John Biagioni
U3BlYWtlcihFdmVudF8yNDY2MDE1LEV2ZW50UGVvcGxlXzM3OTU5MzQzLFVzZXJfMTQwMDg1MTYp https://cdn-api.swapcard.com/public/images/d23a36ab1e294992b096ae88f93f35d2.png John Biagioni John Biagioni John
U3BlYWtlcihFdmVudF8yNDY2MDE1LEV2ZW50UGVvcGxlXzM3OTU5MzQzLFVzZXJfMTQwMDg1MTYp https://cdn-api.swapcard.com/public/images/d23a36ab1e294992b096ae88f93f35d2.png John Biagioni John Biagioni John
U3BlYWtlcihFdmVudF8yNDY2MDE1LEV2ZW50UGVvcGxlXzM4MDYyNDE2LFVzZXJfMjM3Mjc5NDkp https://static.swapcard.com/public/images/04112f2d848d4affbc63553850a4b7a6.jpeg Manoj Thakur Manoj Thakur Manoj Thakur
U3BlYWtlcihFdmVudF8yNDY2MDE1LEV2ZW50UGVvcGxlXzM4ODk1OTY2LFVzZXJfMTMzNDA4MzUp https://static.swapcard.com/public/images/1c1c6a7a79b242dd9a459ba6736c1db0.jpeg Nat Frampton Nat Frampton Nat Frampton
U3BlYWtlcihFdmVudF8yNDY2MDE1LEV2ZW50UGVvcGxlXzM4NTk0NzkwLFVzZXJfMTM5OTQxNTAp https://static.swapcard.com/public/images/8a4056b00feb4048ab3f682ebc721145.jpeg Ellen Ellsworth Ellen Ellsworth Ellen
U3BlYWtlcihFdmVudF8yNDY2MDE1LEV2ZW50UGVvcGxlXzM5MDM0MDgyLFVzZXJfMjQyNTY2NjYp https://static.swapcard.com/public/images/a5c9088fd51948cab8819656d6874191.jpeg Eric Swezey Eric Swezey Eric Swezey
U3BlYWtlcihFdmVudF8yNDY2MDE1LEV2ZW50UGVvcGxlXzM5MDM0MDgzLFVzZXJfMjQyNTY2NjUp https://static.swapcard.com/public/images/ed78d49e11024ecfa9b687e6c6f065b4.jpeg Tom Sieger Tom Sieger Tom Sieger
U3BlYWtlcihFdmVudF8yNDY2MDE1LEV2ZW50UGVvcGxlXzM4ODk1OTY4LFVzZXJfMjQxNzA5MDkp https://static.swapcard.com/public/images/b385bb50dd7c47b48010a2a29b0febdf.jpeg Rob Sims Rob Sims Rob Sims V.P.,
U3BlYWtlcihFdmVudF8yNDY2MDE1LEV2ZW50UGVvcGxlXzM4ODk1OTY3LFVzZXJfMTQxOTAwOTQp https://static.swapcard.com/public/images/75a31ef16d4244c9bfcae40173beaaeb.jpeg William Harvey William Harvey William
UGxhbm5pbmdfMjU5NTA1OA== Drawing the Line on Drawings: Implications of Machine-Readable Data for Manufacturing Suppliers Drawing the Line on Drawings: Implications of Machine-Readable Data for
UGxhbm5pbmdfMjY1NTA0Mw== Protecting Your Machine Tools: Practical Cybersecurity for Industry 4.0 Manufacturing Protecting Your Machine Tools: Practical Cybersecurity for Industry 4.0