Skip to content
SME Search Search Results

Displaying 71-80 of 292 results for

2021 clear Smart Manufacturing clear Quality/Inspection/Test clear Additive Manufacturing & 3D Printing clear Cybersecurity clear Materials clear Assembly & Joining clear Casting clear Welding & Cutting clear

IMA Group gets with the edge learning program

AI’s learning ability is moving to the compute edge. And manufacturers will be a major beneficiary. I realized the usefulness of being able to run AI on small computer processing power while working with NASA in 2010.

Formlabs Expands Additive Manufacturing Reach with Fuse 1 SLS Printer

Formlabs, known for its line of desktop stereolithography (SLA) printers, is looking to expand its 3D printing reach with availability of its new Fuse 1 benchtop industrial selective laser sintering (SLS) 3D printer. Under development for nearly seven years, the Fuse 1 marks a notable change for Formlabs as they expand into a new additive manufacturing process.

Building Your Toolbox to Accelerate Digital Transformation

How to step on the gas with regard to the long-planned digital transformation in manufacturing? Jaci Sager, VC Portfolio Manager at Caterpillar, and Paul Boris, Chief Revenue Officer at Praemo, have some answers. For teams that are seeing success, is it the technology they chose? Is it the leaders tasked with facilitating it? Or is it some combination of both? The answer might seem obvious, but the path is not.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.