India - Flag India

Please confirm your currency selection:

Indian Rupee
Incoterms:FCA (Shipping Point)
Duty, customs fees and taxes are collected at time of delivery.
Payment accepted in Credit cards only

US Dollars
Incoterms:FCA (Shipping Point)
Duty, customs fees and taxes are collected at time of delivery.
All payment options available

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Why Blockchain and IoT Belong Together Tyler Wojciechowicz
IoT and blockchain technologies are taking off in many diverse industries. But have you considered combining the two together? Learn how an IoT-enabled blockchain unlocks process efficiencies, increases security, and allows for cost-savings.

IoT Device Management Affects System Design Sravani Bhattacharjee
Gone are the days of manual provisioning of devices and equipment. In the world of the Internet of Things, millions of devices are provisioned and managed using cloud-based services. How does that affect system design? What new factors must be considered during system design?

Unclonable PUF Function Can Boost MCU Security Christine Young
Want to make hacker's life a lot harder—and protect your customers and your business? Learn how a secure microcontroller with physically unclonable function (PUF) technology can be your best friend.

How IoT System Design Makes a Difference Sravani Bhattacharjee
In highly competitive IoT markets, it is hard to ensure secure design without tilting tight pricing and time-to-market. We’ll discuss a systematic, full-stack approach that simplifies security design for IoT systems by leveraging various security enabler solutions.

PKI Certificate Standards for IIoT Sravani Bhattacharjee
The security community is gravitating towards PKI to secure IoT. However, PKI certificates are considerably resource-intensive. This blog discusses the challenges of using PKI certificates for IoT as well as the new standards to overcome those challenges.

Protect Device Communication Through Secure Protocols Jeff Fellinge
Stop attackers from snooping or tampering with your data by ensuring that your devices and systems use secure protocols for communicating with each other and other services across the internet and in the cloud.

Surface Area Management of Embedded Devices through Host and Network Based Firewalls Jeff Fellinge
Lower the risk of a successful attack on your network-connected devices by understanding the network ports and protocols they use and disabling or filtering those they do not need.

Unraveling the Gordian Knot of IoT Security Stephen Evanczuk
Manufacturers may well find that even the most robust technological solutions to IoT security aren’t enough.

Achieving Security Requires Much More Than Just Robust Technology Stephen Evanczuk
Although systems developers can draw on robust security technologies, effective security requires a combination of technologies, practices, and policies—and acceptance by each stakeholder of their own role in maintaining security.

Will IoT Security Solutions Trickle Down or Bubble Up? Stephen Evanczuk
Internet of Things (IoT) security is complex because of the diverse mix of hardware, software, and data involved across multiple layers of various large-scale applications. Despite the increase in security mechanisms and services, IoT security remains fractured and needs a more unified approach.

All Authors

Show More Show More
View Blogs by Date