Skip to content
SME Search Search Results

Displaying 681-690 of 924 results for

Grinding & Deburring clear Automation clear Materials clear Stamping clear

Tips for Choosing a CNC

Like most of the digital architecture of manufacturing, computer numerical controllers (CNCs) have advanced rapidly in recent years, producing far more processing speed and implementing advanced algorithms, while at the same time offering simpler, more intuitive user interfaces.

Hey, Job Shops: Time to Automate!

Robots and job shops have not typically been talked about together. After all, everyone knows that automation is only suitable for high-volume production, and the typical mom-and-pop operation is anything but—its schedule filled with orders for high-mix, low-volume, and often highly complex work.

Automated Metrology in Manufacturing

Modern manufacturing is a data-driven endeavor. The sheer volume of data available to be collected and analyzed is staggering—and something that couldn’t have been envisioned even 20 years ago.

Taiyo Koki Introduces Latest Technology to Speedgrip Chuck Co.

Speedgrip Chuck Co., an Elkhart, Ind. Based workholding equipment manufacturer, has become the first U.S. customer of Taiyo Koki’s CVG-6T grinding machine. Taiyo Koki, a DMG Mori owned grinding machine manufacturer founded in 1986, “moves beyond the conventional concept of the traditional grinding,” the company said in a statement.

Servopress 101: A Basic Guide

Servomechanisms are at the heart of 21st century automation. The basic elements are a servomotor; a device to convert rotary motion into linear motion; a suite of sensors to provide the required feedback; a controller to convert feedback data into command signals; and enabling software.

Metals Testing Requires Escalation-Based Strategy

At Cary Rosenberg’s company, Watts Water Technologies, validating material properties to ensure they are composed of the correct elemental composition is an important part of their work.

Securing OT in the Energy and Utilities Sector

Convergence-enabled cyberattacks—where criminals exploit traditionally isolated operational technology (OT) devices through their new connections to the IT network—may be motivated by the desire to hijack and demand ransom for services, steal trade secrets through industrial or national cyberespionage, or commit cyberterrorism or engage in cyberwarfare.