India - Flag India

Please confirm your currency selection:

Indian Rupee
Incoterms:FCA (Shipping Point)
Duty, customs fees and taxes are collected at time of delivery.
Payment accepted in Credit cards only

US Dollars
Incoterms:FCA (Shipping Point)
Duty, customs fees and taxes are collected at time of delivery.
All payment options available

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Use the Renesas AE-CLOUD2 to Send GPS Data to the Google Cloud IoT Greg Toth
Use this kit to prototype sensor and location tracking applications that connect to the Google Cloud IoT via Ethernet, Wi-Fi, or LTE Cat-M1/Cat-NM1/EGPRS LTE cellular networks. Create applications that read sensors, connect to the Internet, and communicate real-time sensor data to the Google Cloud.

Connecting to the Google Cloud IoT with the AVR-IoT WG Eval Board Greg Toth
The Microchip AC164160 AVR-IoT WG Evaluation Board allows you to prototype sensor applications using a secure-element cryptographic coprocessor and low-power microcontroller to securely connect to the Google Cloud IoT.

Help Defenders Effectively Investigate Incidents with Event Logs Jeff Fellinge
Event logs include a treasure trove of information that security defenders rely on to investigate and resolve security incidents. Help your defenders quickly and effectively respond to incidents by carefully choosing which events to log and the pertinent information to include.

Edge Security in an Insecure World M. Tim Jones
Security is often an afterthought in edge device design. Edge devices can be secured when you understand how they can be exploited. In this blog, we'll explore access security, data security, and manageability as the means to ensure your edge device doesn't become the next security incident headline.

Router Security Vulnerabilities Could Compromise the IoT Steven Keeping
Wi-Fi routers offer a cheap, convenient gateway to connect IoT sensors to the Cloud, but tests reveal the devices have weak security. As the IoT grows, they could prove even more enticing targets for hackers. New developments bring more protection, but other technologies could prove a better option.

Securing IoT Products from Unique Threats Sravani Bhattacharjee
IoT products are vulnerable to several attack vectors and are frequently hacked for the lack of adequate security measures. This blog discusses the unique challenges of securing IoT and presents a methodical 4-tier system design approach to predictably secure IoT products.

Next-generation Firewalls: More than ACL Filters Jeff Fellinge
Next-generation firewall capabilities and features now extend far beyond their traditional predecessors and are worth a serious look for many different scenarios from small-home office to enterprise.

Protect Device Communication Through Secure Protocols Jeff Fellinge
Stop attackers from snooping or tampering with your data by ensuring that your devices and systems use secure protocols for communicating with each other and other services across the internet and in the cloud.

How Device Inventory and Dependency Management Help Secure Larger Systems Jeff Fellinge
Building and maintaining a solid inventory of all on-premise and cloud-based assets with helpful metadata is a critical step to ensuring your security programs include all of your systems.

Threat Modeling Your Device Operations Helps Identify Unwanted Exposure Jeff Fellinge
Discover potential vulnerabilities and predict how your devices, network, and operations would survive an attack by performing regular threat modeling.

All Authors

Show More Show More
View Blogs by Date