Skip to content
SME Search Search Results

Displaying 1-10 of 32 results for

Last 90 Days clear Assembly & Joining clear Cybersecurity clear Automation clear Plastics Manufacturing clear Electronics Manufacturing clear Grinding & Deburring clear Plant Engineering & Maintenance clear Casting clear

Carbon Fiber Recycling Developing as an Industry

Anyone who’s worked with wind turbine blades or just seen one up close can attest to the massive size of these clean-energy workhorses. Ever thought about what happens to that costly, high-tech material once the blade reaches the end of its lifespan in 20 years or so?

Is now the time to get a cobot?

In this podcast, Bruce Morey, Senior Technical Editor for Manufacturing Engineering Magazine discusses collaborative robots, or cobots, with Steve Apel. He is a Regional Automation Manager for Acieta. In this role, he helps solve customer challenges through the adoption of new robotic automation technologies.

You're Never Too Small for Industrial Robots

Claudia Jarrett, U.S. country manager at automation parts supplier EU Automation, explains why robots are more than affordable for small and mid-sized enterprises (SMEs).

Formlabs Expands Additive Manufacturing Reach with Fuse 1 SLS Printer

Formlabs, known for its line of desktop stereolithography (SLA) printers, is looking to expand its 3D printing reach with availability of its new Fuse 1 benchtop industrial selective laser sintering (SLS) 3D printer. Under development for nearly seven years, the Fuse 1 marks a notable change for Formlabs as they expand into a new additive manufacturing process.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.