Skip to content
SME Search Search Results

Displaying 61-70 of 149 results for

Casting clear Grinding & Deburring clear Cybersecurity clear

Grinding Roots

Until the middle of 2010, first-tier subcontract machinist, JJ Churchill, could produce turbine blades only if they had their fir-tree root-forms preground elsewhere, or if they were subsequently added by another subcontractor. No longer is this the case.

Proactive OT Security—Protecting Before The Attack

Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.

Flexibility and Thorough Support for Good Measure

Discover how Driven Precision Engineering, a small business specializing in precision machining for Formula One teams, found a tailored solution with LK Metrology's CMM technology, revolutionizing their quality control processes for high-speed racing components.

Sustaining CAD/CAM Agility

Explore the transformative impact of cloud, edge computing, large language models (LLM), and convergence in the manufacturing industry, emphasizing the importance of integrated data systems and automation for improved productivity and innovation.