Skip to content
SME Search Search Results

Displaying 81-90 of 185 results for

Cybersecurity clear Finishing & Coatings clear Lasers clear Casting clear

2016 Was a Good Year for Lasers; 2017 Looks Even Better

Strong 2016 earnings among top industrial laser providers, continued brisk adoption of fiber lasers, cheaper ultrafast lasers, and a host of novel applications and notable corporate acquisitions signal a big year ahead for photonics-based manufacturing.

Laser Welding for Sheetmetal Fabricators

Although laser welding is a well-established manufacturing solution, many sheetmetal fabricators have been hesitant to implement the process at their shop.

Laser Takes Heat Out of Tough Tool Grinding

Cutting tool maker Shape-Master Tool Co. (Kirkland, IL) needed to expand its tool grinding capability beyond that of its conventional machines or run the risk of losing work to the competition.

Lasers Grow Manufacturing

Today, laser technology in manufacturing touches all of our lives on a daily basis; lasers cut air bag material and weld air bag detonators for our in-car safety; lasers weld the batteries in many of our mobile devices; lasers drill aero-engine components for planes; lasers cut the glass for our smart phones and tablets screens; lasers weld the drivetrains in our cars and trucks; lasers cut medical stents that increase and enhance our lives, just to name a few.

Laser Welding Applications Expand

Solid-state laser technology has matured, leading to development of new, cost-effective welding applications, such as hybrid welding

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.