Interconnection


TMC D-subminiature connectors

12 February 2003 Interconnection Information Security

Erni's series TMC subminiature connectors and high-performance multipin, two-piece connectors, are available in five standard sizes to accommodate 9, 15, 25, 37 or 50 contacts. As these connectors are used in all branches of the electronic and electromechanical industries, they are offered with solder wire wrap or press-in terminations. Straight and right-angled dip-solder terminations are available for direct mounting on PCBs.

Each connector consists of a male part (P) and female part (S). On the mating side the connector is equipped with the well-known trapezoidal protective collar to provide mechanical protection against any twisting or unintentional touching of the contact elements. The contacts are gold-plated in the contact area and terminations may either be gold-plated or tin-plated.

A particular characteristic of Erni connectors is the high degree of contact reliability which is achieved through the special design of the contact elements, resulting in extremely low and constant contact resistance. In respect of resistance to vibration, there is no evidence of resonance effects on the female elements so that even severe shock and vibration does not disturb the reliability of the contacts.

Tapered entries ensure easy and reliable entry of the male contact pins into the female counterparts. And for special applications (rack mounting) 'float-mounting' connectors are available. Erni cable housings (hoods) with screw lock slide or latches complement the range.



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Omniball through-hole contacts
Spectrum Concepts Interconnection
Mill-Max has introduced an expansion to its Omniball spring-loaded contact range with a new series of through-hole mount Omniball pins designed for robust and versatile interconnect solutions.

Read more...
Clearing the Static: ESD containers and packaging
Actum Circuit & System Protection
         Vacuum forming ESD Electronic components can be damaged by electrostatic discharges. To protect against such damage, electronic assembly parts are often transported or stored in vacuum formed component ...

Read more...
Phoenix’s Push-X range is growing
Phoenix Contact Interconnection
With the new XT 1,5 terminal blocks, Phoenix Contact is extending the series to include versions for conductor cross-sections from 0,34 to 2.5 mm2.

Read more...
Connector range for demanding environments
Future Electronics Interconnection
TE Connectivity’s DEUTSCH connector range offers high-performance interconnect solutions engineered for demanding environments where reliability and durability are essential.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved