Remove 2009 Remove Information Remove Logistics
article thumbnail

Rockwell Automation to strengthen its position with Clearpath Robotics acquisition

Automation Mag

Data from Rockwell’s offerings and OTTO Motors’ AMRs will be harnessed in artificial intelligence-powered Software as a Service information management applications, such as those by Rockwell’s Plex and Fiix businesses. The combined technology will also amplify Kalypso’s production logistics consulting practice.

Robotics 109
article thumbnail

Boston Dynamics debuts electric version of Atlas humanoid robot

Robotics Business Review

Boston Dynamics began with humanoids by sawing one of its pneumatically powered quadrupeds in half back in 2009. “In addition to the target application of a lot of parts movement — a special kind of logistics in automotive production — I think that will evolve as the dexterity of the robots improves over time.”

Robotics 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

FND Q&A with Würth Group Leadership

Fastener News Desk

Even in the crisis of 2009, the Würth group clearly stated that we would not lay off colleagues, so we held true to that promise as people are the core success factor of our business. Often our customers do not know if the information they have on their computers is exactly what the usage is at the production line where their people work.

article thumbnail

Industry charity Transaid celebrates Silver Jubilee

SMMT

This year international development organisation Transaid is celebrating a quarter of a century since it was formed by Save the Children, the Chartered Institute of Logistics and Transport (UK) and its Patron, Her Royal Highness The Princess Royal.

article thumbnail

Top Legal Issues Facing the Manufacturing Sector in 2023

Foley

2 As manufacturers increasingly integrate digital information technology with physical operational technology, the vulnerabilities that cybercriminals can exploit continue to multiply exponentially. A successful attack on a manufacturer could give the attacker access to connected networks, such as suppliers, logistics partners, or customers.