Canada - Flag Canada

Please confirm your currency selection:

Canadian Dollars
Incoterms:DDP
All prices include duty and customs fees on select shipping methods.
Free shipping on most orders over $100 (CAD)

US Dollars
Incoterms:FCA (Shipping Point)
Duty, customs fees and GST collected at time of delivery.
Free shipping on most orders over $100 (USD)

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Practical Tips for Embedded System Security Mike Parks
The sheer number of embedded system devices makes them an increasingly valuable target for bad actors looking to run illegal botnets and cryptocurrency mining operations. This blog outlines practical security measures developers can use in their embedded designs.

Securing the Edge in an Insecure World Robin Mitchell
With more than 21 billion IoT devices worldwide and an increased reliance on cloud computing, security is critical. Yet, billions of devices remain vulnerable to attack. How did the industry become so insecure, what is edge computing, and how can it, along with hardware, improve edge device security?

The IoT Machine Authentication Dilemma Jon Gabay
There are more machine-to-machine communications today than person-to-person. Securing the exponentially growing number of IoT devices is no simple task. Can a device authenticate who it is talking to? If everything can be accessed from anywhere, is anything truly safe?

Establishing Secure Authentication in Automotive Paul Golata
Maxim Integrated, now a part of Analog Devices, offers solutions that ensure vehicle safety and reliability by authenticating automotive components. Learn how the DS28E40 DeepCover® Automotive 1-Wire Authenticator provides embedded security for automotive applications.

Edge Security in an Insecure World M. Tim Jones
Security is often an afterthought in edge device design. Edge devices can be secured when you understand how they can be exploited. In this blog, we'll explore access security, data security, and manageability as the means to ensure your edge device doesn't become the next security incident headline.

Eight Principles of IoT Security Jackie Padgett
Embedded development engineers face many challenges implementing security measures. Developers can use eight principles to make the task of securing IoT systems much easier. In this post, we will discuss these eight principles.

Windows Subsystem Boosts Linux 2.0 Jeff Fellinge
Windows Subsystem for Linux 2.0 advances Microsoft’s commitment to enhance interoperation with Linux environments with increased file system performance and better support for Linux system calls. WSL 2 promises to bring more Linux tools to your Windows workstation without having to spin up a separate virtual machine or remotely connect to another system.

How to Increase Container Security Awareness Jeff Fellinge
Docker containers are increasingly the go-to technology for virtualized cloud deployments. Containers are more portable, easier to scale, and can be more secure than traditional virtual machines. But the tools and processes to secure and manage these new technologies must also be container aware or you could have gaps in your defenses.

Steps to Fortifying Your Home Security Jeff Fellinge
With the proliferation of IoT devices, more connected homes, and increasingly savvy attacks, it’s more important than ever to configure the broadband router or modem that connects your home to the internet appropriately.

When Design Engineers Meet Security Concerns Clive Maxfield
Design engineers must develop sophisticated systems that keep security at the forefront. We’ll explore challenges and some solutions, as well as the impact the Internet of Things has on the development of these designs.

All Authors

Show More Show More
View Blogs by Date