Skip to main content

Ever Wondered Why Is Bluetooth Called Bluetooth?

Bluetooth, as we all know, is a wireless networking technology, famously used for transferring data from one device to another. If you ever wondered how ‘Bluetooth‘ acquired its name, we are here to clear it for you.

Not surprisingly, it had nothing to do with teeth or being blue. Rather, the name was inspired by a Medieval king of Denmark back in between 958 and 970.

Why Is Bluetooth Called Bluetooth (2)

In 1994, a group of engineers at Ericsson, a Swedish company, invented a wireless communication technology that promises a secure exchange of data amongst several different devices. Pondering this service, the engineers recalled the legend of Danish Viking king Harald Blåtand (or Harold Bluetooth in English, who got his name because of his fondness for blueberries, which stained his teeth).

Why Is Bluetooth Called Bluetooth (4)

According to lore, Blåtand had an uncanny ability to bring people together in non-violent negotiations. His way with words and communication went so far as uniting Denmark and Norway as a single territory. As the king Blatand was known for uniting the nations, similarly, Bluetooth technology was created to allow connectivity and collaboration between different devices.

The Bluetooth logo:



Why Is Bluetooth Called Bluetooth (1)

The Bluetooth logo has Harald Blåtand’s initials inscribed on it (in Runic). To pay tribute to his contribution, the engineers combined the initials of his name.

Why Is Bluetooth Called Bluetooth (3)

Look at the image. The two lines sticking out of the back of the B actually represent a Runic H — that H for Harald (The Runic H is like an asterisk in English). And the B stands for Blåtand!

Comments

Popular posts from this blog

A Wonder Apps Hacks Facebook in Seconds Over Wi-Fi !!!!

Stealing cookies to potentially steal users' credentials just got so easy and portable that loony stalkers are probably jumping for joy. Picture this mobile-type scenario, as a person with a rooted Android smartphone casually strolls by a Starbucks, he or she taps once on a new app, and whammo, hops on and takes over Facebook profiles. Like a wicked mobile cousin of Firesheep, FaceNiff could allow even a clueless noob to hack Facebook over Wi-FI networks. The hacking app requires root access on Android phones. FaceNiff allows users to sniff and intercept web sessions for Facebook, Twitter, YouTube, Amazon, and Nasza-Klasa (a Polish site). Unlike Firesheep, the FaceNiff app listens in on wireless networks encrypted with WPA and WPA2 (WEP too) so that with one tap and within seconds, users can hijack the account types supported. Not that you intend to try out FaceNiff, but you can't hijack more than three profiles. However, FaceNiff app developer Bartosz Ponur...

Use Jio sim In 3G Phone No Need Of 4G Phones !!!

How to Use Jio On 3G Phones Android Devices ( For Only Educational Purpose )  Note  :- This Method Is Little Bit Risky , Try This At Your Own Risk , We Will Not Be Responsible For Any Damage What To Do ? For Now We Are Providing Trick For Mediatek Chipset Devices .Before Using This Trick => Check Your Device Specifications Whether It Has Mediatek Chipset Or Not. Kitkat Android Devices Will Be More Preferable. First of all ,  open Engineering Mode In Your Device .If You Don’t Know Code For Opening This Then Download Engineering Mode App Open App Or Dial Your Device Specific Code For Engineering Mode => Then Select MTK Settings. => Then Select Preferred Network Option. In Drop Down List Select 4G LTE/WCDMA/GSM & Save & Reboot Your Phone. Now Put Jio Sim On First Sim  Slot & Let Second Sim Slot Empty. Done Now. You Will Get Jio Network But It Will Be 3G. You Will Get 3G Speed & 3G Network. You Can Only Use Internet From This...

ALL IN ONE ROOTING GUIDE

For those new to the world of rooting, acquiring root access essentially grants you elevated permissions. With root access, you are able to access and modify files that would normally be inaccessible, such as files stored on the /data  and  /system partitions. Having root access also allows you to run an entirely different class of third-party applications and apply deep, system-level modifications. And by proxy, you may also be able to access certain device features that would otherwise be inaccessible or use existing features in new ways. Having root access isn’t the end all-be all of device modification–that title is usually reserved for fully unlocked bootloaders and S-Off. That said, root access is generally the first step on your journey to device modification. As such, root access is often used to install custom recoveries, which then can be used to flash custom ROMs, kernels, and other device modifications. Root access also enables users to insta...