• Recruiting Millennials for Manufacturing Careers

    Recruiting Millennials for Manufacturing Careers

    A key recruiting challenge for the prospective Millennial may be an outdated image of manufacturing careers from popular culture and possibly even their parents. Manufacturing today is increasingly digital and innovative. Companies looking to recruit these younger workers must actively strive to prove that they value high technology and creativity as much as Millennials do.
  • Breached? 3 Communications tips for managing a cybersecurity crisis

    Breached? 3 Communications tips for managing a cybersecurity crisis

    Data breaches are among the most challenging, frustrating and anxiety-ridden situations, especially for contractors. Once you discover someone has access to data and/or systems, the process of containing the situation, assessing the damage and responding to your client and other impacted stakeholders is a long, arduous, embarrassing and costly process.
  • 14 warning signs your computer is malware-infected

    14 warning signs your computer is malware-infected

    With so many ways out there to access and exploit vulnerable systems, we need to make sure we’re able to recognize a malware infection in order to prevent and defend our systems. You need to know how to tell if you have malware!
  • Robots, Cobots and Human Labor

    Robots, Cobots and Human Labor

    Robots have long been romanticized in art and popular culture. From HALL 9000 and the Terminator series where they are seen as a menace to humanity, through to Star Wars or WALL-E where they are benevolent and even heroic, robots can be portrayed both positively and negatively.
  • What is ransomware resiliency and how to obtain it

    What is ransomware resiliency and how to obtain it

    The ever-growing threat of ransomware over the past few years has IT professionals adding additional security controls. The only protection from a ransomware attack is to prevent it. This is why ransomware resiliency is so important to all organizations.
  • Who are we & how to engage with us

    Who are we & how to engage with us

    The University of Utah Manufacturing Extension Partnership (MEP) Center is the MEP Center for the state of Utah. Our mission is to provide Utah manufacturing companies with services and consulting to increase their global competitiveness. We do this through growing and retaining jobs, cost savings, and increasing sales and investment.
  • The background on industry cybersecurity standards: NIST, CSET, DFARS

    The background on industry cybersecurity standards: NIST, CSET, DFARS

    How to best understand the Cybersecurity guidance and volumes of information is an ominous challenge? The foundational cybersecurity work produced by NIST (National Institute for Standards and Technology) is a comprehensive cybersecurity review. Rather than diving too deep in to NIST and the regulatory nature of the definition of classified vs unclassified information and its protection, we will touch on the value of measuring a commercial organizations cybersecurity posture.
  • The value of a proactive, structured project management

    The value of a proactive, structured project management

    Imagine that you have been given the responsibility of managing a client’s $5 million software-maintenance project. As you start going to on-site meetings, you see that the client lead is speaking without any particular agenda or business objective in mind. Furthermore, nobody is taking notes, so action items aren’t being created, progress is not being tracked, and no meaningful follow-up reports are being shared with team members.
  • 5 robotic essentials for small and mid-sized manufacturers

    5 robotic essentials for small and mid-sized manufacturers

    For small to mid-sized manufacturers, any gain in productivity can have a huge impact. Automation offers significant advantages, but many small and mid-sized businesses (SMBs) believe that robotics is out of their reach. These organizations can’t afford large, complex robots that don’t fit within their limited floor space, that require specialized personnel to program and maintain them, and that are simply too expensive, with a payback period that is too long to justify the investment.
  • Preparing for the new age of cyberrisk

    Preparing for the new age of cyberrisk

    Malware has crippled banks, railway systems and power companies, but the Associated Press (AP) reported last week that manufacturers increasingly are the victims of cyberattacks too.

 
View blog archive