Understand the factors that determine Bluetooth LE data throughput — PHY selection, DLE, ATT MTU, connection intervals — and learn how to calculate and maximize your application's speed with real nRF52 test results.
Compare 17 of the most popular Bluetooth LE SoCs from Nordic Semiconductor, Dialog, Texas Instruments, STMicroelectronics, Silicon Labs, NXP, and Qualcomm — including specs, features, and pricing.
NCC Group demonstrated a Bluetooth LE relay attack that bypasses encryption and latency checks to unlock a Tesla Model 3 without the owner's phone nearby.
A practical guide to choosing between native (Swift, Kotlin) and cross-platform (Flutter, React Native) development for Bluetooth LE mobile apps, covering DFU, security, and regulatory considerations.
The InPlay NanoBeacon IN100 lets you create Bluetooth beacons in minutes without writing a single line of code. See how this programming-free platform works.
Learn how to integrate Nordic Buttonless DFU into your own nRF52 application, generate signing keys, build a secure bootloader, create DFU packages, and perform over-the-air firmware updates via nRF Connect.
A detailed comparison of Bluetooth Classic (BR/EDR) and Bluetooth Low Energy covering power consumption, range, data rate, topology, developer tools, and cost.
For the purpose of this tutorial (separated into two parts), our goal is to create an iOS app that can manage multiple BLE peripherals. Our example will be
In a previous post (Introduction to BLE Mobile Development for iOS), we covered: * Setting up Xcode for BLE development * Bluetooth permissions * Scanning
Discover 21 key facts about Bluetooth Low Energy — from backward compatibility and long-range mode to advertising packets, PHY options, and power optimization.
Understanding how Bluetooth addresses work is crucial for every BLE developer, especially when device privacy is a concern. Learn about the four address types and how BLE privacy protects against tracking.
Understanding BLE packets is imperative for any developer. Learn by analyzing real sniffer captures of advertisements, connection requests, and post-connection operations like version exchange, MTU negotiation, and attribute discovery.