Skip to content
SME Search Search Results

Displaying 141-150 of 292 results for

Materials clear Cybersecurity clear Assembly & Joining clear

Solutions for Difficult Machining

The machining challenges for two of the most advanced concepts in cutting tool materials are pretty well known. Cubic boron nitride (CBN) tools of varying designs are being used to cut hardened ferrous metals with or without interrupted cuts, as well as welded and clad metals.

Cutting Tools for Composites

Machining composites presents unique challenges compared to metals. Reinforcement fibers are abrasive, shortening tool life. The plastic matrix carries away little heat, unlike metal chips, and overheating can melt the matrix.

Advanced Technologies Supplement: Processes Reduce Composite Costs

Composites engineers are expanding their craft to build more complex, durable parts at higher production volumes. One way they are achieving this objective is by using infusion-molding processes based on Resin Transfer Molding (RTM) and Vacuum Assisted Resin Transfer Molding (VARTM).

Reducing Complexity in Assembly Equipment

In this podcast, John Derry, senior application engineer at Promess, talks to SME Media contributing editor Michael Anderson about reducing complexity in assembly equipment. Derry discusses how assembly systems may become unnecessarily complex--and how that complexity can reduce quality and increase costs. Derry goes on to describe effective ways of addressing these issues and to reduce and even eliminate unnecessary complexity.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.

Pushing the Envelope

Bogi Lateiner and the women of Girl Gang Garage prove that the world of wrenching, welding, and wickedly cool cars is anything but a “boys only” club