Data-Driven Manufacturing
Recent News
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerAug 08, 2022

The definition and management of the credentials used to access the resources within a company's network requires their own set of rules within an access control strategy. Here are some important security elements to consider with usernames and passwords.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerJun 17, 2022

Any advanced cybersecurity plan should address electronic media in both the IT and the OT networks. Devices like CDs, flash drives, and more are problematic since each is an interface to your company’s network, introducing possible security threats.

7m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By Tim ShinbaraJun 06, 2022

The MTConnect Institute announces the release of MTConnect Version 2.0. The 2.0 version of the free, open, model-based standard that supports semantics for discrete manufacturing is a significant advancement from previous versions.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerJun 03, 2022

Access control in an advanced cybersecurity plan go well beyond usernames and passwords. It means defining, implementing, and monitoring rules to control which persons and systems may access resources within your company’s network and computer systems.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By Jan SchaferMay 31, 2022

A look at what some of the job shops in the United States are doing.

8m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By AMTMay 25, 2022

Check in for the highlights, headlines, and hijinks that matter to manufacturing. These lean news items keep you updated on the latest developments.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerMay 06, 2022

To build or enhance your company's cybersecurity plan, one of the first steps to consider is mapping out all access points to your company’s systems and network, including the interaction points between various systems within and outside the network.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerMay 02, 2022

Cybersecurity protects your – and your clients' – assets. This series dives into how you can integrate a successful cybersecurity plan. From company culture to training and maintaining your personnel, creating a safe business environment starts here.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By Benjamin MosesApr 25, 2022

Interested in adding MTConnect? Recently the AMT-Virginia Tech team simulated a manufacturing environment of robotic arms performing material transportation. The collected and visualized data provides insight into process monitoring and machine efficiency.

15m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By AMTApr 03, 2022

Check in for the highlights, headlines, and hijinks that matter to manufacturing. These lean news items keep you updated on the latest developments.

7m read