Skip to content
SME Search Search Results

Displaying 81-90 of 366 results for

Product Design & Engineering clear Fabrication clear Cybersecurity clear Robotics clear Maintenance & Repairs clear Stamping clear Forming & Fabricating clear Electronics Manufacturing clear Forming & Fabricating clear Welding & Cutting clear

Big Data, Big Results

Hopefully, your manufacturing operations are like shooting fish in a barrel. But without robust machine monitoring and the IIoT, you’re more likely going to be shooting in the dark.

Japanese, German Innovators Broaden Work That Stars ‘Digital Companion’

In preparation for mass customization, for starters, Japanese and German tech research officials today committed to expanding their joint work to establish a “social-technical or maybe ‘cyber-social’ environment where ‘digital companions’ and production lines communicate with humans” working in manufacturing, Andreas Dengel said in an interview with Smart Manufacturing magazine here at the CeBIT (Centrum der Büroautomation und Informationstechnologie und Telekommunikation) fair.

Micromanufacturing is Growing

Many industries have been making parts with micron dimensions for some time, but in the last few years, the market for miniaturization has expanded. The demand is not only for small parts, but also for small complex features on larger parts. This is due chiefly to the switch to modules in which the functions of several parts or subsystems are not handled by a single complex unit.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.