Passive Components


Buzzers on tape can be automatically processed

7 April 2004 Passive Components Information Security

If a buzzer can be made small enough, it can be delivered in tape ready for automatic processing. Murata has done this, and with no reduction in sound pressure level (SPL). The PKLCS1212E is 12 x 12 mm and taped on reels of 1000 pieces. It can be reflow soldered and has gold terminals, eliminating the need for lead (Pb) and making it compatible with conductive adhesive mounting.

Soldered or otherwise, the ability to process buzzers automatically gives high volume manufacturers a major improvement in productivity. There are other advantages too, piezo buzzers use less current than dynamic types and produce no magnetic disturbance.

Murata's minimum SPL of 75 dB is specified at 4 kHz, with a 3 V peak-to-peak square wave at 10 cm, and the operating temperature range is -20 to 70°C.





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Compact high-current power inductor
EBV Electrolink Passive Components
Vishay’s IHLP series power inductors deliver high current capability in an ultra-low profile, magnetically shielded design.

Read more...
Tiny noise suppression filters
RS South Africa Passive Components
TDK Corporation recently announced its latest noise suppression filters of the MAF0603GWY series, which measure only 0,6 x 0,3 x 0,3 mm.

Read more...
Compact 1250 V choke solution
Electrocomp Passive Components
TDK Corporation has introduced a new high-voltage common-mode choke series designed to support more compact and efficient 1250 V DC converter architectures in next-generation power electronics.

Read more...
Claude Mythos wake-up call
Technews Publishing AI & Data Analytics Information Security
AI has crossed a critical cybersecurity threshold and frontier models are accelerating attack lifecycles and will enable attackers to identify and exploit vulnerabilities at scale and speed, through novel methods that were previously the domain of advanced nation-state entities.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
Tiny power inductor for low noise applications
iCorp Technologies Passive Components
With the evolution of Bluetooth, chips, sensors and other technologies, the design of TWS earphones is becoming smaller and thinner, and the performance and size requirements of integrated inductors need to follow suit.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved