Managing a new enterprise system can be a daunting task. It can test your staff’s knowledge bases and affect the top and bottom line of your business. That being said, many companies have invested in some sort of PLM or PDM tool (learn more about what ERP, MRP, PLM, and PDM are in this post). This post is for everyone that has invested in a PLM/PDM tool and wants to make sure they’re getting the most out of the investment.

Here are five signs it is time to invest in PLM consulting.

1. You use your PLM /PDM system solely for data management 

Many people purchase PLM (Product Lifecycle Management) systems and struggle to use them to their full potential.

They relegate these amazing systems to simple file vaults.

But, they paid for so much more.

If you’re implementing a PLM tool and use it as a  data vault, you’ve essentially taken on 100% of the investment to recognize 20% of the benefit.

Without full understanding and utilization of your PLM system, you’re missing the opportunity to capture the main benefits of these investments.

When fully implemented and adopted, these systems integrate people, data, processes and much more.

2. You don’t fully understand your PLM system 

I hope none of you that relate to this point think I’m calling you dumb.

PLM is just…a lot.

A good analogy is a car.

We all understand the basics; four wheels, seats, steering wheel, engine.

It is obvious why I want a car, the benefits are clear to me.

That doesn’t mean I know how to troubleshoot, install, and maintain an ignition system.

It is not uncommon to have the wrong idea of PLM system complexity.

They do a lot: data management, process management, lifecycle change, and much more.

This could be why 70 percent of PLM investments are failing to meet manager expectations.

When PLM systems are implemented correctly, they allow your company to further maximize productivity.

3. You Find Yourself Re-Inventing the Wheel

Product lifecycle management solutions are enterprise level systems.

When you attempt to utilize optional configurations, they become complex quickly.

Due to this, many companies find themselves reinventing the wheel around correct PLM configurations.

When this happens, you are only taking more steps backward.

This can easily be avoided with the help of a knowledgeable PLM consultant who is familiar with your situation and has the ability to direct you down the right path.

Alliance Program Request a Quote

4. You have multiple issues with PLM system stability 

With so many companies investing large amounts of money into PLM enterprise systems, it is important for them to be working correctly.

If your PLM system is continually going down or needs to be restarted, this is another sign you should look into PLM consulting.

A product lifecycle management consultant with experience could locate and diagnose the root cause of your PLM system’s problems, allowing your company to avoid them in the future.

5. Your users complain about general PLM system usability

If your team is constantly complaining about the general performance and interaction on of your PLM interface, odds are that your system hasn’t been properly configured.

Complaints are one thing, but an inability to address the cause and improve user’s situation— that can have a dramatic impact on employee satisfaction and productivity.

User complaints are typically symptoms of larger PLM issues.

An experienced PLM admin can typically decode user feedback and develop a plan to dramatically improve productivity and UX.

The need for ongoing product lifecycle management system administration and maintenance is often overlooked by many companies.

For PLM systems to properly evolve, it is important to partner with system experts who can help your business succeed.



Free Windchill System Check-Up

Let’s talk about Windchill System administration services and why they could be crucial to your business’s success.

When it comes to engineering centric products, technology can become a very complicated matter.

Due to the complexity of product data management systems, many things can go wrong if they’re not properly managed.

Here is a list of the common problems you could face if you choose to manage your engineering data management and PLM systems in-house.


1. System downtime 

One of the worst problems you may face is extended sessions of Windchill downtime due to technology failures.

For example, it is common to be unaware when your Windchill system is running out of disk space. When this happens, a Windchill system can and will go down.

In many cases, these system instances are easily overlooked without the help of a dedicated Windchill support team.

The reality is, if at anytime your product data management system is not functioning, your company will end up losing money.

Aside from preventing your business from making profits, a Windchill system downtime could lead you to lose access to core systems.

This includes servers and back-end processors, ultimately, preventing you from doing your job. According to a study done by USA Today, 80 percent of managers reported product data management system downtime costs exceeding $50,000 per hour.


2. Windchill System Performance Problems 

More than 70 percent of our customers do not perform routine Windchill maintenance.

Without utilizing a Windchill managed services team, you could be missing an opportunity to prevent, find and fix system problems prior to a technology failure.

How are you supposed to know if your PDM system needs more RAM, if you should allocate more resources, or if your Windchill server has been performing slow?

When you have regular performance check-ups, you will be able to improve the overall performance of your business.

Regular Windchill system performance check-ups also help avoid system downtime as you are provided with early warnings of any possible malfunctions that may occur. If a disaster strikes, you can rest easier knowing your business won’t lose any valuable data.


3. Productivity loss

Not only can technology failures prevent your business from making a profit, it can also cripple the productivity of your employees.

I mean nobody wants to hand out free money to those who are just sitting around simply because they are unable to do their job, am I right?

Many times, your IT department may have to work overtime to recover lost data. If the customer perception is affected, a costly marketing campaign may be the only thing to win back customers.

Bottomline, the impact of a Windchill system complication may be worse than you realize and your company could lose the ability for anyone to do work.



