Skip to content
SME Search Search Results

Displaying 71-80 of 199 results for

2021 or earlier clear Cybersecurity clear Materials clear Fabrication clear Maintenance & Repairs clear Plant Engineering & Maintenance clear Assembly & Joining clear Casting clear

Coatings Expand Cutting Tool Capabilities, Reach New Markets

When first introduced in the late 1970s, cutting tool coatings—especially titanium nitride (TiN)—were embraced by tool manufacturers for their ability to extend tool life. As workforce materials have expanded from conventional ferrous and nonferrous metals to exotic alloys, composites, ceramics, and others, coatings have likewise progressed and, thanks to new formulations and deposition methods, are extending cutting tool capabilities as well as tool life.

Consider Fire Requirements When Specifying Composites

With the use of composites in demanding applications increasing, improving knowledge of their fire performance is becoming a safety-critical issue, particularly for building and transportation applications.

Advanced Technologies Supplement: Processes Reduce Composite Costs

Composites engineers are expanding their craft to build more complex, durable parts at higher production volumes. One way they are achieving this objective is by using infusion-molding processes based on Resin Transfer Molding (RTM) and Vacuum Assisted Resin Transfer Molding (VARTM).

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.