Podcasts: projects, data, 3-D, PLM, encryption

Podcasts are not just for entertainment these days. Continuing education opportunities abound for engineers who find it easier to listen than read a book or attend a class. Recently available tutorials include information on outsourcing,, data collection and decision making, the National Engineering Design Challenge, and encryption technologies.

By Staff December 1, 2006

Podcasts are not just for entertainment these days. Continuing education opportunities abound for engineers who find it easier to listen than read a book or attend a class. Recently available tutorials include information on outsourcing,, data collection and decision making, the National Engineering Design Challenge, and encryption technologies. Links to download or register are provided.

An emerging project economy makes obsolete many business philosophies and systems of the past, according to IFS. Instead of manufacturing products within the same business entity in the same physical location, many companies are outsourcing functions such as production, design, and aftermarket service to lower-cost suppliers in other parts of the world.

https://download.ifsworld.com

In “Unleashing the Potential of Your Process Data,” Matrikon tells how industry can shift its focus from data collection to using data to make intelligent decisions. Search on podcast at…

www.matrikon.com

3-D design software helps students invent things to help the disabled enter or advance in the workplace; last year more than 1,000 students from 50 schools participated in the program. For more about the National Engineering Design Challenge (NEDC), coordinated by the Junior Engineering Technical Society (JETS) and the Javits-Wagner-O’Day (JWOD) program, listen to a SolidWorks 3-D CAD software podcast, “JETS flies with SolidWorks support.”

www.solidworks.com/mediapodcast

IT and product life-cycle management (PLM) infrastructure can promote a “design anywhere, build anywhere, support anywhere” architecture. Go to MBT magazine Executive Broadcast at…

www.mbtmag.com/resources

30 years of public key cryptography, a hidden, but profound technology that shapes communication and commerce, was discussed at a recent event on the topic. Technologies must become much more usable and transparent, for better information sharing across devices. Electronic crime and other digital threats will continue drive adoption of security technologies as various vulnerabilities are exposed.

www.voltage.com/PKC