Skip to content
SME Home Search Search Results

Displaying 1-10 of 1142 results for

Search Filters: Lasers clear Stamping clear Forming & Fabricating clear Tooling & Workholding clear Additive Manufacturing & 3D Printing clear Automation clear

Composites for Aerospace: Faster, More Automated

The aerospace industry continues to increase its use of composites, a phenomenon that’s pushing academics, trade groups and manufacturers to research and develop methods to enhance the techniques and tools for using the materials.

More Profitable Toolpaths

Adaptive Milling. Dynamic Motion. hyperMILL. Profit Milling. VoluMill. Waveform machining. If you’re one of the lucky people who machines parts for a living, chances are about 50-50 that you’re using one of these or a comparable high-performance programming technology.

Detroit Tigers: Reverse-Engineered World Series Trophy Honors ’68 Tigers

Technology came to the aid of Detroit Tigers management when they hoped to recapture some of the magic of the 1968 Detroit Tigers’ World Series-winning season. The 50-year anniversary celebration, held September 7-9, 2018, included on-field festivities in which the 16 surviving members of the 1968 team were presented with replicas of the World Series’ trophy.

New Approaches to Making Parts for the Oil Patch

Rod Zimmerman of cutting tool manufacturer Iscar Metals lives in a pleasant green zone in a Fort Worth suburb. Yet within a half mile of his home, an oil company has sunk a vertical hole 7,500′ (2,286 m) deep, from which it has splayed nine lateral lines, each going about half a mile.

Swiss Machining Made Simpler

Swiss-style machine tools can be a good choice for making complex parts. On the downside, however, Swiss machining itself has a reputation of being complex—and, therefore, more difficult to master than standard machining.

Ensuring the Security of Additive Manufacturing

One of the key advantages of additive manufacturing is its digital thread, which allows for rapid communication, iteration, and sharing of a design model and its corresponding physical representation. While this enables an efficient design process, the flow of data opens vulnerabilities to cyber-attack.