Skip to content
SME Search Search Results

Displaying 31-40 of 114 results for

2021 or earlier clear Plastics Manufacturing clear Stamping clear Forming & Fabricating clear Cybersecurity clear Maintenance & Repairs clear Product Design & Engineering clear Finishing & Coatings clear Electronics Manufacturing clear Casting clear

Siemens Emphasizes Integrated Toolsets at Conference

There is still a lot of talk about breaking down the “silos” within a manufacturing enterprise. Siemens, like other software providers, is trying to address the problem by offering toolsets that are easier to integrate and work together.

Today’s Grinders Must Do It All for HMLV Production

When it comes to the production of high-precision parts for industries ranging from aerospace to medical, grinding remains the best, most cost-effective approach to obtaining fine surface finishes and tight tolerances.

Micromanufacturing is Growing

Many industries have been making parts with micron dimensions for some time, but in the last few years, the market for miniaturization has expanded. The demand is not only for small parts, but also for small complex features on larger parts. This is due chiefly to the switch to modules in which the functions of several parts or subsystems are not handled by a single complex unit.

Try Feature-Based PLE

Feature-based Product Line Engineering refers to the engineering of a portfolio of related products using a shared set of engineering assets, a managed set of features, and an automated means of production.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.