Anyone who’s worked with wind turbine blades or just seen one up close can attest to the massive size of these clean-energy workhorses. Ever thought about what happens to that costly, high-tech material once the blade reaches the end of its lifespan in 20 years or so?
Displaying 1-10 of 11 results for
Mar-Bal Inc. has merged its AltraSet Composite Technologies company with Lattice Composites, Riverside, Calif.
Current and prospective member companies of the defense industrial base (DIB) have watched with interest as the U.S. Department of Defense (DoD) developed its all-encompassing Cybersecurity Maturity Model Certification (CMMC) program.
Most manufacturing executives participating in a survey said cybersecurity threats are beginning to overwhelm their resources.
Thanks in part to its pro-business policies, strong workforce, and trade infrastructure, Florida ranks among the nation’s top 10 states for manufacturing.
Mark 2020 as the year the U.S. government chose to stand up a Manufacturing Innovation Institute focused solely on cybersecurity.
Formlabs, known for its line of desktop stereolithography (SLA) printers, is looking to expand its 3D printing reach with availability of its new Fuse 1 benchtop industrial selective laser sintering (SLS) 3D printer. Under development for nearly seven years, the Fuse 1 marks a notable change for Formlabs as they expand into a new additive manufacturing process.
Aluminum and its alloys are highly popular in the machining industry for many reasons. Did you know it is the most abundant metal on Earth?
Full line of fiber and diode laser machines for cutting and hardening
Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.