Solved

Where can I find a USB wireless transmitter?

Posted on 2013-12-25
3
484 Views
Last Modified: 2014-01-04
I purchased a wired optical mouse that is perfect except the manufacturer doesn't make a wireless version. Where can I find a wireless USB transmitter for corded USB devices such as a corded mouse?
0
Comment
Question by:turbojournal
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 14

Accepted Solution

by:
JAN PAKULA earned 500 total points
ID: 39738931
0
 
LVL 62

Expert Comment

by:☠ MASQ ☠
ID: 39738934
You can't - conversion like this isn't commercially viable.

What were you going to do with the cord anyway?

You could try doing it yourself though (like these students at Cornell did)
0
 

Author Closing Comment

by:turbojournal
ID: 39756959
Great references, multiple options, and direct.
0

Featured Post

[Webinar] Code, Load, and Grow

Managing multiple websites, servers, applications, and security on a daily basis? Join us for a webinar on May 25th to learn how to simplify administration and management of virtual hosts for IT admins, create a secure environment, and deploy code more effectively and frequently.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
assignment of laptops - risks 6 104
Uniden UDW20055 3 118
Two laptop, two monitors, one keyboard and mouse setup 7 65
HDD Thickness on a Lenovo T430s ? 2 36
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question