Skip to content
SME Search Search Results

Displaying 41-50 of 56 results for

2021 clear Cybersecurity clear Plastics Manufacturing clear Grinding & Deburring clear Electronics Manufacturing clear

Smart Manufacturing Predictions from Inside the AeroDef Boardroom

Smart manufacturing is transforming A&D manufacturing as more companies adopt automation, artificial intelligence and robotics. Some manufacturers are also focusing on eliminating so-called islands of automation and integrating the technology across entire processes.

Experts knock down AI barriers

Why don’t more manufacturers in the United States use smart manufacturing technologies like AI and machine learning to reduce waste, achieve predictive maintenance and enhance their automation systems? Five CESMII roundtable panelists share their insights.

Grinding Over Machining

Cost savings on aerospace manufacturing processes can come from many places, whether in reduced capital expenditure, consumable tooling, logistics, or cycle time reduction. Today engineers can identify opportunities where an abrasives solution will outperform traditional machining processes.

Cybercrime Thrives During Pandemic

The Verizon Business 2021 Data Breach Investigations Report (2021 DBIR) examines more breaches than ever before, and sheds light on how the most common forms of cyber attacks affected the international security landscape during the global pandemic.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.