Bench Talk | Communications
 
Canada - Flag Canada

Please confirm your currency selection:

Canadian Dollars
Incoterms:DDP
All prices include duty and customs fees on select shipping methods.
Free shipping on most orders over $100 (CAD)

US Dollars
Incoterms:FCA (Shipping Point)
Duty, customs fees and GST collected at time of delivery.
Free shipping on most orders over $100 (USD)

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


The IoT Machine Authentication Dilemma Jon Gabay
There are more machine-to-machine communications today than person-to-person. Securing the exponentially growing number of IoT devices is no simple task. Can a device authenticate who it is talking to? If everything can be accessed from anywhere, is anything truly safe?

Establishing Secure Authentication in Automotive Paul Golata
Maxim Integrated, now a part of Analog Devices, offers solutions that ensure vehicle safety and reliability by authenticating automotive components. Learn how the DS28E40 DeepCover® Automotive 1-Wire Authenticator provides embedded security for automotive applications.

Power over Ethernet Pushes Forward Jon Gabay
Wired Ethernet provides a more secure connection and will not bog down wireless networks for data hogs like high-definition streaming video. 802.3bt now adds up to 90W of power over Ethernet to each device, eliminating the need to run power. Self-power sensors and IoT devices can now thrive.

New Tech Tuesdays: Track Assets with these LoRaWAN® Solutions Tommy Cummings
Long Range Wide Area Network (LoRaWAN®) products can cast a wide communications net, which leads to more effective wireless monitoring and management. This week's New Tech Tuesday highlights two LoRaWAN® products available to designers for solution-based development.

Steps to Fortifying Your Home Security Jeff Fellinge
With the proliferation of IoT devices, more connected homes, and increasingly savvy attacks, it’s more important than ever to configure the broadband router or modem that connects your home to the internet appropriately.

SSH Part 3: Configuring SSH Reverse Tunnel to Reduce Exposed Ports Jeff Fellinge
You can use the Secure Shell (SSH) standard and tools for more than just secure remote administration. Learn how to use SSH port forwarding to securely connect to remote systems without exposing them to insecure networks.

SSH Part 2: Configuring SSH from a Windows 10 Workstation Jeff Fellinge
Microsoft’s support for the Windows Subsystem for Linux and the OpenSSH standard increases your options to manage Linux-based cloud environments and IoT devices. Use these tools to securely authenticate your devices and encrypt all communications.

All Authors

Show More Show More
View Blogs by Date