Skip to content
SME Search Search Results

Displaying 41-50 of 117 results for

Last 180 Days clear Smart Manufacturing clear Cybersecurity clear Automation clear Additive Manufacturing & 3D Printing clear Product Design & Engineering clear Casting clear Welding & Cutting clear

ESPRIT CAM Supports Binder Jetting Technology

ESPRIT CAM, a computer-aided manufacturing software developed by DP Technology that supports a variety of CNC machines, has extended its existing partnership with France’s Technical Centre for Mechanical Industry (CETIM) to include additive manufacturing.

Stratasys Acquires RPS

Stratasys Ltd. said it has acquired U.K.-based RP Support Ltd. (RPS), a provider of industrial stereolithography 3D printers and solutions.

Honda Car India delivers joy with digital transformation

Honda has a long history of corporate excellence driven by an enduring philosophy of “joy.” It believes in creating joy for its customers when they buy, for its dealers when they sell, and for its associates and suppliers when they create.

Yamaichi Special Steel masters generative design

In the never-ending quest to create better products, the latest tool is a technology called “generative design” (GD). A GD algorithm receives high-level requirements as input and generates an optimal design as output.

Choose Digital, Choose the Right Drill

The Industry 4.0 & Smart Manufacturing Adoption Report by IoT Analytics suggests that Industry 4.0 technology uptake is still low among manufacturers.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.