India - Flag India

Please confirm your currency selection:

Indian Rupee
Incoterms:FCA (Shipping Point)
Duty, customs fees and taxes are collected at time of delivery.
Payment accepted in Credit cards only

US Dollars
Incoterms:FCA (Shipping Point)
Duty, customs fees and taxes are collected at time of delivery.
All payment options available

Are you sure you want to log out of your MyMouser account?
Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Securing IoT Products from Unique Threats Sravani Bhattacharjee
IoT products are vulnerable to several attack vectors and are frequently hacked for the lack of adequate security measures. This blog discusses the unique challenges of securing IoT and presents a methodical 4-tier system design approach to predictably secure IoT products.

Next-generation Firewalls: More than ACL Filters Jeff Fellinge
Next-generation firewall capabilities and features now extend far beyond their traditional predecessors and are worth a serious look for many different scenarios from small-home office to enterprise.

Li-Fi: Wireless Connections Without Radios Charles Byers
The emerging technologies of Visible Light Communication, Free-Space Optical Networking, and Li-Fi offer many of the advantages of wireless technologies like Wi-Fi, but without the problems associated with RF spectrum use. We will explore some of the associated tradeoffs and recent advancements.

The Underlying Chemistry of Piezo Materials Liam Critchley
The electrical properties of both piezoelectric and piezoresistive materials change when subjected to mechanical deformation. Here, we show how and why these electrical changes are due to changes within the crystal structure at the atomic level and the chemistry involved with these changes.

Protect Device Communication Through Secure Protocols Jeff Fellinge
Stop attackers from snooping or tampering with your data by ensuring that your devices and systems use secure protocols for communicating with each other and other services across the internet and in the cloud.

How Device Inventory and Dependency Management Help Secure Larger Systems Jeff Fellinge
Building and maintaining a solid inventory of all on-premise and cloud-based assets with helpful metadata is a critical step to ensuring your security programs include all of your systems.

Keeping the Lights On: ESD and Thermal Protection for LED Lighting Systems TDK
There are several factors that can affect solid-state lighting including stress, packaging-related, and component-related issues. Discover the key threats that affect the reliability of LED lighting systems.

Threat Modeling Your Device Operations Helps Identify Unwanted Exposure Jeff Fellinge
Discover potential vulnerabilities and predict how your devices, network, and operations would survive an attack by performing regular threat modeling.

Connected-Home Tech Falls Short but the Future is Bright Steven Keeping
While smart-home devices are gaining traction, the truly connected home remains a dream. Engineers are working on interim solutions to meld disparate wireless technologies, with some success, but a single smart-home solution is far in the future.

Does Wi-Gig Have a Place in Wi-Fi’s Future? Barry Manz
Wi-Gig was created to make very-high-speed file transfers possible over a short distance, but Wi-Fi 6 (802.1ax) is coming and it will do that too, without the challenges presented by the use of millimeter wavelengths.

All Authors

Show More Show More
View Blogs by Date