Data-Driven Manufacturing
Recent News
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerMay 06, 2022

To build or enhance your company's cybersecurity plan, one of the first steps to consider is mapping out all access points to your company’s systems and network, including the interaction points between various systems within and outside the network.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerMay 02, 2022

Cybersecurity protects your – and your clients' – assets. This series dives into how you can integrate a successful cybersecurity plan. From company culture to training and maintaining your personnel, creating a safe business environment starts here.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By Benjamin MosesApr 25, 2022

Interested in adding MTConnect? Recently the AMT-Virginia Tech team simulated a manufacturing environment of robotic arms performing material transportation. The collected and visualized data provides insight into process monitoring and machine efficiency.

15m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By AMTApr 03, 2022

Check in for the highlights, headlines, and hijinks that matter to manufacturing. These lean news items keep you updated on the latest developments.

7m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerMar 22, 2022

Proactively addressing cybersecurity can turn a “necessary evil” into a competitive advantage. Implementing a solid cybersecurity plan can reassure existing customers that they have made the right choice in choosing your company as a supplier.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By Douglas K. WoodsFeb 02, 2022

Everything from the chemistry of the insert to the capacity of the spindle drive to the control algorithms for the axes is different. And the differences are accelerating. So what we “know” could be what we “knew” because of the change in tech.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerJan 28, 2022

CMMC stands for Cybersecurity Maturity Model Certification. This is an initiative of the Department of Defense (DOD) to address cybersecurity concerns at non-governmental organizations participating in the DOD supply chain.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerJan 06, 2022

Regardless of whether or not there is a single or multiple points of connection between the two network environments, the objective of the security functions applied at these connection points is to control the flow of information across that barrier ...

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerDec 08, 2021

A topic that is often not considered is the differences in the performance requirements between the IT and OT network environments.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerNov 23, 2021

The types of equipment connected to OT networks (manufacturing) are fundamentally different than the equipment connected to an IT network (office). This difference represents a whole new set of challenges for IT professions attempting to extend their ...

5m read