Share On

Manufacturing Process

The Business Value of TrakSYS™ | Parsec Automation Corp.

White Paper: PARSEC

Through in-depth interviews with leading global manufacturers, the International Data Center (IDC) established the value and impact TrakSYS has on manufacturing operations. Across their 20-page analysis, IDC delves into how TrakSYS enables results like: ·       A 454% three-year ROI  ·       A 9-month payback of upfront costs ·       A 28% reduction in manufacturing errors ·       A 30% increase in error resolution speed ·       A savings of $2.32 million in material costs  ·       An addition of $3.25 million to annual revenue To learn more about these results and how TrakSYS can help elevate your operation, download IDC's business value study now.

Establishing Trust in the Industrial IoT - Security by Design

White Paper: LEGIC

Anthony Fitze, Carl Fenger, LEGIC Identsystems An Overview of LEGIC for the complete version - Click Download. In industrial environments, mass deployment of sensors and the ability to securely collect and process data from fixed and mobile assets increases efficiency and enables better business decisions. It makes it easier to streamline processes, reduce errors, support auditing and enforce quality control. The common denominator: Trust Connecting sensors to the internet is not enough. Improving processes via the “Industrial Internet of Things (IIoT)” depends on a common denominator: Trust. If users, sensors and their interactions cannot be trusted, the results can be costly and even catastrophic, especially where volatile assets and safety are involved, which is often the case. The Three Pillars of Trust in the IIoT Being able to trust in IIoT data relies on linking authenticated users with trusted sensors/objects so that their interactions are reliable, transparent and accountable. Accomplishing this relies on three principles: 1. Accountability: users must be authenticated and accountable before gaining access to sensors or infrastructure. Access permissions must be assigned based on roles, training and authorizations plus context-based criteria such as time and location. Permissions must be autonomously enforced, both online and offline, to minimize human error and support 24/7 operation. All activities must be transparent and auditable. 2. Security: equipment must be configured and accessed by authorized users onsite. As sensors at the edge are the most vulnerable component of an IIoT system, physical hardware-level security must be implemented in the form of an embedded Secure Element for hosting of cryptographic keys and user permissions. 3. Transparency: all interactions between users and devices must be trustable, auditable and transparent to authenticated users. At the same time, they must not be visible to, nor subject to  interception by unauthorized parties either at the sensor, along local area networks, air interfaces or over the public internet. Security by Design: LEGIC Connect mobile credentialing platform for IIoT system users LEGIC Connect is a mobile credentialing platform that securely distributes mobile credentials or other data to registered iOS or Android smartphones or tablets anytime, anywhere and instantly at the touch of a button.  The system provides a globally available, AES encrypted, end-to-end mobile credentialing service that is the backbone of establishing trust and accountability in user/sensor /infrastructure interactions. The system can be easily integrated into existing infrastructure and applications, enabling service operators to manage user permissions and send/receive data securely from/to smartphones and sensors. For details see www.legic.com/connect

Machine Vision – The Eye of Semiconductor Manufacturing

White Paper: MVTec Software GmbH

Introduction Semiconductor manufacturing is not brand new anymore. Nevertheless, the global attention and demand for this “old economy” could hardly be greater. It is driven by megatrends such as digitalization, climate change and sustainability. However, manufacturing is highly complex, small-scale, and supply chains are subject to political, economic, and logistical dislocations. Demand turbulence, triggered by the Corona pandemic, is causing semiconductor shortages in many industries. In addition, geopolitical forces and trade disputes are also tightening the supply of semiconductors. And finally, an imbalance between supply and demand is resulting from the sharp increase in demand in the consumer electronics sector. Since the start of the Corona pandemic, demand for 5G phones, laptops, and other consumer electronics for the home office has grown rapidly. At the same time, cars are increasingly becoming true computers on wheels, relying on electronics and semiconductors to power battery management, driver assistance systems, and consumer electronics. To ensure the availability of semiconductors and to become less dependent on supply chain disruptions, semiconductor manufacturing capacity is currently being rapidly built in many regions of the world. The production of semiconductors is complex and involves more than 1,000 different process steps. The construction of production facilities is correspondingly complex and sensitive. In addition, the individual manufacturers of semiconductors have also implemented different processes in their production. There are also different types of wafers and chips, which place different demands on production. Thus, there is no such thing as a uniform semiconductor manufacturing process. This means that flexible technologies are needed for the industry that can quickly add value despite different processes. One such key technology is machine vision. The advantage is, in particular, that in the high-precision production of semiconductors, the numerous necessary inspection and alignment processes can be automated and carried out with high precision.

