Uncategorized

Will the FAA’s New Regulations Ground the Commercial Use of Drones?

The Federal Aviation Administration (FAA) has published its first regulations governing the commercial use of unmanned aircraft systems (UAS), commonly referred to as drones. The new regulations are set to take effect in August.  Despite widespread media coverage of potential commercial applications of drone technology, such as…



The Dirty Little Secret: It’s Not About Your Product

Manufacturing firms tend to focus on their products. In fact, we often fall in love with them. It consumes most of our time at work, and for many in the business, much of their time away from the office as well. We celebrate big orders and naively…


5 important advantages to an SBA Guaranteed 7a Loan

Although there are many reasons a company should consider an SBA loan, there are 5 critical advantages to an SBA loan which should be considered when applying for a loan to expand or refinance your business or acquire a new one.  SBA loans are intended to improve…


Why is VDA 6.3 on the rise and why should SC manufacturers care?

With over 250 automotive manufacturers and associated suppliers calling South Carolina home, it is important that increasing customer demands be understood as a means of maintaining a competitive advantage. Not only are the requirements for implementing various ISO standards on the rise once again, we are also…



Chemical company saves money and the environment through sustainable alternatives

SCMEP Case Study: NICCA USA reduces expenditure on energy and decreases environmental impact with help from SCMEP Company Overview Nicca Chemical Industry Co., founded in 1941, is a supplier of water-based chemicals to the automotive and textile industries. NICCA USA, Inc., which opened its doors in 1988…



Are Your Processes Safe, Hackers Turn Attention to Manufacturing

The presence of “hackers” in the manufacturing industry is ever growing and more attention should be given to this increasing threat. We are certainly familiar with unauthorized intrusions into the IT systems of the financial and retail industries – think Target, SONY, JP Morgan and even South…