The push to launch electric vehicles (EVs) and the ever-increasing array of tech options will mean staying informed of repair trends will be critical.
Displaying 1-10 of 14 results for
There are more applications of semiconductors in hybrid and electric vehicles which are now growing significantly, with more than 1 million EVs added in the last year globally.
The pandemic has recharged the drive toward new solutions and led to new methods of engineering and production that will carry on after the pandemic.
New-to-market REcreate redefines reverse engineering with a fresh, flexible design approach.
Feature-based Product Line Engineering (PLE) is an engineering discipline that harnesses the similarities among related products, while respecting and managing their differences.
Kugler Maag Cie describes why cybersecurity is important for automotive factories and vehicles.
Hexagon is providing mold and die shops using its CAM software WORKNC with immediate access to its model preparation software. This allows integration of production workflows from any CAD model format to CAM so shops can machine parts more efficiently and avoid costly errors.
The Verizon Business 2021 Data Breach Investigations Report (2021 DBIR) examines more breaches than ever before, and sheds light on how the most common forms of cyber attacks affected the international security landscape during the global pandemic.
Aluminum and its alloys are highly popular in the machining industry for many reasons. Did you know it is the most abundant metal on Earth?
Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.