Skip to content
SME Home Search Search Results

Displaying 11-20 of 35 results for

Search Filters: 2019 clear Quality/Inspection/Test clear Controls clear Grinding & Deburring clear Plant Engineering & Maintenance clear Welding & Cutting clear

Software: The Road to Zero Defects

Reducing the risk of automotive defects is one of the most critical issues facing manufacturers today – to protect the well-being of consumers, as well as their own reputations and financial health.

Turning Data Into Decisions

How do we turn all the data collected at each step of the manufacturing process into something usable?

PIM Is Transforming Data Sharing for Automotive

Much has changed in the world of automotive accessory designing, engineering, and manufacturing in the past few years. Sales and after sales of automotive parts have witnessed a surge in data-usage across the horizontal and vertical value chains between suppliers, business partners, internal departments, and the end-customers.

Survey: Manufacturers Behind the IIoT Curve

Software AG (Frankfurt, MDAX: SOW) announced an original survey of over 125 North American manufacturers in the heavy industry and automotive sectors that revealed they are unable to scale their Industrial Internet of Things (IIoT) investments across their enterprises, and therefore are losing millions of dollars in potential profits while falling behind competitors that have invested in enabling technologies that support IIoT across the enterprise.

Hurco Introduces New 3D Import with 3D DXF Technology

Indianapolis-based Hurco introduces the Hurco MAX5 control with the new 3D Import feature that includes 3D DXF technology. This control feature allows the user to simply load the file they receive from their customer directly into the Hurco control.

Securing OT in the Energy and Utilities Sector

Convergence-enabled cyberattacks—where criminals exploit traditionally isolated operational technology (OT) devices through their new connections to the IT network—may be motivated by the desire to hijack and demand ransom for services, steal trade secrets through industrial or national cyberespionage, or commit cyberterrorism or engage in cyberwarfare.