臺灣 - 標誌 臺灣

請確認您的貨幣選擇:

新臺幣
國際貿易術語:貨交承運人(裝運地點)
關稅、海關手續費和貨物服務稅在交貨時收取。
對於超過 NT$1,400 (TWD) 的訂單免運費
僅接受信用卡支付

美元
國際貿易術語:貨交承運人(裝運地點)
交貨時客戶負責關稅、海關規費和增值稅。
對於超過 $50 (USD) 的訂單免運費
所有支付選項均供選擇

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Keeping Data Secure in a Post-Quantum Computer World Steven Keeping
Encryption protects internet data from cybercriminals. But quantum computers will easily break the keys based on current algorithms. To fight back, engineers have spent years developing post-quantum cryptography algorithms that tomorrow’s computers will find impossible to crack.

AI, IoT, and Sustainability at embedded world North America 2024 Brandon Lewis
Embedded World North America 2024 highlighted cutting-edge advancements in AI, IoT, and sustainability. Keynotes featured open-source solutions for sustainable development, smarter edge security, and low-power AI. Discover the trends shaping 2025 tech.

Key Trends Shaping the Future of Embedded Systems Brandon Lewis
Mouser Electronics will be an exhibitor at the first North American embedded world conference, October 8-10 in Austin, Texas. The event will showcase AI, cybersecurity, open-source, human-machine interfaces, expert panels, keynotes, and Mouser's “Circuit Showdown.”

How to Keep Cryptographic Keys Secure Steven Keeping
The internet exposes data to malicious intents, and while encryption protects it from hackers, cryptographic keys are often mishandled due to lax security procedures. Hardware security modules ensure keys remain secure and beyond the grasp of even the most determined hacker.

The Impact of Zero Trust Architecture on Network Security Engineers Brandon Lewis
Zero trust architectures (ZTAs) are transforming network security by enforcing stringent verification protocols, requiring network engineers to adopt new skills and collaborative approaches. Learn how identity governance, micro-segmentation, and automation are all important in implementing ZTAs.

New Tech Tuesdays: Travel Biometrics and Your Privacy: Part One Rudy Ramos
Several privacy concerns exist surrounding the collection, storage, and future access to biometric data collected at airports. Let’s examine who collects this data, what biometric databases are, and how they affect individual privacy and autonomy.

New Tech Tuesdays: Genesis of ChatGPT: A Revolutionary AI Chatbot Rudy Ramos
The advent of ChatGPT has marked a pivotal moment in the development of artificial intelligence (AI). As AI chatbots become more sophisticated, expect to see innovative and unexpected applications emerge across many industries and domains.

Prioritize Embedded System Security for Edge Applications Brandon Lewis
Utilizing a zero-trust decentralized security framework approach can protect edge devices against threats using layers of defense, from securing the hardware components at the design level to implementing encryption protocols.

New Tech Tuesdays: Empowering Independence: The Impact of GNSS on Elder Care Rudy Ramos
Combining sensing and positioning technologies offers tremendous potential for enhancing the autonomy and well-being of elderly individuals. Enter the MIA-M10 series GNSS modules, providing precise positioning, while privacy-centric designs ensure data security and remote monitoring capabilities.

Build Secure Commercial Products with STM32Trust STMicroelectronics
The complexity of modern embedded hardware designs presents inherent security challenges. STM32 microcontrollers and microprocessors utilize the STM32Trust ecosystem to deliver secure functions to ensure IP protection, data protection, secure connectivity, and overall system integrity for today’s advanced embedded devices.

All Authors

Show More Show More
View Blogs by Date

Archives