Establishing Trust in the Industrial IoT - Security by Design testingrt

White Paper: LEGIC

Anthony Fitze, Carl Fenger, LEGIC Identsystems In industrial environments, mass deployment of sensors and the ability to securely collect and process data from fixed and mobile assets increases efficiency and enables better business decisions. It makes it easier to streamline processes, reduce errors, support auditing and enforce quality control. The common denominator: Trust Connecting sensors to the internet is not enough. Improving processes via the “Industrial Internet of Things (IIoT)” depends on a common denominator: Trust. If users, sensors and their interactions cannot be trusted, the results can be costly and even catastrophic, especially where volatile assets and safety are involved, which is often the case. The Three Pillars of Trust in the IIoT Being able to trust in IIoT data relies on linking authenticated users with trusted sensors/objects so that their interactions are reliable, transparent and accountable. Accomplishing this relies on three principles: 1. Accountability: users must be authenticated and accountable before gaining access to sensors or infrastructure. Access permissions must be assigned based on roles, training and authorizations plus context-based criteria such as time and location. Permissions must be autonomously enforced, both online and offline, to minimize human error and support 24/7 operation. All activities must be transparent and auditable. 2. Security: equipment must be configured and accessed by authorized users onsite. As sensors at the edge are the most vulnerable component of an IIoT system, physical hardware-level security must be implemented in the form of an embedded Secure Element for hosting of cryptographic keys and user permissions. 3. Transparency: all interactions between users and devices must be trustable, auditable and transparent to authenticated users. At the same time, they must not be visible to, nor subject to  interception by unauthorized parties either at the sensor, along local area networks, air interfaces or over the public internet.   Security by Design: LEGIC Connect mobile credentialing platform for IIoT system users LEGIC Connect is a mobile credentialing platform that securely distributes mobile credentials or other data to registered iOS or Android smartphones or tablets anytime, anywhere and instantly at the touch of a button.  The system provides a globally available, AES encrypted, end-to-end mobile credentialing service that is the backbone of establishing trust and accountability in user/sensor /infrastructure interactions. The system can be easily integrated into existing infrastructure and applications, enabling service operators to manage user permissions and send/receive data securely from/to smartphones and sensors. For details see www.legic.com/connect   A secure gatekeeper at the IIoT edge With a secure, end-to-end IIoT platform based on Mobile Credentialing, Managed Encryption and Secure Element technologies, accountability, security and transparency can be achieved. This is particularly relevant for Logistics automation: It ensures secure, transparent and auditable  movement of goods within as well as between facilities by securing access and logging user/asset interactions. Building management: It links persons with a verified identity to enable trusted monitoring of building assets and interactions between users and doors, HVAC systems, security and fire systems, etc. Industrial equipment: It authenticates persons and enables secure dynamic permissioning to ensure trusted interactions with equipment and infrastructure. Protocolled usage data can be collected per user. Updating of permissions can be performed in real-time and over-the-air.   Introducing Mobile Credentialing in the IIoT The LEGIC XDK Secure Sensor development Evaluation Kit is a universal programmable sensor device & prototyping platform for developing trusted IoT applications based on Mobile Credentialing.​ It enables secure sensor configuration and readout via mobile devices which can also be configured in real-time from the cloud. With 8 MEMs sensors, built-in Secure Element for storage of cryptographic keys/whitelists and RFID/NFC/Bluetooth/Wi-Fi communications, it enables rapid prototyping of secure, touchless, sensor based IoT applications.  

