Bench Talk | Security
 
Singapore - Flag Singapore

Please confirm your currency selection:

Singapore Dollars
Incoterms:DDP
All prices include duty and customs fees on select shipping methods.
Free shipping on most orders over $60 (SGD)

US Dollars
Incoterms:DDP
All prices include duty and customs fees on select shipping methods.
Free shipping on most orders over $50 (USD)

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


MaaS: New Tech Challenges Jon Gabay
Mobility as a Service (MaaS) wants to eliminate internal combustion engines and reduce the number of privately owned vehicles. There are many environmental benefits to this idea if done right. We are at a point now where we can solve the tech problems efficiently.

New Tech Tuesdays: Real Biometric Solutions for Consumer Devices Rudy Ramos
Products that help obtain and process biometric data show great promise in future consumer devices. This week's New Tech Tuesday will look at biometric solution products from Maxim Integrated and Kneron and their potential in consumer devices.

New Tech Tuesdays: Edge Computing Can Take the Edge Off Some Computing Issues Tommy Cummings
In this week's New Tech Tuesday, let's look at artificial intelligence-powered edge computing devices and sensors from Kneron, Advantech, and Axiomtek.

Practical Tips for Embedded System Security Mike Parks
The sheer number of embedded system devices makes them an increasingly valuable target for bad actors looking to run illegal botnets and cryptocurrency mining operations. This blog outlines practical security measures developers can use in their embedded designs.

What Is the Quantum Internet and Who Will Use It? SJ Barak
As if the internet wasn’t overwhelming enough, experts are now touting the advent of the Quantum Internet. But what exactly is the Quantum Internet, and who (and what) is it even for? According to an expert, the answer lies in increased anonymity, security, plowing through sensor data, and more.

Securing the Edge in an Insecure World Robin Mitchell
With more than 21 billion IoT devices worldwide and an increased reliance on cloud computing, security is critical. Yet, billions of devices remain vulnerable to attack. How did the industry become so insecure, what is edge computing, and how can it, along with hardware, improve edge device security?

Protect IoT Applications Using Three Key Security Enablers Stephen Evanczuk
Zero trust security builds on fundamental principles of security, but in the IoT domain, developers can find it easier to conform to those principles by taking advantage of three key security enablers: hardware-based security, defined security policies, and security health monitoring.

Depth Sensors Visualize Volumes Jon Gabay
Many new machines and robots will be able to take advantage of modular 3-D sensing and measurement thanks to the recent Analog Devices’ Time of Flight development kit. As a reference design or an OEM module, volumetric sensing just got easier.

The IoT Machine Authentication Dilemma Jon Gabay
There are more machine-to-machine communications today than person-to-person. Securing the exponentially growing number of IoT devices is no simple task. Can a device authenticate who it is talking to? If everything can be accessed from anywhere, is anything truly safe?

New Tech Tuesdays: RFID Technology Helps Us Keep Track of Virtually Anything Tommy Cummings
In this week's New Tech Tuesday, we'll look at the latest RFID products from STMicroelectronics, Murata Electronics, and NXP Semiconductors.

All Authors

Show More Show More
View Blogs by Date