Solved

Bluetooth two way communication

Posted on 2006-11-06
2
280 Views
Last Modified: 2010-04-24
I asked a question recently reference whether i could connect my BT headset in Audio gateway mode to my laptop. What I am trying to achieve is two way communication with my laptops speaker and microphone to my BT headset. I have paired the headset in Headset mode and can input sound and playback audio using the control panel and audi settings. This is only simplex communication, has anyone any ideas how to get duplex comms. Will i have to write a program to access the BT stack to do this? Is any software available out there that will achieve this aim? I have a Linksys BT100 dongle and a Logitech Mobile Pro headset. Many thanks
0
Comment
Question by:spyderwebb
2 Comments
 
LVL 39

Accepted Solution

by:
PUNKY earned 500 total points
ID: 17892682
You should go here: http://www.experts-exchange.com/Programming/Wireless_Programming/Bluetooth/ to ask programming experts for your question.
0
 
LVL 4

Expert Comment

by:airnike
ID: 17962047
it can be done ... i've used the my BT head set for Skype and my hand set Sony Ericsson K800i

u will need to use a newer BT driver / software if yours is an old one ...
0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Network Upgrade 4 68
Brother MFC-J6720DW Scan to Email 5 82
Bad WIFI ms 6 62
Wireless Access Point signal strenght 5 52
I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question