Hybrid choke eliminates two extra components
17 November 2004
Electronics Technology
Information Security
Murata developed a device to suppress conducted and radiated disturbance with using one component instead of the usual three. The company's hybrid choke coil (HCC) is both a common mode and a differential mode choke, which provides better noise suppression at frequencies above 30 MHz than discrete filters for each mode. The PLY17 range of HCCs, in a 24,5 x 22,5 mm package 12,5 mm high, offers 10 common mode inductance values between 1,0 and 9,3 mH. Each value comes as standard or high performance option.
Further reading:
Smart surveillance and cyber resilience
Axis Communications SA
Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.
Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.
Read more...
140 W USB-C PD reference design
Altron Arrow
Electronics Technology
The design has a wide input range of 90 to 264 V AC, 50-60 Hz, and supports an output voltage range of 5 to 28 V (USB-PD 3.1 specification).
Read more...
Kaspersky detects over 1 million daily tracking attempts
Kaspersky
News & Events Information Security
Kaspersky's latest analysis of the 25 most prevalent web tracking services, including Google services, New Relic and Microsoft, has revealed over 38 billion instances of web trackers collecting user behaviour data in 2024, with an average of one million detections per day.
Read more...
Only 4% of surveyed organisations reported no cyberattacks
News & Events Information Security
As cyber threats escalate in frequency and sophistication, new research reveals an alarmingly high rate of security incidents over the past year, due to a lack of awareness and qualified professionals as key contributing factors.
Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.
Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.
Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.
Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.
Read more...
New tools for investigation and robust infrastructure security
News & Events Information Security
Cybereason continues to enhance its security platform, with recent updates introducing improvements in file search operations, investigation query results, and cloud workload protection, providing more granular data and faster key artefact identification.
Read more...