Skip to content
SME Search Search Results

Displaying 1-10 of 45 results for

Last 180 Days clear Cybersecurity clear Additive Manufacturing & 3D Printing clear Plastics Manufacturing clear

Sandvik Advances Metals for AM

Michael Schuisky, AM Business Unit Manager, Sandvik Additive Manufacturing, talked to Manufacturing Engineering about metal 3D printing.

3D Systems, Huntington Ingalls Industries to Collaborate

3D Systems said it is collaborating with Huntington Ingalls Industries’ Newport News Shipbuilding division to develop Copper-Nickel (CuNi) and Nickel-Copper (NiCu) alloys for powder bed fusion additive manufacturing.

Eliminating the Post-Processing Headache

Additive manufacturing, or 3D printing, has been a game changer in how products are designed, produced and manufactured. But 3D printed parts don’t just come out of the machine ready to use, sometimes intensive manual post-processing is required. Jeff Mize, CEO of PostProcess Technologies, sits down with Chris Mahar, Associate Editor, to discuss their automated post-processing technology and how fully digitalized additive manufacturing is further benefiting the industry.

Formlabs Expands Additive Manufacturing Reach with Fuse 1 SLS Printer

Formlabs, known for its line of desktop stereolithography (SLA) printers, is looking to expand its 3D printing reach with availability of its new Fuse 1 benchtop industrial selective laser sintering (SLS) 3D printer. Under development for nearly seven years, the Fuse 1 marks a notable change for Formlabs as they expand into a new additive manufacturing process.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.