Skip to content
SME Search Search Results

Displaying 381-390 of 812 results for

Robotics clear Cybersecurity clear Smart Manufacturing clear

Smart Factory Technologies Step Up at IMTS

Smarter factory systems connected via the cloud are the grand vision offered for the future factories that will fully leverage the best available tools from automation, software and machine tool builders.

CoroPlus Brings Connectivity to Manufacturing

Cutting tool and tooling systems specialist Sandvik Coromant has unveiled its CoroPlus suite of Industrial Internet of Things (IIoT) solutions aimed at helping manufacturers prepare for Industry 4.0. The concept is designed specifically to improve the control of productivity and costs through a combination of machine connectivity and CoroPlus – the suite of connectivity solutions from Sandvik Coromant – helps manufacturers prepare for Industry 4.0 access to manufacturing data and expert knowledge.

With Machine Monitoring, Instant ROI is Possible

There have been many process improvement trends in manufacturing over the decades, and none have had more significant ROI than machine monitoring. The increase in machine monitoring is owed in large part to the rise in popularity of the open and royalty-free interconnectivity standard MTConnect.

Smart Manufacturing

Smart Manufacturing Stay informed with the latest insights, news, resources and products in Smart Manufacturing to improve your manufacturing career and operations. smart manufacturing, smart mfg

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.