Skip to content
SME Search Search Results

Displaying 251-260 of 533 results for

Cybersecurity clear Grinding & Deburring clear Casting clear Software clear

Metrology Gets Connected

“Metrology and its relationship to manufacturing is rapidly evolving,” Ken Woodbine, president, Wilcox Associates, a brand of Hexagon Metrology (North Kingstown, RI), recently observed. “We are seeing larger quantities and faster speeds of measurement data collection. The next challenge is what to do with all that data.”

What’s Next in Grinding?

Many precision grinding machines on the market already offer their users near-perfect tolerances, leaving one to wonder: What’s next in grinding? But tool builders still have plenty of room to add valuable new improvements, machine shop owners say.

Milling vs. Grinding for Rapid Stock Removal

A recent effort by the Norton Advanced Applications Engineering Group demonstrates that for difficult-to-machine materials, grinding can be an economical alternative to other machining processes.

Grinding Roots

Until the middle of 2010, first-tier subcontract machinist, JJ Churchill, could produce turbine blades only if they had their fir-tree root-forms preground elsewhere, or if they were subsequently added by another subcontractor. No longer is this the case.

Nesting, MRP Solutions Can Boost Fabrication Productivity

Nesting is the process of arranging parts to be cut from sheets of metal or wood in the most efficient manner possible in order to maximize yield and speed the cutting process. By reducing scrap and accelerating the cutting process, fabricators are saving on material cost while running more jobs.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.

Tackling Downtime and Inefficiencies with Software

Turning to software over paper reports does more than just save trees. Chris Mahar, Associate Editor of Manufacturing Engineering, talks with David McPhail, President and CEO of Memex Inc., about how manufacturers can utilize technology to improve efficiency, reduce downtime and boost productivity and profits across their business.

AI Simplified

The complex world of artificial intelligence and machine learning—and why it all matters