Safe & Secure? July 27, 2022 Black hats, script kiddies, phishers, and hostile nation-states. Bad actors are out there, fervently working to sabotage your factory and steal your stuff. What are you doing about it?
Driving Cultural Change in Manufacturing Cybersecurity July 27, 2022 As hackers become more sophisticated and dangerous, manufacturers need to step up their cybersecurity efforts.
Mazak Joins CyManII as Collaborative Partner March 15, 2024 CyManII brings manufacturers and research institutions together to drive digital infrastructure and security for advanced manufacturing, supply chains and workforce development.
The Rx for Medical Manufacturing: Micro-Cutting February 29, 2024 Laser micro-cutting can increase precision and enable contactless cutting for machines, leading to higher-quality products.
Meet the Modern Makers Who Help Power the Manufacturing USA Network October 4, 2023 They are 16 creators at heart. They are passionate about their work and how they are helping chart a new course for domestic advanced manufacturing. They are the Modern Makers.
Leading with Light July 26, 2023 Revolutionizing Manufacturing: How Laser Pioneers and Automation Are Transforming the Industry
Cosplay, Motorcycles, and Decadent Desserts: How Hobbies Relate to High-Tech Careers October 30, 2023 Modern Makers are individuals who embody Manufacturing USA’s mission to secure the future of U.S. manufacturing through innovation, education, and collaboration. Learn how their hobbies helped them develop transferable skills and build a rewarding and impactful career
TRUMPF Sales Up 27% in 100th Year October 26, 2023 German industrial machine manufacturer Trumpf posted €5.4 billion in sales as the company turns 100.
Suppliers Meet New Challenges via Adaptable Technologies September 27, 2023 Discover how EDM, laser machining, and laser micromachining are reshaping the industry, allowing precision and efficiency without compromising material integrity.
Managing Cybersecurity Risks in Digital Environments August 22, 2023 5 essential steps to achieve a secure operation