Skip to content
SME Search Search Results

Displaying 521-530 of 1082 results for

Cybersecurity clear Manufacturing Management clear Assembly & Joining clear

Shop-Floor Monitoring Critical to Improving Factory Processes

Process improvement encompasses a wide range of tools, techniques and strategies. When properly deployed, shop-floor data collection and monitoring systems can help factory-floor managers leverage key data metrics including overall equipment effectiveness (OEE) and total effective equipment performance (TEEP) that measure machine uptime and pinpoint bottlenecks or other problems in order to improve machining performance.

Lean Techniques: Yokoten

If you have never heard the term Yokoten, prepare yourself. It has been added to the Lean Operations lexicon as an important activity. Yokoten is being used by lean firms to help them become leaner. Yokoten is a Japanese term that can be roughly translated as “across everywhere.”

Lean Automation

Lean manufacturing principles and automation systems can coexist, although many lean purists contend that lean goals conflict with using automation. Smart applications of automation, however, can result in deployment of systems that are both automated and lean, with flexible manufacturing systems that can be easily reconfigured as factory operations change.

Sustaining a Lean Culture

Earlier this year, at the 21st annual Shingo Prize conference awards ceremony, Autoliv Americas’ airbag module facility in Ogden, UT, was awarded The Shingo Prize for Operational Excellence. This was the second Shingo Prize won by the Autoliv Ogden Airbag Assembly (AOA) plant.

Standardized Work

Taiichi Ohno is often quoted as declaring: “Without a standard, there can be no improvement.” The principles of lean do not work well when everyone is allowed to choose their own work method or work sequence in which to do a job: the outcome is unpredictable; flow and pull are impossible. This reduces throughput and the carefully crafted process develops unanticipated outcomes.

Lean Efforts Capture the Shingo

A subsidiary of HNI Corp. (Mustacine, IA), the second-largest manufacturer of office furniture in North America, Hearth & Home Technologies (HHT; Mt. Pleasant, IA) manufactures sheetmetal fireplaces (both wood and gas-burning), vent pipe, and fireplace accessories. The company has four manufacturing facilities.

Automation in Lean Manufacturing

Common misperceptions about lean manufacturing and automation systems lead many manufacturing managers to dismiss the use of automation in a lean setting.

Lean at NUMMI

To remain competitive in the fiercely contested North American automotive industry, the New United Motor Manufacturing Inc. (NUMMI, Fremont, CA) assembly plant, a joint venture between Toyota Motor Corp. (Aichi Prefecture, Japan) and General Motors Corp. (Detroit), has rededicated its efforts in lean manufacturing during the past few years by applying key tenets of the Toyota Production System (TPS). 

Reducing Complexity in Assembly Equipment

In this podcast, John Derry, senior application engineer at Promess, talks to SME Media contributing editor Michael Anderson about reducing complexity in assembly equipment. Derry discusses how assembly systems may become unnecessarily complex--and how that complexity can reduce quality and increase costs. Derry goes on to describe effective ways of addressing these issues and to reduce and even eliminate unnecessary complexity.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.