Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3D Scanners Give Scientist a Glimpse of the Real Jurassic World

b2ap3_thumbnail_fossils_scanning_400.jpgWho remembers seeing Jurassic Park in theaters in 1993? By now, the dinosaur flick is ancient history, but with Jurassic World hitting theaters today, you might have huge lizards on the brain. What does this have to do with technology? Well, researchers in Kenya are using 3D scanning and printing to preserve fossils, so the real ones can be safely removed from hazardous weather conditions in the Turkana Basin.

According to CNet, 3D scanners and printers have been used in many different industries for several purposes. They can be used for construction, making prosthetic limbs, and even recreating crime scenes for forensic specialists. However, one of the more innovative features is using 3D printing technology to create 3D models of fossils. These replicas can be subject to study while the real deals are kept safe and preserved in a museum, where they belong. The scanners in question were created by Artec, the company responsible for the Shapify 3D-printed selfies.

As you might expect, the climate of Kenya, where the fossils were located, isn’t exactly hospitable to relics that are millions of years old. The Turkana Basin is particularly well known for its harsh climate. With sunlight that’s powerful enough to give most electronics a run for their money, the laptops that would normally receive the 3D scans from these handheld scanners were rendered useless. To make matters worse, there wasn’t a nearby power source, limiting the amount of time the researchers could spend with the fossils in any given sitting. With the help of two 3D specialists, the team was able to make the batteries last for a whole two days.

Over the course of two weeks, the excavation team was able to uncover and replicate a crocodile skull, a full crocodile skeleton, a huge tortoise, and an extinct species of elephant. As you might expect, the harsh conditions heavily damaged the fossils, so it was up to the team to get them to safety as quickly as possible. By replicating the fossils with 3D technology, the scientists were able to study the fossils more in-depth without risking their integrity due to the undesirable environmental conditions.

Just like anyone who wants to change the face of the industry, these brave scientists decided to do something differently in order to find a better way to accomplish their goals. People like these innovators are always working toward optimizing the way in which professionals perform their daily functions. This is why Total Tech Care provides quality managed IT services. We want to help businesses like yourself better accomplish your goals through the wondrous power of technology.

If your business is ready to let go of your fossil-like technology, give us a call at 866-348-2602. We can help you dust off your business practices so you can get back in the game.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Upgrade Phishing Managed IT Services Windows Data Backup Outsourced IT Ransomware Windows 10 Office Cloud Computing Server Save Money Data Recovery Windows 10 Passwords Virtualization Tech Term Saving Money Holiday Social Media Chrome Gadgets Managed Service Automation Managed IT Services Microsoft Office Artificial Intelligence Computers Facebook Operating System Cybercrime Wi-Fi BYOD Mobile Device Management Networking IT Support Hacking Internet of Things Health Spam Office 365 Telephone Systems Remote Information Technology Managed Service Provider Alert Covid-19 Information Bandwidth Router BDR Social Engineering Mobility Recovery Employer-Employee Relationship Mobile Computing Password Remote Monitoring Money Application Encryption Applications App History Big Data Law Enforcement Human Resources Data Breach Mobile Office Apps How To Office Tips Training Government VPN Data Storage Patch Management Blockchain Private Cloud Paperless Office Remote Computing Managed IT Marketing Servers Bring Your Own Device Mouse Data Management HaaS WiFi Work/Life Balance Infrastructure IT solutions Voice over Internet Protocol Entertainment Website Budget Data Security Google Drive Wireless Avoiding Downtime Gmail Settings Vulnerability Windows 7 Word Two-factor Authentication Flexibility Social Employee/Employer Relationship Vendor Management Cleaning RMM User Error Meetings End of Support USB Education Physical Security Safety Risk Management Hacker Data Protection Sports HIPAA Redundancy Keyboard The Internet of Things Lithium-ion battery Conferencing Vendor Firewall Scam Managed Services Telephone System Staff Software as a Service Display Save Time Machine Learning Virtual Reality Apple Connectivity Remote Work Hard Drive Network Congestion eWaste Google Docs Identity Theft Unsupported Software Computing Infrastructure Going Green Printer Computing Charger Bluetooth Compliance Wearable Technology Augmented Reality Battery OneNote Computer Care Current Events Shadow IT Retail Hard Drives Fraud Instant Messaging Telephony Legal Samsung Remote Worker Robot Excel Digital Signage Internet Exlporer IT Consultant Cryptocurrency Biometrics Value Virtual Desktop PDF Humor Procurement Spam Blocking Electronic Medical Records DDoS Workplace Strategy Comparison Net Neutrality Proactive IT CES Help Desk Hiring/Firing SharePoint Best Practice Printing YouTube Business Technology Content Management Black Market Customer Service Access Control Managed Services Provider Environment Virtual Assistant Fax Server Authentication Document Management Database Business Intelligence Solid State Drive Wireless Technology Virus Remote Workers How to Audit Downtime Worker SaaS IT Management Unified Threat Management Processor Computer Accessories Botnet Update Data storage Automobile IT Plan Google Apps Workers Benefits HVAC Peripheral Bloatware Digital Security Cameras Cameras Analysis Using Data FENG Monitor IBM Administrator Devices Copiers Tablets 5G Entrepreneur Flash Smart Technology Enterprise Content Management Quick Tip MSP Ergonomics Accountants Smartwatch Reputation Streaming Media Supercomputer Tech Support Microchip Shortcut Thought Leadership Development Content Credit Cards OLED Software Tips Cost Management Password Manager Virtual Machine Sync Techology Emails Laptop Password Management PCI DSS 2FA Social Networking Printer Server Fiber Optics Multi-Factor Security Employee Customers Search Engine Twitter Messaging Audiobook Cabling NIST Policy Business Mangement Hypervisor Netflix Touchpad Two Factor Authentication Running Cable Dark mode Smart Tech Trend Micro Trending Root Cause Analysis Amazon Default App HBO Advertising Knowledge Music Addiction SMS Politics Memory Procedure Recycling Saving Time Skype Notifications Wiring dark theme Practices Shopping Google Search Data loss Amazon Web Services IT Infrastructure Outlook Leadership Troubleshooting Cache AI Safe Mode FinTech Criminal Start Menu Bing Loyalty GDPR Hosted Computing Social Network Science Screen Mirroring Relocation Online Shopping Investment Frequently Asked Questions Books Wireless Internet Consultant File Sharing Employees Employee/Employer Relationships Mobile Video Games Windows 10s Distributed Denial of Service Camera Windows 365 Customer Relationship Management Analytics Inventory Worker Commute Specifications ISP Cast Evernote ROI Tip of the week webinar Emergency Wire Video Conferencing Experience Analyitcs Best Available Sales Programming Bitcoin Professional Services Scalability Travel Shortcuts Public Cloud Employer Employee Relationship Assessment WIndows 7 Printers Point of Sale Personal Business Owner Millennials Cryptomining Wireless Charging Windows Server 2008 NarrowBand Smart Office Supply Chain Management Monitoring Batteries Tools Search Antivirus Television Virtual Private Network Windows 8.1 Digitize Windows 8 Workforce iPhone Cables Windows Server 2008 R2 IT service Customer relationships Public Computer User Project Management Email Best Practices PowerPoint Nanotechnology IT Assessment Tablet Windows Media Player Telecommuting Manufacturing Files Cortana Regulations Chromecast Transportation Domains Computer Tips Digital Signature Managed IT Service Security Cameras Computer Fan Rootkit Uninterrupted Power Supply IaaS Managing Stress Warranty Virtual CIO Maintenance OneDrive Biometric Security Colocation

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code