Skip to content
SME Search Search Results

Displaying 1051-1060 of 1097 results for

Automation clear Lasers clear Software clear Quality/Inspection/Test clear

Mastercam Partners with TITANS of CNC

CNC Software Inc., developers of Mastercam, has announced a new partnership with TITANS of CNC Inc. to help train the next generation of highly skilled CNC machinists and eliminate the widening skills gap.

ECI Announces 2019 Everyday Hero Award Winners

ECI Software Solutions, a leader in cloud-based business management solutions, has awarded Adam and Melinda Hendrix of Chic Lumber $10,000 as the first place winners of the 2019 Everyday Hero Award for their work to combat heroin addiction.

Best-Selling Machining Books of 2019

Practical Machinist wanted to simplify your quest by providing you with a list of the best-selling machining books of 2019 according to our community. All the books in this list are a must-have, so we strongly encourage you to add them to your machine shop library, if you don’t have them already.

Mastercam ‘Wildest Parts Competition’ Accepting Entries

Mastercam CAD/CAM software, developed by CNC Software, Inc., is sponsoring a competition to inspire students and professionals in the manufacturing arena. The 2020 Masters of CAM Wildest Parts Competition is now accepting entries.

Metals Testing Requires Escalation-Based Strategy

At Cary Rosenberg’s company, Watts Water Technologies, validating material properties to ensure they are composed of the correct elemental composition is an important part of their work.

Automation and AI Bring Future Closer Than Ever

As a self-aware millennial, Pat Evans has long been wary of how quickly technology is taking over our lives and quickly dominating the economy. Attending HxGN Live in June, Hexagon AB’s annual digital solutions conference, some of those fears were reinforced, while others were quelled.

Securing OT in the Energy and Utilities Sector

Convergence-enabled cyberattacks—where criminals exploit traditionally isolated operational technology (OT) devices through their new connections to the IT network—may be motivated by the desire to hijack and demand ransom for services, steal trade secrets through industrial or national cyberespionage, or commit cyberterrorism or engage in cyberwarfare.