Hermaphroditic connectors help reduce costs and increase flexibility
22 September 2004Interconnection
Fire & Safety
Information Security
Integrated Solutions
Samtec offers three combination socket/terminal interface systems on 2,54, 2 and 0,635 mm pitch. These hermaphroditic connectors are self-mating, and therefore can reduce inventory costs by reducing the number of part numbers that must be stocked. All systems feature polarisation to prevent incorrect mating and audible 'clicks' to verify proper seating.
The 2,54 mm pitch system (LST Series) provides up to 60 I/Os and a board spacing of 13,60 mm. It features Samtec's Tiger Buy contacts. Application specific designs are available for other configurations and spacings.
On 2 mm pitch, a fully shrouded and keyed system (LS2 Series) provides up to 60 I/Os and a 9,65 mm board-to-board spacing. Right-angle designs are available for perpendicular and co-planar board mating. Application specific designs are available for other board spacings.
For micro pitch applications, a system on 0,635 mm pitch (LSS Series) provides full shrouding and board spacings from 6 mm to 12 mm and up to 100 I/Os.
For more information contact Quentin van den Bergh, Arrow Altech Distribution, +27 (0)11 923 9600, [email protected]
Choosing the right interconnect strategy Spectrum Concepts
Interconnection
[Sponsored] PCI Express (PCIe) has become the backbone of modern high-performance systems with each new generation promising higher bandwidth; but that performance comes with a cost.
Read more...Compact connector integration cable grommet
Interconnection
icotek has expanded its IMAS-CONNECT adapter system with the introduction of the AT-HA grommet, a compact solution designed to simplify the integration of industrial connectors into cable entry systems.
Read more...Outdoor rated high density cable entry
Interconnection
icotek has introduced the KEL-DPU-OD cable entry plate, a rugged solution engineered for applications exposed to intense UV radiation, weathering, and wide temperature variations.
Read more...Compact 6 A automotive buck converter Altron Arrow
Power Electronics / Power Management
Delivering up to 6 A of continuous output current, the DCP0606Y from STMicroelectronics enables efficient regulation of low-voltage rails commonly used in modern vehicle electronics and industrial systems.
Read more...Next-gen modules for rugged edge AI systems Altron Arrow
Computer/Embedded Technology
Designed for real-world edge deployments where systems do not sit still, SolidRun’s P100 COMx6 series targets mobile platforms as well as harsh, mission-critical environments.
Read more...NEC XON secures mobile provider’s hybrid identities NEC XON
Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.
Read more...Data privacy best practices for physical security teams Genetec
Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.
Read more...Gallagher Security strengthens KwaZulu-Natal presence Gallagher
News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.
Read more...Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.
Read more...New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.
While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.