Split core current transducers for telecom applications
7 May 2003Power Electronics / Power Management
Information Security
A new approach for sensors through the HOP, HTR and HT current transducers series has been introduced by LEM.
The series is based on the open loop Hall effect technology principle (allowing AC, DC and pulse current measurements). Current measurements are possible from nominal currents of 50 ARMS up to 2000 ARMS.
Their high performance, compact size, split core, high EMC immunity, isolation, ±4 V instantaneous voltage output, power supply of ±12 to 15 V form the main characteristics. Built in two parts, they can be mounted around a busbar or cable without disconnection and provide non-contact measurement of current without disruption. Simple and quick to install, they are particularly suited for retrofit use.
Applications: are for battery monitoring, AC to DC converters, telcom power distribution. All transducers are CE marked.
Claude Mythos wake-up call Technews Publishing
AI & Data Analytics Information Security
AI has crossed a critical cybersecurity threshold and frontier models are accelerating attack lifecycles and will enable attackers to identify and exploit vulnerabilities at scale and speed, through novel methods that were previously the domain of advanced nation-state entities.
Read more...If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.
Read more...NVDC power-path control to 1– 6 cell battery systems iCorp Technologies
Power Electronics / Power Management
SG Micro’s SGM41581 is an I2C-controlled narrow voltage direct charging buck boost charge controller designed to simplify robust power delivery in systems that must seamlessly operate from an adapter input or a battery pack.
Read more...Precise, adaptive battery health-monitoring RS South Africa
Power Electronics / Power Management
New fuel gauge solution from Nordic delivers State-of-Health reporting, adaptive battery modelling, and seamless fleet observability via nRF Cloud.
Read more...Compact 6 A automotive buck converter Altron Arrow
Power Electronics / Power Management
Delivering up to 6 A of continuous output current, the DCP0606Y from STMicroelectronics enables efficient regulation of low-voltage rails commonly used in modern vehicle electronics and industrial systems.
Read more...The new role of UPS technology in high-precision automation Omron Electronics
Power Electronics / Power Management
OMRON’s BU_2SW and BU_2RWL series UPS systems are engineered to offer a robust, online type power architecture designed to safeguard sensitive AC powered systems across a wide range of industries.
Read more...NEC XON secures mobile provider’s hybrid identities NEC XON
Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.
Read more...Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.
Read more...Rugged railway-grade DC-DC power modules iCorp Technologies
Power Electronics / Power Management
iCorp Technologies has introduced the AIPUPOWER ZCD100 and ZCD150 Series, a family of rugged DC-DC converters designed to meet the demanding electrical and environmental requirements of railway and transportation systems.
Read more...New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.
While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.