Interconnection


Waterproof in-line Ethernet cable joiner

25 August 2004 Interconnection Information Security

To complement Bulgin's Buccaneer range of waterproof Ethernet connectors is a new in-line cable joiner that can provide a robust, economic, sealed connector for in-line network connections.

Dust and waterproof to IP68, the tough body houses an RJ45 coupler. Supplied with a choice of three couplers; the PX0777/UTP has an unshielded (UTP) coupler, the PX0777/STP a shielded (STP) coupler and the PX0777/CAT5ESTP a shielded coupler to Cat5e. This format allows any standard patchcord, RJ45 connectors and most Ethernet cables to be used.

Moulded in a black UL94V-0 rated material the connector is supplied with cable glands to suit cables from 3,5 mm to 8 mm diameter. Designed for easy field termination, the PX0777 offers an effective cable joining solution for LAN cables in harsh industrial environments.





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Omniball through-hole contacts
Spectrum Concepts Interconnection
Mill-Max has introduced an expansion to its Omniball spring-loaded contact range with a new series of through-hole mount Omniball pins designed for robust and versatile interconnect solutions.

Read more...
Phoenix’s Push-X range is growing
Phoenix Contact Interconnection
With the new XT 1,5 terminal blocks, Phoenix Contact is extending the series to include versions for conductor cross-sections from 0,34 to 2.5 mm2.

Read more...
Connector range for demanding environments
Future Electronics Interconnection
TE Connectivity’s DEUTSCH connector range offers high-performance interconnect solutions engineered for demanding environments where reliability and durability are essential.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved