Electronics Technology


Samtec rated no. 1

19 November 2003 Electronics Technology Information Security

For the seventh year in a row Samtec was ranked no. 1 in the Bishop and Associates "2002 customer survey of the electronic connector industry."

Bishop and Associates, a connector industry consulting firm, completed its annual 'US customer survey of the electronic connector industry' (see www.bishopinc.com). This survey is one of the largest industry reports published. It ranks what attributes are important to customers when selecting connector companies, and it compares customers' perceptions of 34 top connector manufacturers.

Samtec received the highest overall rating of the 34 connector companies surveyed.

Some of the most important criteria when selecting connector suppliers are: product quality; meeting requested shipping date; overall connector performance; meeting acknowledged shipping date; reasonable lead times.

Samtec was ranked no. 1 in performance on these 'most important criteria' measuring quality, on-time delivery, connector performance and lead times. It was ranked no. 1 in overall performance for all companies, all evaluations, and also no. 1 by both engineering and purchasing, and by CEMS and distributors.



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

What is an RF connector?
Spectrum Concepts Editor's Choice Interconnection
If you look across the broader electromagnetic spectrum, the selection of the 3 kHz to 300 GHz frequency range for RF signals is a result of a balance between propagation characteristics, data transmission requirements, regulatory allocations, and the compatibility of electronic components and devices.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Expanded magnetic connector lineup
Spectrum Concepts Interconnection
Mill-Max has expanded its Maxnetic lineup to offer more options for connections and terminations, including board-to-board, cable-to-board, and cable-to-cable choices.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Zero Trust and user fatigue
Access Control & Identity Management Information Security
Paul Meyer, Security Solutions Executive, iOCO OpenText, says implementing Zero Trust and enforcing it can create user fatigue, which only leads to carelessness and a couldn’t care attitude.

Read more...
Passwordless, unphishable web browsers
Access Control & Identity Management Information Security
Passkey technology is proving to be an easily deployed way to bring unphishable, biometric-based security to browsers; making identification and authentication much more secure and reliable for all parties.

Read more...