Hi
After each connection, I should press Alt-A.
Is it possible to add a feature so the advertising will restart automatically after the connection is finished?
Hello Support Team!
I use nRF52840 and migrate to nRF5 SDK 17.1.0. But I can't use Trace functionality, because SystemInit method from system_nrf52.c file use wrong pins...
Introduction to PSA Certified IoT Security Framework
Internet-of-Things (IoT) devices are designed to connect to the internet and/or exchange information with other devices, making them a target for hackers…
Last month Nordic released the nRF7002 DK, our first ever Wi-Fi Development Kit (DK), featuring the nRF7002 companion IC. The DK includes everything you would need to test the Wi-Fi capabilities of our new…
Bluetooth SIG has finally adopted the Bluetooth® v5.4 core specification. This means that a new set of exciting features are available for Bluetooth products along with all the advantages they provide…
Background
There is a need to enable Nordic hardware with the Direct Test Mode (DTM) firmware. This is so the physical layer and RF characteristics may be ascertained as set in the Bluetooth Sig Specification…
Requirements
This document uses:
Segger Embedded Studio (SES)
nRF5 SDK v17.1.0
an nRF52 DK to emulate the nRF52810
a BLE-enabled mobile device
You may want to review the blog here for a more comprehensive…
Requirements
This hands-on tutorial uses:
Segger Embedded Studio (SES)
nRF5 SDK v17.1.0
an nRF52840 DK
a BLE-enabled mobile device
You can use an nRF52 DK or nRF52833 DK instead of the nRF52840 DK,…
This is part 3 of the series Building a Bluetooth application on nRF Connect SDK
You can find other parts here:
Part 1 - Peripheral Role.
Part 2 - Central Role.
In Part 1 we covered the generic architecture…
Purpose
The purpose of this guide is to demonstrate the use of Bluetooth Shell. Bluetooth Shell (BT Shell) is a command-line shell application that runs over the UART. It allows one to manually type in…
Out of the box, the examples in the nRF Connect SDK are configured for ease of use, functionality, and debugging; they are not generally configured for optimal memory utilization. Some of the examples…