Monday, September 21, 2009

Bluetooth Wireless Technology.

Bluetooth wireless technology refers to short range radio transmission that enables devices to connect to each other within range. Bluetooth devices include computers, mobile phones, printers, mouse, keyboard e.t.c. It provides a convenient way of establishing a hassle-free network such as LAN within an office. There are several uses of Bluetooth which can be implemented over a network such as:

  • File transfer between computers and other Bluetooth compatible devices.
  • Establishing internet connection
  • Printing documents through a Bluetooth enabled printer.
  • Transferring music from phone to phone or phone to computer and vice versa
You can easily set up a Bluetooth compatible device on your computer. Before that, you will need a compatible Bluetooth adapter installed. Some computers have built-in Bluetooth adapter.

  • Click the Start button
  • Click Control Panel
  • Click Printers and Other Hardware
  • Click Bluetooth Devices.
  • Click Add

Follow the instructions to complete installation.

Alternatively, you can set up your device so that your computer will automatically discover the device. Don’t forget to turn it on and make it discoverable.

  • Click the Start
  • Click Control Panel,
  • Click Printers
  • Click Bluetooth Devices.
You will now be able to discover Bluetooth devices within range on the Devices tab.
Use of Bluetooth device will prompt you to use a passcode as a security measure in order to avoid someone connecting to your device. A passcode mostly comes with your device so it’s better to follow what is written in the product documentation. This also ensures that you are connecting to the right device within your range. Other security enhancements such as strong data encryption should be put in place as the use of a passcode alone is no guarantee for security.
Always make sure that you use a device which is under your control or your secure network. Devices on public network are more prone to invasion by hackers. Hackers easily find their way into your system through unsecure devices or network. You should also use good firewall on your computer.

No comments:

Post a Comment

Please send in your feedback. I appreciate your visit.