臺灣 - 標誌 臺灣

請確認您的貨幣選擇:

新臺幣
國際貿易術語:貨交承運人(裝運地點)
關稅、海關手續費和貨物服務稅在交貨時收取。
大多數訂單滿NT$1,400 (TWD)即可免運費
僅接受信用卡支付

美元
國際貿易術語:貨交承運人(裝運地點)
交貨時客戶負責關稅、海關規費和增值稅。
大多數訂單滿$50 (USD)即可免運費
所有支付選項均供選擇

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Why IoT Success Hangs on Interoperability Stephen Evanczuk
The challenges of interoperability add significant costs to the development of an individual IoT application and drastically limit the ability to achieve the full value of complex multi-system applications. While standards organizations are hard at work in addressing different facets of the interoperability puzzle, a more direct approach offers hope.

Biometrics Address Password Flaws Steven Keeping
Password security is flawed—as Hawaiians recently found to their cost—because it relies on humans to create a memorable yet tough-to-hack secret phrase. Biometrics, pioneered by the smartphone’s fingerprint scanner, offers a better alternative.

"Think Like a Hacker" Part 2: Building Secure Systems Andrew Plato
From the security experts at Anitian in partnership with Mouser, here are tangible steps you can take to improve your development processes and minimize risk in the systems you design.

Robots in the Spotlight at 2018 Winter Olympics Barry Manz
The Olympic Games have become as much a showcase for a country’s high-tech capabilities as they are for the sporting events, but this year’s Winter Games in PyeongChang, South Korea takes this trend to a whole new level.

Tech Scores a TD at Super Bowl LII Barry Manz
Super Bowl LII fans in the stands will expect flawless cellular and Wi-Fi performance, and viewers at home will expect multi-view, action-packed, real-time coverage. The mammoth technology infrastructure supporting Super Bowl LII should deliver on both.

“Think Like a Hacker” Part 1: Mindset, Kill Chain, and More Andrew Plato
Hackers approach their work much differently than engineers; rather than taking a systematic approach, they take a kill chain approach to exploit system vulnerabilities. What goes on inside a hacker’s mind is entertainment, chaos, and extreme volatility, so bring some coffee, and let’s delve inside.

A Combo for Innovation: Open Source and Crowdfunding Bruce Byfield
In the last few years, open source and crowdfunding have become a joint force multiplier, leading to new product innovations and a deeper expansion of open source into business.

The IoT Security Gamble Stephen Evanczuk
IoT developers face tough choices in juggling functionality, performance, and cost in the design of resource-constrained devices. When security loses out in tradeoff decisions, development organizations are taking a significant gamble.

Arm TechCon: Securing the IoT is the Call to Action Mouser Staff
Grant Imahara and electronics product experts from Mouser Electronics were at Arm TechCon 2017 to demonstrate how Arm-based products and technologies are shaping smarter cities. This year’s Arm TechCon featured embedded security as the overarching theme in keynotes, presentations, and exhibit floor time.

The Annual Smartphone Upgrade: A Ballet Jack Johnson
Exchanging your old technology can feel like a choreographed dance routine. Are we in the audience—or active participants?

All Authors

Show More Show More
View Blogs by Date

Archives