Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


New Tech Tuesdays: Progression of Authentication: Comparing Passwords, Passphrases, and Passkeys Rudy Ramos
Human errors and behaviors pose the biggest vulnerabilities in cybersecurity. With password security issues at the top of the list, understanding authentication best practices has never been so important. Continuous education and a security-conscious culture are essential in mitigating these risks.

Why Blockchain and IoT Belong Together Tyler Wojciechowicz
IoT and blockchain technologies are taking off in many diverse industries. But have you considered combining the two together? Learn how an IoT-enabled blockchain unlocks process efficiencies, increases security, and allows for cost-savings.

How IoT System Design Makes a Difference Sravani Bhattacharjee
In highly competitive IoT markets, it is hard to ensure secure design without tilting tight pricing and time-to-market. We’ll discuss a systematic, full-stack approach that simplifies security design for IoT systems by leveraging various security enabler solutions.

How Blockchain Protects Smart Cities Data Paul Golata
Distributed ledger technology is at the heart of blockchain. Blockchain enables smart city data to be securely captured and manipulated without interference from malicious third parties. Take a walk around the block of the smart city of tomorrow to learn about blockchain component considerations.

Hardware-based Trust Is Critical for Securing IoT Sravani Bhattacharjee
Designers can learn the crucial role of silicon-based security, and useful methodologies to embed trust in IoT hardware by applying the security principles of trusted computing to Internet of Things devices and architectures.

How to Secure Internet of Things Systems Charles Byers
As IoT systems become mission-critical, their security capabilities must keep pace. The addition of actuators to IoT systems creates the alarming potential for security breaches or hacking to injure or kill people. Hardware and software techniques described here can help keep IoT systems secure.

The IoT Security Gamble Stephen Evanczuk
IoT developers face tough choices in juggling functionality, performance, and cost in the design of resource-constrained devices. When security loses out in tradeoff decisions, development organizations are taking a significant gamble.

All Authors

Show More Show More
View Blogs by Date
PrevNext
May 2025
SuMoTuWeThFrSa
    123
45678910
11121314151617
18192021222324
25262728293031

Archives