Skip to content
SME Search Search Results

Displaying 1-10 of 43 results for

Last 180 Days clear Cybersecurity clear Tooling & Workholding clear Grinding & Deburring clear

Toolholding: Built for Speed

The evolution to high speed machining (HSM) is continuing and toolholders are playing a crucial role in that process, which includes the interlinking of machining center, programming, high-speed spindles, advanced cutting tools, balancing, and high-performance toolholders in order for shops to take full advantage of HSM.

RAD Torque Releases B-RAD BL S Torque Wrench

RAD Torque Systems has launched what it calls its most advanced battery tool, the B-RAD BL S. The new torque wrench is an addition to the battery-operated series known as the B-RAD.

Hardinge to Acquire Weisser

Hardinge Inc. and J.G Weisser GmbH & Co. KG have entered into a definitive agreement under which Hardinge will acquire Weisser.

CGTech Releases VERICUT Version 9.2

CGTech has released the latest version of its VERICUT software, Version 9.2. VERICUT CNC machine simulation, verification, and optimization software simulates CNC machining, additive, and hybrid manufacturing processes.

Drill Choice: Solid-Carbide or Replaceable-Insert?

Selecting the best type of cutting tool for holemaking jobs is not always clear. It is best to have a drill that caters to the workpiece material, produces the specs required, and provides the most profit for the job at hand. Considering the variety of jobs and parts manufactured in machine shops, there is no “one-drill-fits-all.”

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.