Skip to content
SME Search Search Results

Displaying 31-40 of 132 results for

Electronics Manufacturing clear Cybersecurity clear Assembly & Joining clear Finishing & Coatings clear

Cool and Interesting Things

For three decades, Darin Gray has spent his days teaching young people to share ideas, learn cool stuff, and above all, make a difference

The Press Shop of the Future Starts Today

Schuler North America showcased its Digital Suite product family for the Press Shop of the Future during the grand opening of its new service facility in Canton, Mich.

Today’s Grinders Must Do It All for HMLV Production

When it comes to the production of high-precision parts for industries ranging from aerospace to medical, grinding remains the best, most cost-effective approach to obtaining fine surface finishes and tight tolerances.

Mazak Joins CyManII as Collaborative Partner

CyManII brings manufacturers and research institutions together to drive digital infrastructure and security for advanced manufacturing, supply chains and workforce development.

Marposs Celebrates 60 Years of Precision in North America

Marposs Corp. celebrates 60 years in North America and is expanding its portfolio with precision measurement equipment and acquisitions, making significant strides in the EV and semiconductor industries while emphasizing innovation and global reach.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.