Skip to content
SME Search Search Results

Displaying 121-130 of 340 results for

Materials clear Cybersecurity clear Electronics Manufacturing clear Finishing & Coatings clear Plastics Manufacturing clear

Today’s Grinders Must Do It All for HMLV Production

When it comes to the production of high-precision parts for industries ranging from aerospace to medical, grinding remains the best, most cost-effective approach to obtaining fine surface finishes and tight tolerances.

UNCC’s Hands-On Approach to Manufacturing Research

Starting this month, TechFront has a new format that spotlights manufacturing research programs at key universities, followed by summaries of recent research in SME’s Journal of Manufacturing Systems, Journal of Manufacturing Processes and Manufacturing Letters, all published by Elsevier Ltd.

Laser Marking: Going Places

The well-established field of laser marking continues to break new ground with expanding business opportunities in automotive, oil and gas, medical and other industries.

Ellsworth Launches Free Adhesives Database for Engineers

Engineers trying to keep track of liquid adhesives, coatings, sealants, and specialty chemical materials now have access to the free, searchable Gluespec database from Ellsworth Adhesives (Germantown, WI). The engineering research tool is designed by engineers to help engineers find the right adhesive and specialty materials for their projects as quickly and effectively as possible.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.