09:30 Aug 17, 2001 |
English to Spanish translations [PRO] Tech/Engineering | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: charlesink Local time: 15:01 | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
na | modo de recepción |
| ||
na | modos de seguridad / confianza? |
|
modo de recepción Explanation: See what Bluetooth means: A wireless personal area network (PAN) technology from the Bluetooth Special Interest Group, (www.bluetooth.com), founded in 1998 by Ericsson, IBM, Intel, Nokia and Toshiba. Bluetooth is an open standard for short-range transmission of digital voice and data between mobile devices (laptops, PDAs, phones) and desktop devices. It supports point-to-point and multipoint applications Bluetooth provides up to 720 Kbps data transfer within a range of 10 meters and up to 100 meters with a power boost. Unlike IrDA which requires that devices be aimed at each other (line of sight), Bluetooth uses omnidirectional radio waves that can transmit through walls and other non-metal barriers. Bluetooth transmits in the unlicensed 2.4GHz band and uses a frequency hopping spread spectrum technique that changes its signal 1600 times per second. If there is interference from other devices, the transmission does not stop, but its speed is downgraded. The name Bluetooth comes from King Harald Blatan (Bluetooth) of Denmark. In the 10th century, he began to Christianize the country. Ericsson (Scandinavian company) was the first to develop this specification. Desktop Computer Encyclopedia See also references Reference: http://www.rfmd.com/DataBooks/db97/2968.pdf Reference: http://gartner11.gartnerweb.com/public/static/aboutgg/pressr... |
| |
Login to enter a peer comment (or grade) |
modos de seguridad / confianza? Explanation: ¡Hola! La verdad es que no tengo ni idea del tema y en las búsquedas que he realizado en Internet no he encontrado demasiado. Parecer ser que el principal problema de esta tecnología es la seguridad. En la referencia que te envío habla de dispositivos de confianza y de no confianza y también de tres niveles de seguridad, segñun sean abiertos o requieran autenticación y/o autorización. No sé si encajará en tu texto, pero a lo mejor te puede ayudar. Un saludo. :-) Reference: http://revista.robotiker.com/telecomunicaciones/articulo5.js... |
| |
Login to enter a peer comment (or grade) |
Login or register (free and only takes a few minutes) to participate in this question.
You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.