Smart Manufacturing Drives Five Key Changes October 11, 2019 What do you think of when you hear the word factory? Probably some huge space, with machines humming and personnel walking around with notepads in their hands.
Turning Data Into Decisions October 10, 2019 How do we turn all the data collected at each step of the manufacturing process into something usable?
PIM Is Transforming Data Sharing for Automotive November 1, 2019 Much has changed in the world of automotive accessory designing, engineering, and manufacturing in the past few years. Sales and after sales of automotive parts have witnessed a surge in data-usage across the horizontal and vertical value chains between suppliers, business partners, internal departments, and the end-customers.
Five Suggestions for How to Retain Tribal Knowledge August 7, 2019 What is tribal knowledge and why should a company care? It is valuable, exclusive information stored only inside someone’s mind and communicated only verbally (if at all). The “someone” may have played an important role in an organization for decades and knows a thing or two that the company treasures yet cannot duplicate.
To Prepare for Blockchain, First Check These Three Things August 6, 2019 The value-add of blockchain for businesses is estimated to grow into the trillions by 2030. Experts believe product recalls alone—estimated to cost $8 million today—could be practically eliminated through improved track and traceability enabled by blockchain.
Experts Describe Giving Chase to DFAM for Parts That Must Not Fail August 5, 2019 The U.S. Army is working assiduously to flight-qualify engine parts it has redesigned using additive manufacturing (AM).
The Best of Both Worlds in the Same Machine August 2, 2019 Hybrid manufacturing—using one machine to perform both additive and conventional subtractive manufacturing processes—is gaining traction across manufacturing sectors, allowing companies to leverage the benefits of both.
Securing OT in the Energy and Utilities Sector August 15, 2019 Convergence-enabled cyberattacks—where criminals exploit traditionally isolated operational technology (OT) devices through their new connections to the IT network—may be motivated by the desire to hijack and demand ransom for services, steal trade secrets through industrial or national cyberespionage, or commit cyberterrorism or engage in cyberwarfare.
Software: The Road to Zero Defects June 13, 2019 Reducing the risk of automotive defects is one of the most critical issues facing manufacturers today – to protect the well-being of consumers, as well as their own reputations and financial health.
When Your Ship Comes in and Needs Sizing Up April 26, 2019 When drilling a well, clearing a forest or excavating a building site, experienced operators count on their toughest equipment to help them get the job done.