As cars become more like PCs on wheels, what's to stop a hacker from taking over yours? Hackers have shown they can slam a car's brakes at freeway speeds, jerk the steering wheel and even shut down the engine — all from their laptop computers.
Over the past two months, Software Advice has surveyed maintenance professionals to identify how the industry uses software to get organized, improve efficiencies and tackle other industry challenges. 84 percent of those surveyed use some kind of software to manage maintenance. Commercial software products (i.e. CMMS, EAM/ERP or other business software tools) were used by 77 percent of those surveyed.
When management needed to reduce the footprint of Richmond's remanufacturing operations to make room for other revenue generating actives, the stockroom was faced with a 60 percent reduction in floor space. The stockroom already had a floor to ceiling man up narrow aisle picking system and there was little floor space and no additional shelf space that could be squeezed out.
It's the massive theft of American trade secrets through cyber attack and espionage, and many of the cyber-attacks on American trade are coming from China. NBC's Michael Isikoff reports on how widespread the espionage is and what the government is doing about it.
To help global companies implement cross-border multichannel commerce solutions more effectively, Accenture (NYSE: ACN) has become the sole global strategic partner of hybris, the world’s fastest-growing commerce platform. The agreement will enable international brands to create consistent consumer transaction experiences across multiple channels, including online, mobile and in-store, regardless of geographic location.
Taking advantage of in-car computing, hackers at the DEF CON conference are able to take control of a car by hard-wiring into its systems. Today's cars feature a number of computers, all of which need to talk to each other. Charlie Miller, security engineer, says hackers can figure out how these computers talk to each other and then pretend they are various pieces of the car.
If you’ve been in the manufacturing industry for any length of time, you may have experienced challenges that come along with siloed operating functions. Hopefully, you’ve also seen the value that can be found when we break down the barriers between silos.
Before the world began clamoring for “big data,” there were industrial companies who pioneered via systems like CMMS or EAM in order to better structure their maintenance programs. Having an opportunity to make truly informed decisions due to better tracking of maintenance procedures, asset usage, breakdown costs, and efficiency of resources meant a competitive advantage.
The top prosecutors in San Francisco and New York say they are bringing in state and federal security experts to test the newest anti-theft features designed to thwart the surge of stolen smartphones nationwide. Security experts will be in San Francisco to test Apple's iPhone 5 with its activation lock and Samsung's Galaxy s4 with Lojack for Android.
Treasury Secretary Jack Lew says that cyber theft is a real problem in China that "has to stop." It is a competitive world, Lew says, but despite problems, the United States has emerged strongest from the recession, which shows that the United States remains among the strongest and largest economies in the world.
It didn’t take long for the novelty of social media to fade, and the search for practical application and measurable impact of these vehicles to become a priority. Despite the commercial success of Facebook, Twitter, LinkedIn and several other platforms, manufacturers are still seeking out answers as to whether the time spent on social outreach is worth the effort.
Chrysler Group is recalling 45,961 Ram trucks because their electronic stability control systems may not turn on when the vehicles start. Ram 1500 4x4 trucks built between June 26, 2012, and Feb. 5, 2013, are involved in the recall. Chrysler says a software problem may disable the electronic stability control system when the pickups start.
Microsoft Corp. is reshuffling its business in an attempt to promote faster innovation and a sharper focus on devices and services. The move by the world's largest software maker comes amid lukewarm response to the latest version of its flagship Windows operating system and a steady decline in demand for PCs as people turn to tablets and other mobile gadgets.
China's largest wind turbine company and three people are accused of stealing trade secrets from a U.S. software company, the Justice Department announced Thursday. An indictment handed up in Wisconsin alleges Sinovel Wind Group and the three individuals stole proprietary wind turbine software technology from Devens, Mass.-based AMSC, formerly known as American Superconductor Inc., cheating the American company out of more than $800M.
Check out some of the latest in high tech manufacturing, including the manufacturing software environment and its growing ability to gather and analyze more data, manufacturing automation's march to dominate the plant floor, the importance of reliable material handling information to track the plant of the future, and the cost-saving implications of monitoring and managing facility energy usage.
Humans are curious creatures. We like to see how things work, and we want to know what makes things tick — we have a deep-seated desire to make a connection with our environment by understanding the process of creation. That, in part, is what is so appealing about facility tours.
Jake Ervin is the Machine Whisperer, or at least trying to be. He goes to the [MC]2 conference to meet some cool machines but he keeps striking out, they won't talk to him. Will he find a way to talk to the machines? Will he learn that dinner and dancing is not the way to a machine's heart? Will Jake unlock the secret of the MTConnect standard?
Today’s smaller manufacturers are creating enormous amounts of data — everything from new product designs to top-secret intellectual property, as well as a constant flow of customer and sales information that must be managed and protected every day. To say that this data is vital would be understating the value of its constant use, and any loss of information could be devastating.
Chinese President Xi Jinping and American counterpart Barack Obama will talk cyber-security this week in California, but experts say the state's Silicon Valley and its signature high-tech firms should provide the front lines in the increasingly aggressive fight against overseas hackers.
The latest release, Tecnomatix 11, brings to market the latest in digital manufacturing solutions, which work together to deliver smart, fast, and Lean manufacturing, says the company.
These are designed to offer secure and reliable communication between Ethernet-based systems as well as higher-level networks, says the company.
X3 Version 11, next-generation CMMS, features enhancements that enable customers to ramp up their productivity, says the company.
COFE, Continuous Order Fulfillment Enterprise, processes orders within a distribution center using a demand driven waveless approach, says the company.
The Loctite® Equipment Sourcebook, Volume 9, is an updated 102-page catalog, presenting the complete line of Loctite® dispensing and curing equipment, from simple hand-held devices to fully automated systems.
Customizable sample label packets are designed to demonstrate the range of safety and productivity label types offered by the company, compatible with its growing family of mobile, desktop and wide-format thermal transfer printers.