Complex Selling in the Manufacturing World: It's Time to Get Digital

White Paper: Experlogic

Manufacturing is one of the world’s greatest sources of innovation. Yet manufacturing sales often rely on yesterday’s tools and processes — spreadsheets and homegrown systems or software solutions that are too narrowly designed to do the job with speed and constant accuracy. Is your sales team dependent on one of those? You Are a Data-centric, Data-driven Business. Is Your Sales Process Keeping Up? Today’s manufacturers benefit from data-backed decisions and processes that start with sales and continue through every part of the manufacturing and delivery process. Unfortunately, many manufacturers’ sales teams still struggle with spreadsheets, homegrown software, and disconnected systems that slow the sales process and increase the risk of errors when data is manually entered and reentered. As a result, deals are lost, and customer satisfaction suffers because sales, production, and delivery are all delayed.

FPM Heat Treating Best in the Midwest

White Paper: FPM

F'M Heat Treating opened its doors in January 1979 to serve the then-booming tool and die market in Chicago. Today, over 35 years later, FPM operates three facilities in two states and has become one of the Midwest’s largest commercial heat treaters. Despite its growth, and its success, FPM has maintained a “small business” attitude. The company does this by providing personal attention from its knowledgeable sales staff, highly skilled metallurgical personnel and experienced customer-service group. This longtime MTI member offers a wide range of heat- treating services to over 3,000 customers in the greater Midwest manufacturing community. More specifically, FPM meets the needs of the automotive, aerospace, construction, consumer- product, machinery and tooling industries. As mentioned, FPM operates facilities in Elk Grove Village, Ill.; Cherry Valley, Ill.; and Milwaukee, Wis. These locations perform a vast and diverse set of processes, including: annealing, normalizing, neutral hardening, tempering, age/precipitation hardening, stress relieving, tool-steel hardening, vacuum hardening, vacuum high- pressure gas quenching, austempering, marquenching, carburizing, carbonitriding, gas nitriding, ferritic nitrocarburizing (FNC), braz- ing, deep freezing, straightening and blast cleaning. What truly makes FPM a unique operation, however, is the variety of processes – and equipment – available at each site.   The company has also developed a strong niche when it comes   to providing “outsourced” heat treatment to businesses that previously operated their own heat-treat department. These undertakings have involved entire operations, providing a significant source of backup/overflow heat-treating capacity. As far as equipment goes, FPM has a lot to offer its customers. For example, the company’s batch furnaces are capable of processing large gears and shafts as well as small stampings and machine parts. With a maximum load capability of 3,000 pounds, these units measure 36 x 36 x 48 inches. FPM’s continuous belt furnaces are designed for high-volume processing of fasteners and other small- dimension parts – up to 5,000 pounds per hour. The company’s vacuum furnaces feature computer-controlled processing, up to 10- bar rapid gas quenching and maximum 5,000-pound load capacity. FPM also owns the North American license to Nitrotec, a nitriding-oxidizing-protection process that provides a highly corrosion- and wear-resistant finish in one sequence. This treatment eliminates the time and handling of secondary plating operations and allows for  the  use  of  lower-priced carbon steel in place of alloyed steels. It can be used as an environmentally friendly improvement to many plating processes, and it provides excellent scuffing and seizure resistance. Yet another example that sets FPM apart is its Nadcap accreditation, which is difficult to achieve and maintain with its focus on processing details and quality documentation. Along those same lines, FPM’s metallurgical laboratories are a huge asset. Staffed by highly trained metallurgical technicians and degreed metallurgists, these labs are responsible for measuring and verifying critical characteristics  of  components,  ensuring  compliance with customer and applicable industry specifications. Equipped  to perform not only traditional sectioning and microstructural evaluations, FPM’s labs offer varying degrees of failure analysis, alloy identification and nondestructive evaluations. So, what does the future hold for FPM? Most likely another 35 years of growth and success. To get there, the company plans on expanding its Nadcap accreditation, upgrading furnace controls, installing new equipment and adding to its customer base and market area. For more information on FPM Heat Treating, visit www.fpmht.com.

