• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • About
    • Contact
    • Privacy
    • Terms of use
  • Advertise
    • Advertising
    • Case studies
    • Design
    • Email marketing
    • Features list
    • Lead generation
    • Magazine
    • Press releases
    • Publishing
    • Sponsor an article
    • Webcasting
    • Webinars
    • White papers
    • Writing
  • Subscribe to Newsletter

Robotics & Automation News

Where Innovation Meets Imagination

  • Home
  • News
  • Features
  • Editorial Sections A-Z
    • Agriculture
    • Aircraft
    • Artificial Intelligence
    • Automation
    • Autonomous Vehicles
    • Business
    • Computing
    • Construction
    • Culture
    • Design
    • Drones
    • Economy
    • Energy
    • Engineering
    • Environment
    • Health
    • Humanoids
    • Industrial robots
    • Industry
    • Infrastructure
    • Investments
    • Logistics
    • Manufacturing
    • Marine
    • Material handling
    • Materials
    • Mining
    • Promoted
    • Research
    • Robotics
    • Science
    • Sensors
    • Service robots
    • Software
    • Space
    • Technology
    • Transportation
    • Warehouse robots
    • Wearables
  • Press releases
  • Events

Promoted

7 advanced technologies in the construction industry you were desperate to know about. You can thank us later

January 15, 2019 by Carina Perez

Promoted

If you have a construction business, then these 7 hi-tech technologies can grow your business without burning the midnight oil.

We know that technologies are changing virtually every facet of modern-day life.

The construction industry, which is continually being upgraded and updated with the most advanced technology, is one such example of this.  [Read more…] about 7 advanced technologies in the construction industry you were desperate to know about. You can thank us later

Filed Under: Promoted Tagged With: cutting-edge construction technologies, ringlock scaffold, san francisco bay area

The Future is Female: Women’s Solidarity Through Art Exhibition at Teaching Museum Lehigh University

December 18, 2018 by David Edwards

art exhibition image 1

Promoted

“Its man’s world”, James Brown sang in 1966 but this announcement has been faded in the winds over the past year time. Women are now prominent and appeared as iconic role models of the society. Women’s liberation, women’s rights, and women’s stories in US and all over the world are up front.

The #MeToo, #BringBackOurGirls, #YesAllWomen, #WomensReality, #NoMore, #IAmWithHer, #ToTheGirls and #TimesUp movements featuring feminism are not they enabled women to keep talking up about issues of sexual harassment and assault.

There are a record number of women running political and Government offices in the world. However, women are being commended in every field and department of life, still there is much work remains to be done.  [Read more…] about The Future is Female: Women’s Solidarity Through Art Exhibition at Teaching Museum Lehigh University

Filed Under: Promoted Tagged With: art exhibition, future is female, women’s solidarity

Driving Agility and Flexibility in Material Handling Workflows

December 10, 2018 by Sam Francis

vecna homepage pic

 

By Daniel Theobald, CIO and co-founder of Vecna Robotics

Self-driving vehicles and their systems are driving agility and flexibility in a time of unprecedented business and labor demands. This is part two of a four-part series focused on robotic integration in the material handling value stream.

Increased customer expectations are affecting every part of the supply chain. People are spending an unprecedented amount of money, and they want more options and quicker service.

This is expanding the range of inventory, increasing inventory turnover rates from days to hours, and changing expectations from free two-day to free within the hour delivery.  [Read more…] about Driving Agility and Flexibility in Material Handling Workflows

Filed Under: Features, Logistics, Promoted Tagged With: autonomous warehouse solutions, logistics, supply chain, vecna robotics, vecna technologies

Robotic Solutions: The Next Phase of Lean Manufacturing

December 5, 2018 by Sam Francis

By Daniel Theobald, CIO and co-founder of Vecna Robotics

This article takes a deep dive into the history and present state of Lean Manufacturing in materials handling. It focuses on the pioneers and innovations that brought us to the current state of material flow and the practice of waste elimination. It is part one in a four-part series focused on robotic integration in the material handling value stream.

Lean Manufacturing reduces production time and costs by eliminating waste (non-value-added activities). Its origins trace back to the concept of interchangeable parts; its evolution brings us into the term and process we know today.

Lean Manufacturing was molded by leading scientists, industrial engineers, and innovative organizations such as Ford and Toyota. The core concept behind Lean Manufacturing, waste elimination, is a valuable strategy to increase the bottom line while speeding up the rate of production. [Read more…] about Robotic Solutions: The Next Phase of Lean Manufacturing

Filed Under: Features, Logistics, Promoted Tagged With: daniel theobald, vecna technologies

Why investing in robotic packaging automation is right for your business

December 4, 2018 by Abdul Montaqim

melbpack 2

Robotics packaging is being applied to an increasing number of industries as the advantages of robotics in packaging automation have become evident and identified as the future of production line packaging.

Production line automation allows companies to create efficiencies without sacrificing craftsmanship or quality. Using robotic package automation will reducing staff injury and provide the scope for expanding operations with accuracy and consistency.

Packaging robots are easily integrated into a workspace and perhaps the greatest benefit is that by using robotic packaging automation it reduces packaging time, it has the ability to lift larger items, automation means reduced labour costs and staff are free from time-consuming, repetitive and often dangerous manual tasks.  [Read more…] about Why investing in robotic packaging automation is right for your business

Filed Under: Features, Industry, Promoted Tagged With: melbourne packaging supplies, melbpack, robotic packaging automation

State sponsored industrial espionage: Is your current threat detection enough?

