Healthcare, Manufacturing Share Tech—and Lessons April 8, 2022 There are parallels in how industry and healthcare adapt to digital technology—and some interesting differences.
You Can Take it With You: Hybrid Work Methods Shift Some Tasks Anywhere February 7, 2022 The pandemic has accelerated the visibility and viability of hybrid workforce solutions—but experts say proceed carefully
Metrology Software Plugs Into Smart Manufacturing February 4, 2022 Measurement data is an important element of the emerging smart factory. How software provides that data is the key.
Learning is a Continuing Venture February 7, 2022 The Composites Manufacturing Technical Group of SME recognized two individuals and two prominent composites manufacturing organizations at its 2021 Excellence in Composites Manufacturing Awards program.
‘Artificial Intelligence of Things,’ edge analytics create harmony at Gebhardt February 15, 2022 The combination of AI with IIoT delivers intelligent, connecting systems that can self-correct and self-heal themselves.
Smart mechatronics aids sensor production at Sensata Technologies February 14, 2022 Smart mechatronics offers greater intelligence, more efficient operation and a modular approach to delivering complete systems.
Smart Manufacturing Takes Center Stage in 2022 January 31, 2022 Smart Manufacturing will come to the fore in 2022 as a holistic strategy that considers the entire process throughout a product’s entire lifecycle.
Scanners Measure Up April 27, 2021 Laser scanners and structured white light scanners for metrology are advancing at the same time that customer are demanding major improvements. As a result, scanning technologies are making rapid progress.
McDermott International Uses 3DEXPERIENCE from Dassault Systèmes to Drive Fundamental Change July 19, 2019 McDermott International is using Digital Twins to grow its business and to keep information flowing instead of trapped in silos.
Securing OT in the Energy and Utilities Sector August 15, 2019 Convergence-enabled cyberattacks—where criminals exploit traditionally isolated operational technology (OT) devices through their new connections to the IT network—may be motivated by the desire to hijack and demand ransom for services, steal trade secrets through industrial or national cyberespionage, or commit cyberterrorism or engage in cyberwarfare.