?
Solved

Wireless/Bluetooth USB Hub?

Posted on 2006-11-07
2
Medium Priority
?
295 Views
Last Modified: 2010-04-26
Hi all.

I am looking for a device that will allow me to free my laptop from the USB base of my IP phone. Is there a WiFi or Bluetooth enabled hub on the market which will allow this?

Specifically --> I want a standalone (powered) usb hub which connects to my laptop wirelessly, but will accept the usb connector of my IP Phone base station.

Thanks in advance.
Matt
0
Comment
Question by:ProspectUs
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 16

Accepted Solution

by:
btassure earned 1000 total points
ID: 17888616
0
 

Author Comment

by:ProspectUs
ID: 17889988
That's just what I'm after. Nice bit of Googling...I was obviously using the wrong search terms -- only wish I had invented it first!

Will just have to wait for it as Belkin looks like they will be first to market with this kind of device.

Thanks!
Matt
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question