November 27, 2018 by David Edwards

industrial espionage

As the world continues to expand its reliance on computing technology, data has become a commercial form of currency. As with all things of value, modern criminals are using every means necessary to access data and exploit it for various reasons.

Data breaches are increasingly more common, and it almost seems as if we’re only a notification away from the next global industry leader reporting a compromise of their network revealing data of hundreds, thousands, or millions of customers.

While these breaches are generally the result of hacking or computer/network intrusions, there are several other categories that fall under these attacks. These infiltrations can also be caused by accessing the stolen laptop or computer of an employee, negligence or error by personnel that exposes vulnerabilities or sensitive data to the public, or even through accidental exposure through cloud-based storage and services.

It is normally perceived that these attacks are caused by hackers who are looking for secure information of end users to sell with the intent of identity theft or access to banking information. However, data breaches can really be instigated by anyone with enough knowledge and intent to gather their desired information.

Industrial espionage in modern IT

When discussing espionage, thoughts that come to mind are secret agents across the globe struggling to keep their nation’s security intact or attempting to thwart the attacks of a criminal organization. Industrial espionage is a real threat to organizations that are in competition to gain an advantage over their rivals.

In October 2018, federal prosecutors revealed the details of charges accusing Chinese government intelligence officers and their co-conspirators of repeated computer intrusions to steal turbofan engine designs for commercial jetliners. The offenders were attempting to gather designs develop their own comparable engine to be manufactured in China by their government-owned aerospace company.

These designs were developed via partnered effort between unnamed companies and a US-based aerospace organization.

The indictment provides details how those involved used various hacking methods between 2010 and 2015 to gain access to aerospace company networks. One method was to implement and register a doppelganger domain name that closely matches one of the companies involved in the engine design.

While most companies were not mentioned in the 21-page indictment, Capstone Turbines, a Los Angeles gas turbine manufacturer, was listed as a target, so one domain name created was capstonetrubine.com.

By creating a domain that resembled the original company, they were able to use a watering hole attack method where outside organizations mistakenly accessing the false domain become infected with malware making their own network infrastructures vulnerable.

The more frequent an outside company accesses the original domain, the higher the probability of accessing the incorrect domain and spread malware. Using a combination of spear phishing, watering hole tactics, malware, and domain hijackings, the attacks remained undetected until US law enforcement was able to uncover the infection and notify businesses to take action.

The importance of robust threat detection

This example is evidence why organizations must place a critical focus towards threat detection and prepare themselves on how to respond to these attacks to minimize damage incurred by using security methods such as micro-segmentation.

It’s best to focus on the discovery of threats as soon as an attempted or successful intrusion has taken place. Employing protection through dynamic deception, reputation analysis, and policy-based detection helps to detect live breaches and allows for immediate containment to investigate the actions and determine if they’re malicious.

Early threat detection is a vital tool for network infrastructures to prevent prolonged access to sensitive data while providing organizations with the ability to act quickly and minimize the spread of any virus or malware effects.

Based on the example of the stolen engine design, early detection would’ve immediately identified the attack to protect the files and prompted an immediate investigation of the attack source and involved culprits.

During the investigation, data collected from the incident is reviewed to navigate the footprint left behind by the attack, determine user credentials and the methods chosen for the intrusion, and then identify the attack trends and characteristics.

The information gathered allows administrators and security teams to evaluate the situation to determine if the intrusion was a new or unrecognized user with real business needs or if a true attack has been initiated and security response protocols should be enacted.

The response tactics taken by organizations after a threat has been detected are also important to limit the landing site, or damage area, of a malicious invasion.

With an advanced micro-segmentation foundation in place, the entire network architecture is monitored and has incident response policies ready to take quick, immediate quarantine actions.

Options like exporting IOC (inversion of control) to specific security gateways, single click updating of segmentation policies in to limit traffic access to their attack points mitigating the east-west movement to systems accessible with the intruder’s credentials, and even suspend, stop, or disconnect VM actions to limit the damage caused by the attack.

Rapid detection of threats minimizes losses

Taking precautions towards keeping a network infrastructure hidden from hackers has been a primary security practice for quite some time. However, with how often attackers are probing networks worldwide, it’s imperative to prepare for the likelihood of an intrusion.

If left unmitigated, breaches will lead to financial losses in the immediate term while negative brand recognition can affect future opportunities. With the frequency and success rates of cyber-attacks today, it’s imperative to have an action plan to address what happens when an intrusion occurs.

Promoted

Filed Under: Promoted Tagged With: industrial espionage, threat detection

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 41
  • Page 42
  • Page 43

Primary Sidebar

Search this website

Latest articles

  • Construction and demolition robots: Building the future
  • Robotics Rising: What Hiring Trends Reveal About Automation Careers
  • Xpanner launches ‘first’ scalable physical AI-based automation solution for construction sites
  • Skelex starts exoskeleton pilot in greenhouses in the Netherlands
  • Humanoid Global makes ‘software investment’ in RideScan
  • $50 million funding sparks ‘manufacturing technology breakthroughs‘ in Ontario
  • Wachendorff expands range of IO-Link encoders
  • Robotics survey highlights autonomy, digital twins, humanoids and ethics as key 2025 trends
  • ABB to implement gearless mill drive service program at Codelco copper mines in Chile
  • Systraplan unveils new automatic tread booking systems for tyre manufacturing

Secondary Sidebar

Copyright © 2025 · News Pro on Genesis Framework · WordPress · Log in

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT