Interconnection


High voltage PCB terminals for UL 600 V device approvals

29 January 2003 Interconnection Information Security

The HV high voltage PCB terminals in the MKDSP 10 series of PCB terminals from Phoenix Contact are designed as individual terminals in combination with pitch spacers, enabling adaptation to meet individual high voltage requirements, in particular as set down by UL (Underwriters' Laboratories).

The high voltage PCB terminal with 10,16 mm pitch without pitch spacers enables 600 V UL device applications. Here the insulation requirements of the respective device regulations such as UL 508 and UL 840 in respect of PCB mounting are to be observed. By using the RZ pitch spacer, the PCB terminal becomes a 12,7 mm pitch 600 V UL PCB terminal.

Both terminal types are available as two- or three-terminal preassembled terminal blocks. Versions with higher numbers of terminals can be produced on request.



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Omniball through-hole contacts
Spectrum Concepts Interconnection
Mill-Max has introduced an expansion to its Omniball spring-loaded contact range with a new series of through-hole mount Omniball pins designed for robust and versatile interconnect solutions.

Read more...
Cellular routers for explosive areas
Phoenix Contact Telecoms, Datacoms, Wireless, IoT
Updated versions of the Cellulink outdoor cellular router product range from Phoenix Contact are now available; they have been specially developed for use in Zone 2 potentially explosive areas.

Read more...
Phoenix’s Push-X range is growing
Phoenix Contact Interconnection
With the new XT 1,5 terminal blocks, Phoenix Contact is extending the series to include versions for conductor cross-sections from 0,34 to 2.5 mm2.

Read more...
Connector range for demanding environments
Future Electronics Interconnection
TE Connectivity’s DEUTSCH connector range offers high-performance interconnect solutions engineered for demanding environments where reliability and durability are essential.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved