中国 - 标记 中国

请确认您选择的货币:

人民币
国际贸易术语:DDP
All prices include duty and customs fees.

您是否确定要退出您的“MyMouser”账户?
Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


PKI Certificate Standards for IIoT Sravani Bhattacharjee
The security community is gravitating towards PKI to secure IoT. However, PKI certificates are considerably resource-intensive. This blog discusses the challenges of using PKI certificates for IoT as well as the new standards to overcome those challenges.

Penetration Testing and the Edge M. Tim Jones
Penetration testing (pen testing) is the evaluation of a network or device against known exploits using a variety of different types of tools. In this blog, you'll learn about Kali Linux, Metasploit, and some of the basic tools of the trade used to evaluate the security of edge devices.

Bluetooth® Heads in New Direction Steven Keeping
An upgrade to the Bluetooth® Core Specification, Bluetooth 5.1, adds direction finding capabilities. The enhancement promises much for applications such as indoor navigation, but implementation is challenging even for the experienced RF engineer.

Use the Renesas AE-CLOUD2 to Send GPS Data to the Google Cloud IoT Greg Toth
Use this kit to prototype sensor and location tracking applications that connect to the Google Cloud IoT via Ethernet, Wi-Fi, or LTE Cat-M1/Cat-NM1/EGPRS LTE cellular networks. Create applications that read sensors, connect to the Internet, and communicate real-time sensor data to the Google Cloud.

Connecting to the Google Cloud IoT with the AVR-IoT WG Eval Board Greg Toth
The Microchip AC164160 AVR-IoT WG Evaluation Board allows you to prototype sensor applications using a secure-element cryptographic coprocessor and low-power microcontroller to securely connect to the Google Cloud IoT.

Help Defenders Effectively Investigate Incidents with Event Logs Jeff Fellinge
Event logs include a treasure trove of information that security defenders rely on to investigate and resolve security incidents. Help your defenders quickly and effectively respond to incidents by carefully choosing which events to log and the pertinent information to include.

Edge Security in an Insecure World M. Tim Jones
Security is often an afterthought in edge device design. Edge devices can be secured when you understand how they can be exploited. In this blog, we'll explore access security, data security, and manageability as the means to ensure your edge device doesn't become the next security incident headline.

Router Security Vulnerabilities Could Compromise the IoT Steven Keeping
Wi-Fi routers offer a cheap, convenient gateway to connect IoT sensors to the Cloud, but tests reveal the devices have weak security. As the IoT grows, they could prove even more enticing targets for hackers. New developments bring more protection, but other technologies could prove a better option.

Securing IoT Products from Unique Threats Sravani Bhattacharjee
IoT products are vulnerable to several attack vectors and are frequently hacked for the lack of adequate security measures. This blog discusses the unique challenges of securing IoT and presents a methodical 4-tier system design approach to predictably secure IoT products.

Next-generation Firewalls: More than ACL Filters Jeff Fellinge
Next-generation firewall capabilities and features now extend far beyond their traditional predecessors and are worth a serious look for many different scenarios from small-home office to enterprise.

所有作者

显示更多 显示更多
按日期查看博客