With vaccinations on the rise, the in-person collaboration that is still essential to doing business, including trade shows, is growing. But challenges to recovery from the pandemic remain. Global supply chains are struggling with multiple disruptions. Shipping rates are historically high. Computer chip shortages are curbing output.
This is the first in a series of articles that will cover the accelerating improvement in manufacturing technology.
Automakers during this decade face a big challenge. They are having to invest in electric vehicles. But EVs, at least for now, won’t generate the profits of conventional vehicles, according to an annual report by consulting firm AlixPartners.
We no longer need to accept that it takes a decade to create and make a safe and effective vaccine—thanks in part to smart manufacturing.
Vibrations, chatter marks, and tool failure are all problems that can be prevented with intelligent monitoring and feedback systems.
Manufacturing has been in the middle of the outbreak of the coronavirus (COVID-19) from the start. The impact is expanding as the virus spreads.
What do you think of when you hear the word factory? Probably some huge space, with machines humming and personnel walking around with notepads in their hands.
What is tribal knowledge and why should a company care? It is valuable, exclusive information stored only inside someone’s mind and communicated only verbally (if at all). The “someone” may have played an important role in an organization for decades and knows a thing or two that the company treasures yet cannot duplicate.
The value-add of blockchain for businesses is estimated to grow into the trillions by 2030. Experts believe product recalls alone—estimated to cost $8 million today—could be practically eliminated through improved track and traceability enabled by blockchain.
Convergence-enabled cyberattacks—where criminals exploit traditionally isolated operational technology (OT) devices through their new connections to the IT network—may be motivated by the desire to hijack and demand ransom for services, steal trade secrets through industrial or national cyberespionage, or commit cyberterrorism or engage in cyberwarfare.