Sharpe Products recently installed a BLM Group LT7 4-kW laser cutting system. This equipment cuts round, square, rectangle and open profile pipe or tube up to 6" OD.
Displaying 21-30 of 42 results for
With product lifecycle management (PLM) software, manufacturers wield powerful tools to manage the massive transformations buffeting their industries.
Can small and medium-sized manufacturers, Tier 2 or Tier 3 guys, use all-digital descriptions of part orders, dispensing with paper specifications and supplemental drawings to efficiently deliver parts?
Each year, CGTech hosts VERICUT Users' Exchange (VUE) events for its customers around the globe. As a response to the ongoing COVID-19 pandemic, the North American VUE events will once again be held virtually in 2021.
ESPRIT CAM, a computer-aided manufacturing software developed by DP Technology that supports a variety of CNC machines, has extended its existing partnership with France’s Technical Centre for Mechanical Industry (CETIM) to include additive manufacturing.
Verisurf Software said it appointed Tara Mitchell as business development manager for the Americas.
FABTECH will be the first large-scale manufacturing trade show to return to McCormick Place in Chicago, September 13-16. The announcement comes as the state of Illinois moves into its final reopening phase.
Sandvik AB has agreed with Battery Ventures to acquire U.S.-based Cambrio, which has a portfolio in CAD/CAM software for manufacturing industries.
Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.
Enhancements include AI (Artificial Intelligence) driven user experience, new simulation types as well as refinements in accuracy and enhanced performance speed and evaluate sound quality.