What do the Nokia Lumia 920, the HTC Droid DNA, Apple iPhone 5 and Samsung Galaxy S 3 have in common?

Well, you might come up with quite a list if you happen to be a patent lawyer. But for the purpose of this article, let’s name Qi.

Qi (pronounced chee) is an interface standard developed by the Wireless Power Consortium. The standard applies to inductive electrical power transfer over distances of up to 40 milimeters. In other words it’s used for charging phones and recently a growing number of phone manufacturers have been integrating the wireless charging standard into their devices.


And that’s all good because, that means some day (hopefully soon) users will not have rummage about for power cords and power docks that only fit into their phones because we can all wirelessly charge our phones (no matter what brand it is) on Qi-enabled wireless charging docks.

This, according to a recent Networkwold.com article, also has the potential of boosting near filed communication adoption.

NFC is being touted as the technology that could push mobile payment. However, there is currently a shortage of phone manufacturers integrating NFC into their devices and this has slowed the willingness of merchants to jump aboard.

However, some manufacturers such as TDK have demonstrated in the recently concluded 2013 Consumer Electronics Show that it is possible to integrate Qi wireless technology and NFC is a single chip.

It is possible that as QI wireless charging become more predominant, NFC could ride piggy back on that popularity.

Read the whole story here

Related Download
The State of Endpoint Protection & Management: Why Self-Healing is the New Mandate Sponsor: Absolute Software
The State of Endpoint Protection & Management: Why Self-Healing is the New Mandate
Lost and stolen devices. Employees off grid. Repairs or firmware upgrades. Endpoint device visibility frequently goes dark, leaving them vulnerable and open to attack. IT and security teams need a better way than traditional approaches to strengthen the security, visibility and management of endpoint devices.
Register Now