Listen to this Smart Manufacturing magazine cover story: In the thick of the ‘herculean’ vaccine push. Moderna is among the companies able to tackle the most urgent of matters precisely because of their digital strength.
Marty Edwards, vice president for operational technology security at Tenable, discusses how chief information security officers (CISOs) are integrating and converging across all aspects of security, including people, process and technology. The goal: get an enterprise-wide assessment of cyber exposure and overall risk.
John Deere’s Eric Johnson discusses the company’s additive manufacturing journey—with an eye toward helping small and medium businesses get going in AM. Learn about the early days of getting one of the first AM parts, as well as unrealistic expectations of the technology and how John Deere is creating value with the technology today. Finally, Johnson provides tips on unlocking the value of AM for your business in five key applications.
The Don Schumacher Racing team tests the limits of machining to stay competitive.
In a recent demonstration of the vendor-agnostic Smart Manufacturing Innovation Platform (SMIP) from CESMII, project partners first helped managers of North Carolina State University’s water purification plant get off the dime and analyze the data they were collecting with smart instruments.
The arrival of COVID-19 onto the global manufacturing landscape has changed operations in a number of important ways.
Imagine hearing the news that manufacturers are producing a proven and safe vaccine for COVID-19 and shipping it your way. It will be music to the world’s ears.
The 3D Printing Technology Continues Depositing Large Amounts of High-value Materials in the COVID-19 Pandemic
To be more efficient and to have single sources of the truth in their data, customers are seeking to leverage modern, standard application programmer interfaces (APIs) to integrate into their software.
Manufacturing operations face a multitude of cyber threats. The latest dangers from hackers include not only the theft of intellectual property but also malicious attacks that can cripple critical infrastructure, such as energy plants, utilities, and large-scale factories.