Zeiss Receives ACEC Award for Wixom Quality Excellence Center March 8, 2021 In a statement, Zeiss Industrial Quality Solutions says it opened its Wixom, Mich.-based Quality Excellence Center.
Creaform Releases the Handyscan 3d Silver Line-Up March 4, 2021 The new series of handheld 3D scanners is aimed at professionals and small businesses.
Hexagon’s Make It Smarter America Tour Hits the Road August 11, 2021 Hexagon experts embark on a summer mission to make manufacturing smarter for users across the U.S.
Sharpe Products Installs New Laser Cutting Equipment July 9, 2021 Sharpe Products recently installed a BLM Group LT7 4-kW laser cutting system. This equipment cuts round, square, rectangle and open profile pipe or tube up to 6" OD.
Simulation Software Meets the Need for Speed February 26, 2021 Toolpath simulation software gives manufacturers assurance that their machine tools will cut parts quickly and accurately, which is particularly useful when machining expensive materials like titanium or Inconel.
Mitutoyo America Corporation Releases AI Inspect Software April 1, 2021 Mitutoyo America Corporation releases new Mitutoyo AI Inspect Software to its lineup of software solutions
Verisurf Names Business Development Manager April 13, 2021 Verisurf Software said it appointed Tara Mitchell as business development manager for the Americas.
Siemens extends Xcelerator portfolio with quality management January 27, 2021 Teamcenter Quality software, now provides a closed-loop approach for quality management.
Proactive OT Security—Protecting Before The Attack January 27, 2021 Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.