Skip to content
SME Search Search Results

Displaying 1-10 of 38 results for

Last 90 Days clear Finishing & Coatings clear Cybersecurity clear Smart Manufacturing clear Welding & Cutting clear

MxD Secures $8.5 Million in 2021 Defense Appropriations Legislation

With the passage of the fiscal year 2021 Consolidated Appropriations Act at the end of 2020, MxD, the national digital manufacturing institute, secured $8.5 million in funding from the U.S. Department of Defense for 5G for manufacturing and cybersecurity for arsenal supply chains.

Twenty women making their mark in robotics & automation

If there is a common thread found in the women Smart Manufacturing identified as making their mark in robotics and automation, it is a heightened awareness of the impact humans have on the planet without trying, as well as the positive impact we can have with concerted efforts.

Flowserve finds solace in data-driven decision making

COVID-19 marked the first time in history that supply, demand and the workforce were impacted at the same time by an adverse event. Manufacturing sites shut down, ports closed and the global economy was hit hard.

Honda Car India delivers joy with digital transformation

Honda has a long history of corporate excellence driven by an enduring philosophy of “joy.” It believes in creating joy for its customers when they buy, for its dealers when they sell, and for its associates and suppliers when they create.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.