Skip to content
SME Search Search Results

Displaying 1-10 of 31 results for

2021 clear Cybersecurity clear Stamping clear Forming & Fabricating clear Maintenance & Repairs clear Casting clear

Turbine Repair Firm Fills the Talent Gap

CRT, a turbine repair firm, is working with Tooling U-SME to educate its workforce. With more than 300 different courses in machining and an extensive library available in welding and inspection, CRT is pleased with the breadth of content.

Improving maintenance in manufacturing

Preventive maintenance is essential for manufacturers to reduce downtime—and the vast amounts of data being produced by plants can be effectively used for predictive maintenance.

Data is King at EASTEC 2021

Digitization and data dominated the discussion as EASTEC returned to West Springfield, Mass., after its 2020 pandemic hiatus.

Now Is the Time to Go for Compliance with CMMC

Cybersecurity Maturity Model Certification, an assemblage of information and computer security controls, is required of Department of Defense suppliers starting this year, with rolling deadlines over the next few years.

Experts knock down AI barriers

Why don’t more manufacturers in the United States use smart manufacturing technologies like AI and machine learning to reduce waste, achieve predictive maintenance and enhance their automation systems? Five CESMII roundtable panelists share their insights.

Know Your Metals: Aluminum

Aluminum and its alloys are highly popular in the machining industry for many reasons. Did you know it is the most abundant metal on Earth?

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.