Hi
After each connection, I should press Alt-A.
Is it possible to add a feature so the advertising will restart automatically after the connection is finished?
Hello Support Team!
I use nRF52840 and migrate to nRF5 SDK 17.1.0. But I can't use Trace functionality, because SystemInit method from system_nrf52.c file use wrong pins...
This blog describes how you can setup a Segger Embedded Studio example for PCA10040E (emulating nRF52810) from nRF5 SDK 14.2 to use S132 v5.1.0, instead of S112. The procedure should be similar for the…
A common thing to do is to use the Nordic UART Service for quick prototyping.
Often the example itself is used as a starting point (ble_app_uart). But sometimes we use other starting points, and want to…
Did you know you can use two-factor authentication to enhance the security of your DevZone account? In this little blog, I’ll show you how to enable Two-Factor Authentication (2FA) with your DevZone account…
Background
There is a need to enable Nordic hardware with the Direct Test Mode (DTM) firmware. This is so the physical layer and RF characteristics may be ascertained as set in the Bluetooth Sig Specification…
Requirements
This document uses:
Segger Embedded Studio (SES)
nRF5 SDK v17.1.0
an nRF52 DK to emulate the nRF52810
a BLE-enabled mobile device
You may want to review the blog here for a more comprehensive…
Requirements
This hands-on tutorial uses:
Segger Embedded Studio (SES)
nRF5 SDK v17.1.0
an nRF52840 DK
a BLE-enabled mobile device
You can use an nRF52 DK or nRF52833 DK instead of the nRF52840 DK,…
This is part 3 of the series Building a Bluetooth application on nRF Connect SDK
You can find other parts here:
Part 1 - Peripheral Role.
Part 2 - Central Role.
In Part 1 we covered the generic architecture…
Purpose
The purpose of this guide is to demonstrate the use of Bluetooth Shell. Bluetooth Shell (BT Shell) is a command-line shell application that runs over the UART. It allows one to manually type in…
Out of the box, the examples in the nRF Connect SDK are configured for ease of use, functionality, and debugging; they are not generally configured for optimal memory utilization. Some of the examples…