-environmental factors that are going to exist are figuring out the age group that would be the target for this device? Legal issues do not seem to be a problem. However some say this could invade privacy! Technologically speaking this would appeal to many people that have babies to young children. Market Summary: With technology gaining rapid interest many people will want to incorporate it into their baby’s lives. The market for growing technology has increased and so far will continue to years to come. As long as the product lives up to its name then it should speak for itself. SWOT Analysis: Strengths for this product include advanced technology in a growing market. The capabilities for the software and hardware include the ability to expand and grow as well. It will be able to grow with the market. Pairing with cell phones and tablets will appeal to a strong growing market. Weaknesses include many competitors that have a lead on the technology and market. These companies have already made a name for them with other electronics and therefore have an edge on the market. Opportunities include being able to take advantage of a growing market with vast amounts of money and room for growth. Threats...
Words: 559 - Pages: 3
...The world today is full of high tech gadgets, gizmos, and widgets. Computers are a large part of the market in that high tech world. Most consumers realize early that buying the right computer is quite the headache. So many choices make the level of involvement for the consumer extremely high with all the involvement factors. Many factors are based on the hardware of the computer. Deciding whether it should be a tablet, laptop, or desktop. Should it have this or that processor? Does it have Bluetooth? Is the hard drive big enough to hold all their music and pictures? Is the screen large enough to watch videos and movies? Is it Wi-Fi or internet capable? These are just a few of the decisions needed by the consumer when it comes to hardware. Other factors are more personal. Deciding what the computer is used for and when they are used? What software will be on the computer? What operating system is on the computer; Windows 8, Chrome, Linux or OSX? What color is it? Finally, what price range is the consumer looking for? All these factors make searching for and buying a computer so difficult. The Apple website definitely simplifies the buying process. When the website is open to the computer selection page, there are little pictures of each type of computer so you can start by picking the form factor you want. After selecting the form factor you are taking to a list of everything available for that particular computer. The consumer is able to click any feature item for the...
Words: 412 - Pages: 2
...useful, entertaining & personal experiences * Very intuitive, easy & natural for people * User friendly, will tend to older generations that aren’t capable of knowing the ways of technology, as well as for mentally or physically impaired individuals * http://www.wired.com/2013/12/wearable-computers/all/ * Wearable technology replaces the power of smartphone by increasing accessibility, without the hardships of taking your smartphone out of your pocket or stopping you while doing activities (bicycle, swimming, hiking, skiing) * Wearable revolution could take faster than the mobile revolution * Not much hardware software is required either, as wearable technology can simply work using Bluetooth or Wi-Fi, instead of having a separate Internet plan * Challenge for technologists is to make their wearable technology aesthetically pleasing *...
Words: 1843 - Pages: 8
...Antenna 23DBI 802.11A Directional 152.00 http://www.amazon.com/Outdoor-Pannel-Antenna-802-11A-Directional/dp/B0016HM8VA 802.11g: PROSAFE™ 9 DBI OMNI-DIRECTIONAL ANTENNA ANT2409 129.99 http://www.netgear.com/products/business/access-points-wireless-controllers/antennas-cables/ANT2409.aspx Sewell Part #: SW-6130 Mfg Part #: TEW-OA24D 164.95 http://sewelldirect.com/trendnet-802-11g-wireless-WLAN-24dBi-outdoor-antenna.asp?source=froogle&utm_source=Froogle&utm_medium=cse&cvsfa=1306&cvsfe=2&cvsfhu=53572d36313330 802.11n: CP TECH OAN-2151 Omni-directional Antenna $64.24 http://www.buy.com/prod/cp-tech-oan-2151-omni-directional-antenna-15-dbi-n-type/q/loc/101/210878384.html Netgear ProSafe ANT224D10 2X2 Indoor/Outdoor 10 dBi Directional Antenna, RoHS Compliant, P/N: ANT224D10-10000S. $230 http://www.axiontech.com/prdt.php?item=90457 41.) I would look around and see what other wireless devices, cordless phones, Bluetooth devices and the such to see what would be causing the interference. I would utilize a wi-fi analyzer application to determine where the signal strength is best and relocate the access point or move the interfering device if possible. 42.) Dear Supervisor: Utilizing a secured wireless network with EAP protocol is definitely a way to seriously reduce unauthorized access to the...
Words: 353 - Pages: 2
...Bluetooth From Wikipedia, the free encyclopedia This article is about a wireless technology standard. For the medieval King of Denmark, see Harald Bluetooth. Bluetooth Developed by Bluetooth Special Interest Group Industry Mobile personal area networks Compatible hardware Mobile phones, Personal computers, Laptop computers Physical range Up to 60 metres[1] Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz[2]) from fixed and mobile devices, and building personal area networks (PANs). Invented by telecom vendor Ericsson in 1994,[3] it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization. Bluetooth is managed by the Bluetooth Special Interest Group (SIG), which has more than 19,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics.[4] Bluetooth was standardized as IEEE 802.15.1, but the standard is no longer maintained. The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks.[5] To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG.[6] A network of patents is required to implement the technology, which is licensed only for that qualifying device. Contents • 1 Name and logo • 2 Implementation o 2.1 Communication...
Words: 9683 - Pages: 39
...Information Security Article Evaluation Nelson Okubasu CMGT/441 12/3/2014 MARJORIE MARQUE Can We Sniff WI-Fi?: Implications of Joffe v. Google Google collected information between 2007 and 2010 both in us and oversees. In 2010 a law suit was filed against google for violating the federal wiretap act. Among the first of the cases to rule on intercepting unsecured Wi-Fi communications. As of today our society has become so dependent on using Wi-Fi communications for various aspects of our lives, there is a parallel expectation of privacy. At the same time there are so many people or users out there who don’t understand how Wi-Fi technology works, if their information is secure, whether there privacy is violated or if the government has the right law in place to protect them. The fact that users do not fully understand Wi-Fi technology and the shortcomings of current security mechanisms is not a justification to violate their privacy, but instead to call on the government to enact or amend the Federal Wiretap Act (FWA) to reflect their reasonable expectations. Clear statutory protections will allow for the continued progression of Wi-Fi technology. Society’s dependency on Wi-Fi networks and public hotspots both economically and personally requires expansion of the FWA to ensure national uniformity. Essentially, the court found that even though Wi-Fi networks do transmit data using radio waves, the uses of Wi-Fi technology...
Words: 1058 - Pages: 5