Cracks in the System
Cybersecurity threats don’t always kick the door down—sometimes, they slip in through the cracks. This month, we’re spotlighting three subtle but serious security risks that could be undermining your defences right now.
If you’re working with received assembly models, or taking copies of existing assemblies in Inventor, you may need to ‘deep purge’ the assembly to clean out all of the appearance overrides it contains.
This is actually not a single click operation, as each sub-part can have its own internal colour overrides. This video looks at several potential methods to ‘reset’ all appearances, and ends with an all-purpose iLogic solution for the problem – enabling you to make an assembly a blank canvas in a single operation.
Click here to download the iLogic code; check out the video below for the full detail
Note: the below video was created by Excitech prior to becoming Symetri in January 2021, following its acquisition by Addnode Group. All Excitech products, services and solutions mentioned in this recording are available through Symetri.
Cybersecurity threats don’t always kick the door down—sometimes, they slip in through the cracks. This month, we’re spotlighting three subtle but serious security risks that could be undermining your defences right now.
As 2025 comes to a close, we’re looking back at some of the most impactful cyber threats of the year and more importantly, what they reveal about the challenges ahead. From ransomware tactics to AI-driven phishing and risky app integrations, this round-up highlights where businesses have been most vulnerable and how you can strengthen your defences in 2026.
Learn what Product Lifecycle Management (PLM) is and how it helps teams manage product data, processes, and collaboration across the lifecycle. Discover the key benefits and PLM tools driving innovation.