Increasing the range of a wireless product is an advantage for virtually every application. Consider, say, a large warehouse with a Bluetooth mesh network to track the location of valuable items. If each device in the network can communicate over longer distances, fewer devices are needed to cover the warehouse volume.
Read More ❯Pål Kastnes
Recent Posts
Power Profiler Kit II brings greater insight to wireless power consumption
By Pål Kastnes May 19, 2021
The PPK2 enables accurate instantaneous and average power consumption measurements for low-power embedded applications. It is also inexpensive and portable enough to be on every engineer's desk.
Read More ❯New frequency- and protocol-agnostic technology consisting of proprietary software, hardware, and antennas make it easier for developers to incorporate RF-based location finding into their latest products.
Read More ❯Topics: cellular IoT, Bluetooth Low Energy, asset tracking
UWB is emerging as the best solution for precise distance measurement in social distancing applications.
Read More ❯Topics: Bluetooth Low Energy
Talking about power consumption can be like running into a minefield of misconception, prejudice and marketing buzzwords. Determining what all the statements mean in reality is not always an easy task.
Read More ❯Topics: Bluetooth Low Energy
When designing your product, it’s crucial that you choose a memory technology that lets you update your firmware easily. Otherwise, you may have to scrap a lot of products if you find errors. If this happens after they've been shipped to end customers, the negative impacts will be severe.
Firmware is held in non-volatile memory such as ROM, EPROM or flash memory. Let’s take a closer look at one of them: flash memory, which enables device firmware updates (DFU) and the advantages that this gives.
Read More ❯An infographic of 4 types of area networks you need to know about: PAN, BAN, WAN and LPWAN.
Read More ❯Topics: Bluetooth Low Energy
Authenticating and securing IoT devices for the smart home requires complex algorithms to do the job without compromising the user’s data. We take a look at how to enable efficient security using symmetric and asymmetric encryption algorithms.
Read More ❯Topics: smart home, access control
As the number of connected devices continues to soar, IoT security threats become ever more important. Let’s look at the security fundamentals for IoT.
Read More ❯Taking accurate measurements is the first step to optimise energy efficiency, while finding ways to move as much of your processing as possible into dedicated hardware modules can cut your power usage by a surprising amount.
Read More ❯