Interesting origin of Bluetooth terminology
Bluetooth understands the meaning in English meaning "blue teeth". But in fact, the function of this popular wireless technology has nothing to do with green or human teeth. It is precisely named after a historical figure.
Harald Bluetooth is the Danish Viking king from 958-970. King Harald is famous for his ability to bind people. He was a great success in the reunification of Denmark and Norway, and was also a Protestant in Denmark. Therefore, King Harald is considered a symbol of unity.
Portrait of King Harald Bluetooth
In the mid-1990s, wireless communication required unity. At that time, many companies developed their own connection standards, but there was no match between them. Many people find that this fragmentation is clearly an obstacle to the widespread development of wireless technology.
One of those thinking is Jim Kardach, Intel's wireless technology engineer. Kardach has acted as an intermediary, helping to unify the standards of different companies to develop a industry-wide standard for short-range, low-power radio connectivity.
At that time, Kardach read a book about Vikings that featured the reign of King Harald - whom he saw as an ideal symbol to reconcile competition. He explained: " The term Bluetooth was borrowed from the 10th century, after the second Danish king Harald Bluetooth. He is famous for Scandinavian unification, just as we want to unify the industry. and mobile industries in the field of short-range wireless connectivity ".
Bluetooth logo
Organizations and individuals who agree with Kardach's view eventually joined together to form the Bluetooth Special Interest Group, which develops the Bluetooth standard agreements we are using today. Initially, the name Bluetooth was only used temporarily, but the press mentioned it so widely that it became an official name and maintained until today.
Another interesting thing is that the Bluetooth logo with the " mysterious " symbol in a blue oval is Harald Bluetooth's acronym for rune - an ancient script of northern European peoples.
You should read it
- What is Bluetooth 5.0? What benefits does it have for our lives?
- Desktop without Bluetooth? This is the solution
- How to set up and manage Bluetooth devices in Windows
- The 'Bluetooth 4.2' technology standard was released
- Do you know what Bluetooth on TV is for?
- Top 6 USB Bluetooth for the best PC
- How to Use Bluetooth Technology
- How to Use USB Bluetooth
May be interested
- The decision to 'pocket' before choosing to buy a laptopto avoid buying defective products, it is necessary to check the quality of the machine before buying. the instructions below will help you thoroughly check the machine before you buy so you can own a laptop that best suits you.
- The fate of the iPhone is robbedin ho chi minh city and hanoi, as well as other big cities, robbery and theft of expensive phones, typically iphones, are no longer a rarity. use your phone when riding a motorbike, put your phone in your wallet, in your pocket, or even sit on the sidewalk and have a robbery robbery.
- Tips to save time and avoid risks when working with computerswhen you need to work you will never want your computer to run like a cow, it takes a lot of time just to start up, set up tasks ... cnet's simple tips will help you fix this. .
- 10 shortcut keys to remember when not using the mousea mouse is a good friend of a computer user, but if you don't use a mouse, you should use a shortcut to increase your speed. on the mac there are many shortcuts, you do not need to remember all but just remember some of the most popular ones below.
- How to avoid installing unwanted softwarecurrently on the internet, there are programs, applications or toolkits that have been installed by the manufacturer or websites that have additional settings installed automatically in parallel with the installation of medium programs and applications. the download has caused many troubles for users by the presence and operation of these uninvited guests.
- 10 ways to protect yourself on the Internetthe growth of social networks like facebook or google+ has created a huge gold mine for criminals. even if users have customized privacy settings carefully, they can still be attacked by hackers - especially if they allow social networking applications to access their personal information.