Skip to content
SME Search Search Results

Displaying 301-310 of 629 results for

Casting clear Lasers clear Cybersecurity clear Robotics clear Software clear

Yamaha to Deploy Siemens Software

Yamaha Motor Co., Ltd., a manufacturer of diverse motorized products in Japan, has selected Siemens to provide product lifecycle management (PLM) software to support its digitalization initiative.

Busting the Myths about Artificial Intelligence

Manufacturers face a difficult task juggling the current “innovation agenda.” Today, the Industrial Internet of Things (IIoT), robotic automation and artificial intelligence (AI) are all poised to be the next big thing.

Laser Genius Elevates Productivity to New Heights

Like its products, technology demands for thyssenkrupp Elevator Corp. are “going up.” A business unit of ThyssenKrupp Elevator AG, the company oversees all business operations in the US, Canada, and Central and South America, and says it is the largest producer of elevators in the Americas, with 13,500 employees, more than 200 branches and service locations, and sales of $2.7 billion.

Laser Welding Applications Expand

Solid-state laser technology has matured, leading to development of new, cost-effective welding applications, such as hybrid welding

Nesting, MRP Solutions Can Boost Fabrication Productivity

Nesting is the process of arranging parts to be cut from sheets of metal or wood in the most efficient manner possible in order to maximize yield and speed the cutting process. By reducing scrap and accelerating the cutting process, fabricators are saving on material cost while running more jobs.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.