Today’s manufacturers are under pressure to be more flexible, reduce downtime and costs and increase efficiencies.
Displaying 1-10 of 17 results for
The new Metrology Gate portal from LK Metrology provides remote access to information of connected metrology devices
Current and prospective member companies of the defense industrial base (DIB) have watched with interest as the U.S. Department of Defense (DoD) developed its all-encompassing Cybersecurity Maturity Model Certification (CMMC) program.
The new five ultra-accuracy models are offered in both 6-axis and 7-axis variants
In a few short years, the Center for Manufacturing and Metrology at the University of Hartford has become a leading national provider of education, training and research in measuring technology for manufacturing.
Mark 2020 as the year the U.S. government chose to stand up a Manufacturing Innovation Institute focused solely on cybersecurity.
Thanks in part to its pro-business policies, strong workforce, and trade infrastructure, Florida ranks among the nation’s top 10 states for manufacturing.
Formlabs, known for its line of desktop stereolithography (SLA) printers, is looking to expand its 3D printing reach with availability of its new Fuse 1 benchtop industrial selective laser sintering (SLS) 3D printer. Under development for nearly seven years, the Fuse 1 marks a notable change for Formlabs as they expand into a new additive manufacturing process.
Marposs has launched a new virtual and interactive showroom that highlights its solutions for the gauging, inspection and testing of components manufactured for the electric vehicle market.
Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.