Skip to content
SME Search Search Results

Displaying 1-10 of 13 results for

Last 180 Days clear Casting clear Lasers clear Cybersecurity clear Product Design & Engineering clear Electronics Manufacturing clear

Making Welding Accessible to All

With the ongoing shortage of skilled workers and the pickup in the economy, suppliers of welding equipment are finding ways to making welding easier for those working in manufacturing. Automation is the leading technique among many.

Hexagon Giving CAD Software Access to Users of WORKNC

Hexagon is providing mold and die shops using its CAM software WORKNC with immediate access to its model preparation software. This allows integration of production workflows from any CAD model format to CAM so shops can machine parts more efficiently and avoid costly errors.

Which Cut is Best, Water or Laser?

Laser cutting and waterjet cutting: two great technologies that go great together? Or best when they play solo? As ever, the answer is it depends—on what work a shop has coming in the door, what materials are being processed most often, operator skill levels and, ultimately, the available equipment budget.

Cybercrime Thrives During Pandemic

The Verizon Business 2021 Data Breach Investigations Report (2021 DBIR) examines more breaches than ever before, and sheds light on how the most common forms of cyber attacks affected the international security landscape during the global pandemic.

Know Your Metals: Aluminum

Aluminum and its alloys are highly popular in the machining industry for many reasons. Did you know it is the most abundant metal on Earth?

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.