United States - Flag United States

Please confirm your currency selection:

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


5 Ways Cyberattacks Happen Adam Kimmel
Cybercriminals adapt to the different forms of media we use. If we know the “how” behind these types of attacks, we are better equipped to prevent and protect our data.

Power over Ethernet Pushes Forward Jon Gabay
Wired Ethernet provides a more secure connection and will not bog down wireless networks for data hogs like high-definition streaming video. 802.3bt now adds up to 90W of power over Ethernet to each device, eliminating the need to run power. Self-power sensors and IoT devices can now thrive.

New Tech Tuesdays: Face Recognition Solutions Tommy Cummings
The development of facial recognition continues as society debates the technology's merits and ethics. Meanwhile, as the technology evolves, New Tech Tuesdays is highlighting three facial-recognition products available for solution-based development.

Eight Principles of IoT Security Jackie Padgett
Embedded development engineers face many challenges implementing security measures. Developers can use eight principles to make the task of securing IoT systems much easier. In this post, we will discuss these eight principles.

How Unbreakable is the Blockchain? Jon Gabay
Blockchain security has gained attention and praise from many. Looking at the process, software, and weaknesses leaves doubts as to how effective it really is. So, how secure is blockchain?

Global Access to AI as a Force for Good Jon Gabay
Artificial intelligence conjures up science fiction and terrifying robots. In reality, AI is working for the good, outperforming humans on many levels, and marketed to companies in search of patterns in large data sets. What if it could find these patterns and prevent illnesses?

Understand When and Why System Reliability Matters Christine Young
As much as we try to avoid or prevent it, failure does happen. The important thing is to be prepared for failure, so we can quickly address or resolve it. But not all failures are alike.

How to Increase Container Security Awareness Jeff Fellinge
Docker containers are increasingly the go-to technology for virtualized cloud deployments. Containers are more portable, easier to scale, and can be more secure than traditional virtual machines. But the tools and processes to secure and manage these new technologies must also be container aware or you could have gaps in your defenses.

Steps to Fortifying Your Home Security Jeff Fellinge
With the proliferation of IoT devices, more connected homes, and increasingly savvy attacks, it’s more important than ever to configure the broadband router or modem that connects your home to the internet appropriately.

When Design Engineers Meet Security Concerns Clive  Maxfield
Design engineers must develop sophisticated systems that keep security at the forefront. We’ll explore challenges and some solutions, as well as the impact the Internet of Things has on the development of these designs.

All Authors

Show More Show More
View Blogs by Date