Skip to content
SME Search Search Results

Displaying 41-50 of 111 results for

2021 clear Maintenance & Repairs clear Measurement & Metrology clear Lasers clear Materials clear Cybersecurity clear Casting clear

A New Way of Integrating Electronics Into Things

Applications for flexible hybrid electronics in aerospace and defense exist in environmental monitoring, biomedical assessment, security, communications, energy generation and storage, computation, supply chain management and asset sustainment.

Discovering the Keys to U.S. Manufacturing Recovery

The COVID-19 pandemic clearly proved challenging to the manufacturing industry in myriad ways. Now, as nations and industries begin to navigate their way forward as restrictions are lifted, manufacturers have an opportunity to put into practice some lessons learned.

Hexagon Debuts AS1 Laser Scanner at FABTECH 2021

Hexagon’s Manufacturing Intelligence division announced the North American debut of its AS1 Scanner will be held at FABTECH 2021, Sept. 13-16, 2021, McCormick Place, Chicago, IL. In Booth A3326 in the South Building.

Sandvik to Acquire DWFritz Automation

Sandvik will acquire DWFritz Automation, a U.S.-based provider of precision metrology, inspection and assembly solutions for advanced manufacturing. DWFritz designs, builds and supports high-speed, non-contact metrology solutions and automation systems.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.