United States - Flag United States

Please confirm your currency selection:

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Use the Renesas AE-CLOUD2 to Send GPS Data to the Google Cloud IoT Greg Toth
Use this kit to prototype sensor and location tracking applications that connect to the Google Cloud IoT via Ethernet, Wi-Fi, or LTE Cat-M1/Cat-NM1/EGPRS LTE cellular networks. Create applications that read sensors, connect to the Internet, and communicate real-time sensor data to the Google Cloud.

News from the Industrial Internet Consortium / OpenFog Charles Byers
The OpenFog Consortium recently joined forces with the Industrial Internet Consortium, producing a powerhouse of edge-fog thought and architecture. This blog describes the motivations for joining forces, markets and applications served, and thoughts about the future of edge-fog computing in IoT networks.

Connecting to the Google Cloud IoT with the AVR-IoT WG Eval Board Greg Toth
The Microchip AC164160 AVR-IoT WG Evaluation Board allows you to prototype sensor applications using a secure-element cryptographic coprocessor and low-power microcontroller to securely connect to the Google Cloud IoT.

Help Defenders Effectively Investigate Incidents with Event Logs Jeff Fellinge
Event logs include a treasure trove of information that security defenders rely on to investigate and resolve security incidents. Help your defenders quickly and effectively respond to incidents by carefully choosing which events to log and the pertinent information to include.

Integrating the STM32L4 Discovery Kit IoT Node with the Google Cloud Platform Using Wi-Fi Greg Toth
The STMicroelectronics STM32L4 Discovery Kit for IoT Node Discovery Kit is an Internet of Things (IoT) development kit that is ideal for prototyping sensor applications with wireless connectivity to the Google Cloud IoT.

Edge Security in an Insecure World M. Tim Jones
Security is often an afterthought in edge device design. Edge devices can be secured when you understand how they can be exploited. In this blog, we'll explore access security, data security, and manageability as the means to ensure your edge device doesn't become the next security incident headline.

Securing IoT Products from Unique Threats Sravani Bhattacharjee
IoT products are vulnerable to several attack vectors and are frequently hacked for the lack of adequate security measures. This blog discusses the unique challenges of securing IoT and presents a methodical 4-tier system design approach to predictably secure IoT products.

Next-generation Firewalls: More than ACL Filters Jeff Fellinge
Next-generation firewall capabilities and features now extend far beyond their traditional predecessors and are worth a serious look for many different scenarios from small-home office to enterprise.

Protect Device Communication Through Secure Protocols Jeff Fellinge
Stop attackers from snooping or tampering with your data by ensuring that your devices and systems use secure protocols for communicating with each other and other services across the internet and in the cloud.

How Device Inventory and Dependency Management Help Secure Larger Systems Jeff Fellinge
Building and maintaining a solid inventory of all on-premise and cloud-based assets with helpful metadata is a critical step to ensuring your security programs include all of your systems.

All Authors

Show More Show More
View Blogs by Date