Skip to content
SME Search Search Results

Displaying 171-180 of 335 results for

Lasers clear Measurement & Metrology clear Cybersecurity clear Stamping clear

The Ins and Outs of In-Line Automated Inspection

The challenges to manufacturing as it evolves into the 21st century are now familiar, and impact how metrology must contribute. Manufacturers face uncertain production volumes with roller-coaster demand, shorter production runs and faster product development cycles. Automation, while alluring as a way to reduce cost, needs to adjust.

Quality Scan: Thread Inspection: Your Application Matters

Not all threaded connections serve similar purposes.The load-carrying needs of an aerospace engine support bolt in a tension assembly greatly exceed those of a simple screw that fastens a cover plate to an electrical wall socket. International thread-acceptance documents and standards recognize this basic engineering fact, and incorporate different thread-inspection requirements into their verification standards.

Programming CMMs

Off-line programming software tools for CMMs allow manufacturers to increase measurement capacity and throughput by programming CMMs, probes, and fixtures before parts are made.

Quality/Inspection/Test

Quality/Inspection/Test Stay informed with the latest insights, news, resources and products in Quality/Inspection/Test to improve your manufacturing career and operations. quality manufacturing,

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.

Plugged in Platforms

Discover how software integration is revolutionizing the manufacturing industry, breaking down data silos, and streamlining processes for greater efficiency and productivity.