by Janine Kaiser | Apr 11, 2025 | 01 Get Inspired, Artificial Intelligence, 02 Get Ready: Strategy, 05 Get Technical, Cyber Security, Information Technology/Operational Technology, Internet of Things
Dunmore is a global manufacturer of engineered coated and laminated films and foils with manufacturing facilities in the US and Germany, headquartered in Bristol, PA. In this video, Dunmore’s president Ronn Cort dives into how Dunmore has integrated artificial...
by Janine Kaiser | Jan 31, 2025 | 01 Get Inspired, 02 Get Ready: Strategy, 03 Get Ready: Team, 04 Get Ready: Floor, 05 Get Technical, Partially or Fully Automated Machines, Robots & Co-Bots
Penna Flame Industries, based in Zelienople, PA is an industry-leading commercial heat treater serving customers since 1968. The Penna Flame team worked with the ARM Institute’s Robotics Hub to automate several otherwise manual processes, using robotics. Watch...
by Janine Kaiser | Jan 31, 2025 | 01 Get Inspired, 03 Get Ready: Team, 04 Get Ready: Floor, Cloud Computing, Cyber Security, Decarbonization Technologies, Horizontal & Vertical System Integration, Information Technology/Operational Technology, Internet of Things, Partially or Fully Automated Machines
DMI Companies is a world leader in HVAC products, service, and design, headquartered in Monongahela, PA. Thoughtfully and strategically, DMI has ramped up advanced technologies. Hear more about DMI’s story on their path to Step 4 – Get Ready: Floor,...
by Janine Kaiser | Jan 31, 2025 | 01 Get Inspired, 02 Get Ready: Strategy, 05 Get Technical, Cyber Security
The Department of Defense (DoD) recognizes the need to help Defense Industrial Base (DIB) organizations improve their cybersecurity posture and operational resilience and to help the DIB protect DoD information that resides on and transits DIB information systems....
by Janine Kaiser | Jan 31, 2025 | 01 Get Inspired, 02 Get Ready: Strategy, 05 Get Technical, Cyber Security
The National Security Agency is offering companies with an active DoD contract (sub or prime), or with access to non-public, DoD information, several threat-informed cybersecurity solutions to help reduce risk of network compromise and protect sensitive but...