United States - Flag United States

Please confirm your currency selection:

Are you sure you want to log out of your MyMouser account?
Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Bluetooth® Heads in New Direction Steven Keeping
An upgrade to the Bluetooth® Core Specification, Bluetooth 5.1, adds direction finding capabilities. The enhancement promises much for applications such as indoor navigation, but implementation is challenging even for the experienced RF engineer.

Use the Renesas AE-CLOUD2 to Send GPS Data to the Google Cloud IoT Greg Toth
Use this kit to prototype sensor and location tracking applications that connect to the Google Cloud IoT via Ethernet, Wi-Fi, or LTE Cat-M1/Cat-NM1/EGPRS LTE cellular networks. Create applications that read sensors, connect to the Internet, and communicate real-time sensor data to the Google Cloud.

Connecting to the Google Cloud IoT with the AVR-IoT WG Eval Board Greg Toth
The Microchip AC164160 AVR-IoT WG Evaluation Board allows you to prototype sensor applications using a secure-element cryptographic coprocessor and low-power microcontroller to securely connect to the Google Cloud IoT.

Help Defenders Effectively Investigate Incidents with Event Logs Jeff Fellinge
Event logs include a treasure trove of information that security defenders rely on to investigate and resolve security incidents. Help your defenders quickly and effectively respond to incidents by carefully choosing which events to log and the pertinent information to include.

Edge Security in an Insecure World M. Tim Jones
Security is often an afterthought in edge device design. Edge devices can be secured when you understand how they can be exploited. In this blog, we'll explore access security, data security, and manageability as the means to ensure your edge device doesn't become the next security incident headline.

Router Security Vulnerabilities Could Compromise the IoT Steven Keeping
Wi-Fi routers offer a cheap, convenient gateway to connect IoT sensors to the Cloud, but tests reveal the devices have weak security. As the IoT grows, they could prove even more enticing targets for hackers. New developments bring more protection, but other technologies could prove a better option.

Securing IoT Products from Unique Threats Sravani Bhattacharjee
IoT products are vulnerable to several attack vectors and are frequently hacked for the lack of adequate security measures. This blog discusses the unique challenges of securing IoT and presents a methodical 4-tier system design approach to predictably secure IoT products.

Next-generation Firewalls: More than ACL Filters Jeff Fellinge
Next-generation firewall capabilities and features now extend far beyond their traditional predecessors and are worth a serious look for many different scenarios from small-home office to enterprise.

Protect Device Communication Through Secure Protocols Jeff Fellinge
Stop attackers from snooping or tampering with your data by ensuring that your devices and systems use secure protocols for communicating with each other and other services across the internet and in the cloud.

How Device Inventory and Dependency Management Help Secure Larger Systems Jeff Fellinge
Building and maintaining a solid inventory of all on-premise and cloud-based assets with helpful metadata is a critical step to ensuring your security programs include all of your systems.

All Authors

Show More Show More
View Blogs by Date