Bluetooth: HP’s Strategy It was the morning of November 12, 2001 and Carly Fiorina woke with a splitting headache. Was it the wine or the stress? Probably both. As she prepared for the busy day ahead she knew things were not going to get any easier. In addition to the immense challenges she faced as CEO of Hewlett Packard with the potential merger with Compaq, Carly knew she would have to address the integration of Bluetooth into Hewlett Packard’s product line. As a star salesperson at Lucent, Carly had seen first hand how a once highflying company could begin the downward spiral. With Hewlett’s stock price sagging and a potentially failed merger agreement on the horizon, Carly knew that the company could ill afford further strategic missteps. One of HP’s strategies is to integrate the PC, the printer, the handheld communication device and the server. All would be linked and all would be driven by HP. Carly knew that Bluetooth will be one vital element of this strategy. Introduction to Bluetooth Bluetooth is a technology pioneered by Swedish phone-maker Ericsson which will allow us to throw away our computer cables. Our devices (computers, printers, PDAs) will one day communicate over radio waves rather than the bulky cables we now use. This technology grants mobility to the once-tethered, and renders possible what once wasn’t. Bluetooth chips will be planted in the aforementioned devices we use every day. In fact, Cahners In-Stat Group says 1.4 billion Bluetooth-compatible devices will be in use by 2005.1 The chips will send and receive signals to each other using radio waves, eliminating the need for a physical connection. Not only will Bluetooth change the way we execute tasks we already do, such as send a document from computer to printer, it will make novel relationships possible, such as a cell phone which talks to a printer or PDA wirelessly. Ericsson named the technology for the blueberry-eating Harald Blåtland, King of the Danes, who united Denmark and Norway (Get it? Like uniting your printer and your computer), and encouraged as many manufacturers as possible to integrate Bluetooth into their product development2. The chips are very low in cost, around $5, and do not use much power, so manufacturers can adopt the new technology relatively painlessly3. So look for them everywhere, from your car to your kitchen. This case was prepared by Todd Kuhl, Will Thomas, Erin Kennedy and Doug Burns. Copyright 2001. 1 http://www.oreillynet.com/pub/a/wireless/2000/11/03/bluetooth.html , accessed 11/7/01 2 http://www.palowireless.com/infotooth/whatis.asp, accessed 11/7/01 3 IBID. Bluetooth will help create the PAN, or Personal Area Network4. Using a Bluetoothenabled headset, you’ll be able to use your cell phone while it’s still in your briefcase. With a Bluetooth refrigerator nearby, your computer can automatically receive updates on when you need to buy milk. A Bluetooth shipping container can announce its own arrival to a warehouse. As long as they’re within 30 feet or so of each other, two Bluetooth devices can chat when they used to have to hold hands to share data. 5 The possibilities are very encouraging to those consumers long-tired of the tether. Other Wireless Technologies Two other standards, sometimes mistaken for competing technologies to Bluetooth are WiFi and Infrared technology. Further study shows limited overlap between these technologies. WiFi / WLan An existing standard based on the 802.11 spectrum has been adopted by many players in the industry and has become known by the vernacular WiFi or WLan. The 802.11b technology can move data around at speeds as fast as 11 megabits per second.6 Range of WLan can be as far as 300 feet. The technology is making great inroads in the network business for both its convenience factor (allowing people to move their laptops around and not be tied to their desk) and, recently, as a cost effective alternative to laying cable. Retrofitting office buildings with network cable can be very expensive. With a WLan system, it is as easy as plugging in a wireless card and a base station and the network is up and running. The WiFi technology has made dramatic inroads in recent years. The technology is readily available for LAN connections as opposed to the hype of Bluetooth with its lack of penetration. "Since Bluetooth is not out there yet, Wi-Fi is taking over. With Wi-Fi, the throughput is an 11 Mb/s [megabits per second] connection vs. Bluetooth with 1 Mb/s. Bluetooth has a distance limit of 30 feet. With Wi-Fi, the distance is 300 feet” says one industry expert.7 However, there are limitations to WLan, including increased power consumption and higher costs. The technology remains primarily assimilated to laptop connections to office and school networks. The bulk and power consumption of WLan is well suited to laptops, but not cell phones and PDAs. Infrared Communication While WiFi represents a more robust technology than Bluetooth, IR represents a lower end play on wireless communication between devices. Based on the same technology that is used in remote controls commonly used with televisions and VCRs. IR ports are being used in communication between some devices such as handhelds. However, the 4 5 6 7 http://www.oreillynet.com/pub/a/wireless/2000/11/03/bluetooth.html, accessed 11/7/01 http://www.palowireless.com/infotooth/whatis.asp, accessed 11/7/01 Xircom Wlan White paper. Untangling Bluetooth 2 most important technological limitation to the IR communication port is the concept of “line of site.” IR communication ports can only communicate when the two devices are in alignment as light can not turn corners. Accordingly, the use of IR for network connections and other dedicated connects is very limited. In summary, the 802.11 spectrum is used for wireless ethernet - connecting laptops and desktops with office networks - while Bluetooth is used for cable replacement, getting rid of connections between computers and PDAs, handsets, printers, and mice. Hewlett Packard’s Bluetooth Initiative Carly went to her engineers to refresh her knowledge on HP’s Bluetooth initiative. They told her that Hewlett Packard is an active member of the Bluetooth Special Interest Group (Bluetooth SIG), a non-profit trade association that promotes personal connectivity solutions using the Bluetooth technology. The Bluetooth SIG administers and promotes specifications that can be widely implemented to enhance the demand for Bluetooth Products. She also learned that HP is the Chairperson for the Printer Working Group within the Bluetooth SIG and is leading the efforts to shape the printing protocols and specifications using Bluetooth. The engineers got Carly excited by what they described as the potential uses of Bluetooth within HP’s own suite of products. Carly reviewed their presentation listing the initial applications to use Bluetooth: - notebook, personal digital assistants (HP’s Jornada PDAs) and cell phone synchronization use of a PDA to control your notebook presentation wireless printing within a short range of a Bluetooth enabled printer sharing data/files between Bluetooth equipped notebooks downloading photos from a digital camera to a notebook or printer cell phone/notebook headsets use of a cell phone as a dial-up connection to your corporate network, similar to what you do today when you use your modem to dial-up via a phone line. With Bluetooth, you would be able to perform this dial-up connection from your notebook to a cell phone without any intermediary cables. HP expects users with Bluetooth enabled PCs to take advantage of other Bluetooth devices and download e-mail via their mobile phones, synchronize personal digital assistants (PDAs), share files and print without carrying or connecting any cables. For example, HP’s Deskjet 995c printer will allow users to print without cables from up to 10 meters (approximately 30 feet) away from other devices enabled for Bluetooth printing. Most of HP’s competitors are also embracing the Bluetooth technology, including Compaq. Carly took special interest in the fact that Hewlett Packard’s Jornada pocket and handheld PCs are direct rivals to Compaq’s handheld iPAQs and that both companies were trying to figure out how Bluetooth will play a role with their pocket PC line of 3 products. Currently, an iPAQ owner can use a Bluetooth enabled “Multiport” to synchronize wirelessly with a Bluetooth enabled notebook or cell phone. Now that Compaq and HP are in talks about a merger, what will this mean for HP’s Bluetooth initiative? Bluetooth Security One of the biggest problems concerning the adoption of Bluetooth, of which HP is keenly aware, is security. HP’s engineers knew that there was a great deal of contradictory data and opinion concerning the potential security flaws and degrees of protection. Some engineers believe that the microwave link (akin to a radio signal) is rife with opportunity for the would be hacker, while many Bluetooth advocates argue that Bluetooth security, when properly implemented was second to none. Carly Fiorina knew she had to drill down on the views of her engineers and get a quick primer on how Bluetooth security worked. How could HP implement a Bluetooth system that could fall prey to hackers and thereby kill the adoption rate of HP Bluetooth enabled products? HP’s engineers explained that there are three basic settings for security in the Bluetooth Generic Access Profile (GAP), which is the basic standard on which all other profiles are based. The three security modes are defined as: Security Mode 1: Non-Secure Security Mode 2: Service Level Enforced Security Security Mode 3: Link level Enforced Security8 In Security Mode 1 a device will not enforce any security and remains in the non-secure mode. This obviously was not an option for HP Bluetooth. In Security Mode 2 the Bluetooth device initiates security after the communication channel is established (at the higher layers), while in Security Mode 3, the Bluetooth device initiates security procedures before the channel is established (at the lower layers). It was apparent to the HP managers that Security Level 3 was the preferred standard. This would establish security before establishing connections. Simultaneously, two possibilities exist for the chosen Bluetooth device’s access to services. These are the “trusted device” and the “untrusted device.” The trusted device has access to all services. The untrusted device doesn’t have fixed relationships and its access to services is limited. In her mind, Carly painted this as the difference between a front row seat and a back stage pass. For services between devices, three security levels are defined: 1. Services that require authorization and authentication: Automatic access is only granted to trusted devices. Other devices need a manual authorization. 2. Services that require authentication only: Authorization is not necessary. 8 http://www.palowireless.com/bluarticles/cc1_security1.asp 4 3. Services that are open to all devices: Neither authorization nor authentication is required; no access approval is required before service access is granted.9 It is possible and likely that HP would set the trust level of a device specifically For services or group of services. The interaction with a remote device does not limit the security engineer’s ability to implement refined and specific access policies. Thus Carly could have her Blackberry remotely instruct her printer to print out the text of her remarks for stockholders, but other employees would be denied access to her hard drive. HP’s top wireless engineers told Carly that for any security system to be successful, flexibility and usability are top priorities. Thus it must be possible to grant access to some services without providing access to other services. As an example, on an HP printer linked by Bluetooth to a cell phone, the cell phones security discovery records should be generally accessible, whereas dialup networking shall only be available for specific devices. Furthermore the security architecture should support security policies for devices with some services communicating with changing remote devices (for example file transfer or business card exchange from an HP communication device). It is also imperative for seamless and unobtrusive security for user intervention for access to services to be avoided as much as possible. Intervention is only needed to allow devices limited access to services or for setting up trusted relationships with devices allowing unlimited access to services. The security on Bluetooth devices would also allow different protocols to enforce the security policies. In other words, the protocols for cordless telephony, dialup networking and file transfer and synchronization can all be different. While Carly herself was mildly baffled by some of the security jargon bandied about by her engineers and security team, she knew that flexible, strong and invisible Bluetooth security was foremost on the agenda for communication between remote devices. HP would be forced to reckon with significant security concerns in ushering in Bluetooth for its newest product lines. Questions Carly wondered: How should I as CEO push the company to rapidly integrate Bluetooth into its devices? Should all devices be rolled out with Bluetooth at once or should it be a staged adoption? What were competitors doing? What about security concerns? Did I really finish that whole bottle? 9 http://www.palowireless.com/bluarticles/cc1_security1.asp 5 Exhibits of Hewlett Packard and Compaq’s Bluetooth enabled products Exhibit 1 HP’s Jornada 700 series handheld PCs Exhibit 2 HP’s Jornada 560 series pocket PC’s Exhibit 3 HP’s Bluetooth Wireless Printer Adaptor 6 Exhibit 4 HP/3com Bluetooth Wireless PC Card Exhibit 5 HP’s Socket Bluetooth Connection Kit 7