4. High-Security risks

Your Windchill system could appear to be running properly, but if it is not protected, your business could experience a security breach. If this happens, it will put your sensitive data at risk.

To help with this, it is important to have multiple layers of security measures in place. If your system is being closely monitored by an Windchill administration team, you will be aware of any inconsistencies.

When you have someone you trust monitoring your Windchill system, you’ll have less to worry about. I truly believe it is better to be safe than sorry when it comes to your company’s data.

By using a Windchill system administration service, you can rest easy knowing you are being taken care of. Plus- while your system is being properly maintained, you will be able to free up your IT department and focus on more important business initiatives.

Want to learn the current health of your Windchill System? With no obligations or any cost – sign up for a Windchill system check-up to have our experts look at your system!


Transforming the way you experience NASCAR | EAC Product Development SolutionsIn preparation for the LiveWorx 2017 conference in Boston an amazing team of EAC, PTC, and RCR folks worked to create an entirely new experience for NASCAR fans. The experience was unveiled at the entrance of the Xtropolis exhibit hall floor and allowed LiveWorx attendees to interact with an actual RCR race vehicle using augmented reality (AR). The experience wowed show sponsors and attendees alike.

Racing provides many traditional experiences; the race track, the stands, concessions, meet and greets, etc. You may get to
see a car from a few feet away, but rarely will anyone get a chance to see inside a car or what’s beneath the sheetmetal. Our development team created four ThingWorx View “experiences” for people. Each one allows them to interact with a different part of the car in a different way using nothing but their smart phone or table and the ThingWorx View app that is available for free on both the Apple App Store and Google PlayStore.Transforming the way you experience NASCAR | EAC Product Development Solutions

In the picture below you will see one example. On an iPad we are able to scan a ThingMark and launch an AR video that shows the fuel system and how a car is fueled.
RCR Fueling | EAC Product Development Solutions

Another experience lets a viewer watch the official tire change process. It’s really cool stuff.
Tire Change | EAC Product Development SolutionsTransforming the way you experience NASCAR | EAC Product Development Solutions

Moving to the other side of the car lets you see the roll cage structure and displays some really interesting facts and information across the top of the screen.
Transforming the way you experience NASCAR | EAC Product Development Solutions

EAC, RCR, and PTC are using technology, available now, to engage customers and fans in an entirely new way. Let us know if you’d like to know more about how AR and the IoT can transform the way your internal and external customers engage with your products.

The Internet of Things (IoT) poses unique challenges when it comes to protecting smart, connected devices. If devices are hacked, they could cause serious problems. It’s critical to understand what these challenges are and how you can overcome them. A secure IoT solution requires complete collaboration among the infrastructure, platform, developer, and device controller.

Some of the security challenges the IoT faces include user management in the cloud, device variety, and application vulnerability.

User Management in the Cloud

Cloud permissions are typically granted to one human using one application, there are firm boundaries around the authentication and authorization processes. When the IoT is in the cloud as well, devices can authenticate themselves as a human or on behalf of a human. This means a much more complex permission process as well as a trust model must be put in place to maintain security.

A big difference between the cloud and the IoT is that the IoT (typically) has more devices than the cloud. For a hacker to do serious damage, they don’t need to penetrate all of the devices, just a small number of them or even a single weakly protected device.

Variety of Devices

The varying types of smart, connected devices present immense opportunity for damage if a hacker successfully overtakes them. Organizations must ensure their devices and applications are secure from attackers even with knowledge of IoT operations.

Researchers have found they have could interfere with driving an automobile, the functionality of a pacemaker, and even changing the position of rifle’s aim. Your device security is critical.

Application Vulnerabilities

Hackers could go as far as gaining instant access to high-level IoT deployments. They can do this by targeting security weaknesses in the firmware and/or applications running on embedded systems. If your IoT implementation is not properly managed, a compromise of a single device could compromise your entire system.

Environments where devices are deployed through other organization’s networks are especially important. Your organization’s ability to lessen security issues among devices will decrease if you lose control leaving your applications vulnerable.

Now that you’ve read through some of the security challenges the IoT faces, you may want to take a moment and continue reading to learn how to protect your digital data, as well as security best practices: authenticate, authorize, and audit. Security risks associated with the IoT are growing, but you can take preventative action to ensure the security of your IoT devices and deployments.

Rob Black, CISSP Senior Director of Product Management at PTC wrote the White Paper, “Protecting smart devices and applications throughout the IoT ecosystem,” where he reviews IoT security best practices. You can read it here.

Learn more about IoT security

Many PTC Creo users may be surprised to discover that hidden in their Creo file directory, there are two powerful CAD automation tools just waiting to be utilized! Creo Web.Link and Creo J-Link are two API tools that are packaged with all Creo installs; no extra licensing necessary. Both tools provide a way to access and modify your CAD data from a custom User Interface (UI) or a webpage.

