Podcasts: projects, data, 3-D, PLM, encryption
Podcasts are not just for entertainment these days. Continuing education opportunities abound for engineers who find it easier to listen than read a book or attend a class. Recently available tutorials include information on outsourcing,, data collection and decision making, the National Engineering Design Challenge, and encryption technologies.
Podcasts are not just for entertainment these days. Continuing education opportunities abound for engineers who find it easier to listen than read a book or attend a class. Recently available tutorials include information on outsourcing,, data collection and decision making, the National Engineering Design Challenge, and encryption technologies. Links to download or register are provided.
An emerging project economy makes obsolete many business philosophies and systems of the past, according to IFS. Instead of manufacturing products within the same business entity in the same physical location, many companies are outsourcing functions such as production, design, and aftermarket service to lower-cost suppliers in other parts of the world.
https://download.ifsworld.com
In “Unleashing the Potential of Your Process Data,” Matrikon tells how industry can shift its focus from data collection to using data to make intelligent decisions. Search on podcast at…
www.matrikon.com
3-D design software helps students invent things to help the disabled enter or advance in the workplace; last year more than 1,000 students from 50 schools participated in the program. For more about the National Engineering Design Challenge (NEDC), coordinated by the Junior Engineering Technical Society (JETS) and the Javits-Wagner-O’Day (JWOD) program, listen to a SolidWorks 3-D CAD software podcast, “JETS flies with SolidWorks support.”
www.solidworks.com/mediapodcast
IT and product life-cycle management (PLM) infrastructure can promote a “design anywhere, build anywhere, support anywhere” architecture. Go to MBT magazine Executive Broadcast at…
www.mbtmag.com/resources
30 years of public key cryptography, a hidden, but profound technology that shapes communication and commerce, was discussed at a recent event on the topic. Technologies must become much more usable and transparent, for better information sharing across devices. Electronic crime and other digital threats will continue drive adoption of security technologies as various vulnerabilities are exposed.
www.voltage.com/PKC
Do you have experience and expertise with the topics mentioned in this content? You should consider contributing to our WTWH Media editorial team and getting the recognition you and your company deserve. Click here to start this process.