
Implementing Nordic nRF52 OTA DFU over Bluetooth LE – Part 4
In a few previous posts (Part 1, Part 2, and Part 3), we covered the basics of designing a secure Over-the-Air Device Firmware Update (OTA
In a few previous posts (Part 1, Part 2, and Part 3), we covered the basics of designing a secure Over-the-Air Device Firmware Update (OTA
In a couple of previous posts (here and here), we covered the basics of Bluetooth Low Energy (BLE) advertising and advertisement packets. In this post,
First, a Short Story… Before I dive into the meat of the topic (Bluetooth Low Energy vs. Bluetooth Classic), I’d like to tell you a
This tutorial is an excerpt from a course available within the Bluetooth Developer Academy, developed in collaboration with Anas Imtiaz, Ph.D. For the purpose of
In this week’s post, we’ll continue our discussion on Bluetooth Advertisements (first part here) and cover them in a bit more detail. Bluetooth Advertisements are
This post is an excerpt from a course developed by Anas Imtiaz, Ph.D. which is available within the Bluetooth Developer Academy. In a previous post
Whether you’re a beginner or an expert in Bluetooth Low Energy development, it’s always good to take a step back and revisit some of the
To fully understand advertisements in BLE, we need to take a step back and learn about one of the layers within the architecture of BLE:
As a continuation of our series on Bluetooth beacons (part 1 here, part 2 here, and part 3 here), today we’ll be covering Google’s Eddystone
Like a MAC address for LAN-connected devices, Bluetooth devices also have an identity address associated with each device. Understanding how Bluetooth addresses work is crucial