What should we be looking for in computing devices that we buy with Bluetooth support? Are there are any new Bluetooth...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
security, performance, or capability features that we should be requiring our vendors to meet in laptops, PDAs, and peripherals?
Look for products that support Bluetooth Version 2.0 or 2.1 + EDR (Enhanced Data Rate). The newest specification, Version 2.1 + EDR, was completed this summer and provides two main enhancements:
- Bluetooth pairing has been both simplified and strengthened to resist man-in-the-middle attacks. Version 2.1 pairing is based on either a user-entered passkey or near-field communication between devices held close together during the pairing process. The old concept of unit keys has been deprecated, and a new five-step "secure simple pairing" process has been introduced.
- Version 2.1 adds a new feature called Sniff Subrating to extend battery life in many smaller Bluetooth devices. Sniff Subrating reduces the active duty cycle of Bluetooth devices like keyboards and mice to improve power-saving capabilities. Bluetooth hosts can now specify maximum transmit and receive latencies so that low-power devices can know how often they must exit and re-enter "sniff mode." This can result in up to five times the battery life experienced by older low-power Bluetooth devices.
Both Version 2.0 and 2.1 support EDR, a faster PSK modulation scheme that can transmit data at 2 or 3 Mbps, as compared to the older basic rate GFSK modulation scheme that transmitted at 1 Mbps. Although most existing Bluetooth devices implement Version 1.1 or 1.2, next year you should really be looking for Version 2.0 or 2.1 + EDR in new products so that you can start taking advantage of these improvements.
Related Q&A from Lisa Phifer
The enterprise mobility management market for wearable devices is in its infancy, but IT can still use existing EMM tools to manage wearables.continue reading
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.continue reading
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.