Skip to content
SME Search Search Results

Displaying 61-70 of 94 results for

2019 clear Automation clear Stamping clear Forming & Fabricating clear Product Design & Engineering clear Quality/Inspection/Test clear Grinding & Deburring clear Cybersecurity clear

A Guide to Understanding Forces in Creepfeed Grinding

Efficient creepfeed grinding can remove material quickly and produce a precision ground surface on challenging materials. However, since creepfeed grinding applications typically draw more power and have higher forces, there are important considerations to pay attention to during application setup.

Non-Automotive Manufacturing Sectors Flocking to Robotics

Cheaper robots with more functions, along with more flexible work cells and installations that facilitate robotics, are accelerating the growth of automated manufacturing facilities in the non-automotive sector. Ideas on whether robotics and automation lead to lights-out manufacturing on the shop floor, though, are mixed.

New Approaches to Making Parts for the Oil Patch

Rod Zimmerman of cutting tool manufacturer Iscar Metals lives in a pleasant green zone in a Fort Worth suburb. Yet within a half mile of his home, an oil company has sunk a vertical hole 7,500′ (2,286 m) deep, from which it has splayed nine lateral lines, each going about half a mile.

Automation

Automation Stay informed with the latest insights, news, resources and products in Automation to improve your manufacturing career and operations. automation, automated manufacturing Latest

Turning Data Into Decisions

How do we turn all the data collected at each step of the manufacturing process into something usable?

PIM Is Transforming Data Sharing for Automotive

Much has changed in the world of automotive accessory designing, engineering, and manufacturing in the past few years. Sales and after sales of automotive parts have witnessed a surge in data-usage across the horizontal and vertical value chains between suppliers, business partners, internal departments, and the end-customers.

Securing OT in the Energy and Utilities Sector

Convergence-enabled cyberattacks—where criminals exploit traditionally isolated operational technology (OT) devices through their new connections to the IT network—may be motivated by the desire to hijack and demand ransom for services, steal trade secrets through industrial or national cyberespionage, or commit cyberterrorism or engage in cyberwarfare.