Skip to content
SME Home Search Search Results

Displaying 91-100 of 190 results for

Search Filters: Smart Manufacturing clear Software clear Machining & Metal Cutting clear Controls clear Materials clear

Advanced Technology Depends on Controls, Design

Nothing seems so obvious in subtractive machining than that milling and turning processes really are very different: single point vs. multipoint tools; rotating workpiece vs. rotating tool; static tool vs. rotating tool, etc.

Northrop Grumman Lands $9.6-M Navy Torpedo Contract

The U.S. Navy has awarded Northrop Grumman Corporation (NYSE: NOC) a $9.6 million contract, with options up to $40.5 million, to produce the Transducer Array/Nose Shell Assembly of the MK 48 heavyweight torpedo.

The Digitization of Modern Manufacturing

Today, the ideal factory can achieve levels of self-controlling (and perhaps self-learning) production processes, in which production reacts autonomously to changes or faults and takes appropriate measures.

Raising the Stakes with High-Speed Aerospace CNCs

In the aerospace world, as in all sectors of manufacturing, the race is on for faster, more automated and connected machining operations. Aerospace builders have steadily pushed for more automotive-like automation over the past several years in order to improve productivity and more effectively handle large order backlogs in commercial aviation.

Simulation Software Spreads its Wings

When wrestling with vexing issues such as product complexity, lightweighting, advanced materials and new manufacturing methods, today’s manufacturing engineers increasingly use high-fidelity simulations to visualize solutions to these challenges.

CMMs Stake Their Claim

An eternal truth is that manufacturing will always push the limits on cost, performance, and especially quality. “Tolerances never get looser, they always get tighter,” remarked Gene Hancz, product specialist, CMM of Mitutoyo America Corp. (Aurora, IL).

Securing OT in the Energy and Utilities Sector

Convergence-enabled cyberattacks—where criminals exploit traditionally isolated operational technology (OT) devices through their new connections to the IT network—may be motivated by the desire to hijack and demand ransom for services, steal trade secrets through industrial or national cyberespionage, or commit cyberterrorism or engage in cyberwarfare.