THE CHIEF ROBOTICS OFFICER 2017 UPDATE

White Paper: RoboBusiness

To advance industry, the Chief Robotics Officer (CRO) must combine management functions, standardize corporate systems, and integrate robotics innovations. The fast evolving availability of specific business/financial models for Robotics & Intelligent Operational Systems (RIOS) and lower financial barriers to adoption, in addition to increasing standardization levels, artificial intelligence, and automation are driving operational effectiveness (e.g. cobots (collaborative robots) in manufacturing processes, semi-homogeneous use of cloud computing capabilities, application specific solutions. This white paper takes a deep dive into this emerging role responsible for evaluating and implementing robotics, automation, or intelligent technologies into their organizations. Read the following white paper that will address all your questions, such as: What is the use of a CRO in any business? What is the impact of CRO in an organization’s growth and adoption of robotics? What is the future of CRO and Robotics-as-a-service? What are the operational trends for CRO adoption? How to define an action plan for existing or aspiring Chief Robotics Officers?  What are the roles and responsibilities of a CRO? What are the current approaches related to Robotics-as-a-Solution?

A Buyers Guide To Weighbridges

White Paper: AccuWeigh

There are many different types of weighbridge available, each of which is designed for optimum performance in a specific setting.  But because weighbridges are a significant capital investment and play an integral role in how efficiently a site operates, it is worthwhile taking time to understand how they work, what the key features are and the differences between the various designs.  Various factors need to be considered when choosing a weighbridge for a particular application (such as physical site conditions, environment, usage and budget) so you may find the following information helpful when it comes to decision-making.   This whitepaper on Weighbridges will explore following: Above ground weighbridges Pit or semi-pit mounted weighbridges Multideck weighbridges Relocatable steel deck weighbridges Axle weighbridges

Redefining the Concept of Connected Factory for Manufacturing Companies

White Paper: Trigent Software

Across the globe, the manufacturing industry has established agencies to regulate their own market. Today, manufacturers have a wealth of data coming in from operations and other functions which can be turned into a competitive advantage. Manufacturing companies- small and large alike, are also learning how to leverage the value, from sharing of contact lists and files, to streamlining their manufacturing processes. All the innovations are redefining the way manufacturing industries performed their business but are they really connected? This whitepaper delves into the transformations that manufacturers can relate to, including overcoming inefficiencies, securing processes and intellectual properties, while reducing costs. Key takeaways from this manufacturing industry white paper: What should manufacturing industries be mindful of as they plan for growth? Collaborate and safeguard data environments for IP and regulatory compliance A connected world where data becomes business intelligence to fuel growth of manufacturing companies Building a comprehensive closed loop information system

Product Lifecycle Management in the Aerospace Arena

White Paper: PROLIM

Aerospace companies have the constant need to continuously innovate the way they design, create, and produce their products and Product Lifecycle Management gives them the support of one comprehensive platform that allows them to do so. Those who have embraced Product Lifecycle Management as a part of their development processes have already seen an acceleration of 20% to 50% in the development time, along with the associated cost savings. This whitepaper provides insights on the main advantages and industry-wide implications of Product Lifecycle Management in the Aerospace arena, which mainly includes: Improved quality of supply Reduced design to manufacture time Improved responsiveness to service and maintenance

Why is FMEA cost effective?

White Paper: DataLyzer

Failure mode and effect analysis (FMEA/FMECA) is a powerful reliability tool to improve product or process designs early in the manufacturing process. Generating a FMEA can help to build your team and improve your communication, as well as saves considerable cost of future testing and field warranty. It is worth the effort to get the tool implemented in an effective manner. Taking the right approach to FMEA in industrial manufacturing ensures manufacturer produces superior, defect-free products that consistently exceed customer expectations. This White Paper looks at a range of cost savings or revenue improvements that FMEA can bring, it also provide insights into: Why FMEA is critical to industrial manufacturing Recommended FMEA process to be followed by a team of product experts The advantages of an expected cost approach to FMEA Broadening the use of FMEA to mitigate the risk within your organization Improving the FMEA process to predict and prevent problems, reduce costs and shorten development times  

follow on linkedin follow on twitter follow on facebook 2024 All Rights Reserved | by: www.ciowhitepapersreview.com