The question is, what benefits can you reap from these tools? Perhaps there are technical staff members that don’t know the Creo tool, but they want to generate drawing PDF’s by entering some dimensional and parameter information. Conceivably, customer orders could be retrieved from a database to drive CAD or generate a Point of Departure (PoD). There are many opportunities that may arise where a UI is more efficient than modifying your CAD data directly in Creo. Today, we’ll focus on Web.Link due to its relative simplicity compared to J-Link.

Web.Link utilizes Creo’s embedded browser to reach into your CAD session and touch almost every aspect of a model, assembly, or drawing. A user builds a webpage and connects to the CAD using the JavaScript API. One caveat of Web.Link is that a user MUST use the embedded browser, whereas with J-Link, the program you create can run asynchronously – meaning Creo does not have to be running to use it.

The full functionality of Web.Link is documented in your Creo install directory at ‘[datecode]Common Filesweblinkweblinkug.pdf.’ There is also a searchable API located in the same directory which provides more detailed information on all the available features. The documentation may be a bit overwhelming at first, but here are the basic steps.

Basic Steps of Getting Started with Creo Web.Link

  1. Create a web page with text input, buttons, and anything else that you may use to access or modify your CAD. For example, you may have some dimensions or parameters you may want to modify. You may want to run a macro (mapkey). Or, you may just want to display relevant model information.

    Figure 1
    Figure 1: Basic HTML page
  2. Use the JavaScript objects, classes, methods, etc. to connect everything to CAD.

    Figure 2
    Figure 2: JavaScript function that accesses CAD data and populates the webpage text boxes
  3.  Open the webpage in your Creo embedded browser and try it out! There are prepackaged examples for you to try in the Web.Link directory if you don’t want to jump in the deep end right away. There is also a ‘pfcUtils.js’ file that comes in handy for many of the Web.Link programs you’ll write. It’s a library of useful pre-built functions that many of the examples use.

    Figure 3
    Figure 3: Retrieving model and session information from Creo through the embedded browser

A couple of Items to Note:

  1. Be sure to read the section in the Web.Link User Guide that addresses browser security. Running javascript in an Internet Explorer (IE) browser session typically sets off red flags and you’ll have to configure your IE security to enable the ActiveX scripts. Alternatively, you can use the Mozilla browser, and use a few lines of code in your JavaScript (See Figure 2) to address it.
  2. There are a few configuration options that must be enabled to allow Creo Web.Link to access the CAD session. The relevant configuration options are:
    • WEB_ENABLE_JAVASCRIPT
    • WEB_LINK_FILE_READ
    • WEB_LINK_FILE_WRITE
    • WEB_LINK_PROE_READ
    • WEB_LINK_PROE_WRITE

Creo Web.Link is a simple tool that can make a huge difference in how your company interacts with its CAD data. I encourage you to skim through the Web.Link User Guide and try out some of the examples provided. If you have any questions about Web.Link, please direct them to the comment section. If you have any questions related to CAD Automation services provided by EAC, please contact us! If you need an extra copy of the PTC Creo Web.Link User Guide, click the image below to download.

PTC Creo WebLink User Guide

One challenge when working with technical information is that publications can be very large. Several hundred pages is not unusual and in some cases over a thousand pages are necessary to describe complex service procedures and part catalogs.
Authoring and assembling large books can be a painful process as the sheer size can be taxing to software. XML, DITA, and managing content objects do ease the pain, it is what industrial strength publishing software is designed to do. However, there is only so much information the average workstation can process.

Many creative solutions have been implemented to meet unique business requirements for book assembly. The business requirements and data sources vary from company to company, such as selecting lessons individually to create a complete custom course; or selecting individual part list and image pairs to create a complete part catalog. As an application expert, I have personally coded many custom solutions to support cobbling books together over the years and I know that many other equally creative solutions exist.

Word Cloud

PTC’s Service Information Manager adds three advanced capabilities to the XML authoring and content management system:

  1. Translation Management
  2. Part List Generation
  3. Publication Structures

Publication Structures are the least sexy of the three and the one that truly revolutionizes the book assembly process. Publication Structures are used to assemble information objects that are to be published. Essentially each Publication Structure represents a book. You can add a table of contents, a parts list, or any other XML content object or images to the book right in the Windchill SIM web browser user interface.

Without Publication Structures, books are typically assembled manually in Arbortext Editor. Someone would still have to assemble the book manually in a Publication Structure, but the user experience is very different. To get a sense of this, in Arbortext Editor, if a writer wants to move a chapter to a different location, they would edit the document, select content, cut it, move to the new location, and then paste. In a Publication Structure, the user can drag and drop chapter or section objects in the structure without ever opening the book to edit it.

Publication Structures provide an out-of-the-box method of assembling publications for the technical documentation community without customizing. As a result, organizations are able to greatly improve the process of information delivery and are able to leverage dynamic publishing capabilities to bring products to market faster, and keep customers better informed.

Learn More

Refer to PTC’s web site for a complete description of Service Information Manager.

EAC information solution experts have decades of reliable XML solution experience. Explore the EAC website to learn more about our products and services or review the Product Development Information Services Brochure.

Download our PDIS Brochure