Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3D Scanners Give Scientist a Glimpse of the Real Jurassic World

b2ap3_thumbnail_fossils_scanning_400.jpgWho remembers seeing Jurassic Park in theaters in 1993? By now, the dinosaur flick is ancient history, but with Jurassic World hitting theaters today, you might have huge lizards on the brain. What does this have to do with technology? Well, researchers in Kenya are using 3D scanning and printing to preserve fossils, so the real ones can be safely removed from hazardous weather conditions in the Turkana Basin.

According to CNet, 3D scanners and printers have been used in many different industries for several purposes. They can be used for construction, making prosthetic limbs, and even recreating crime scenes for forensic specialists. However, one of the more innovative features is using 3D printing technology to create 3D models of fossils. These replicas can be subject to study while the real deals are kept safe and preserved in a museum, where they belong. The scanners in question were created by Artec, the company responsible for the Shapify 3D-printed selfies.

As you might expect, the climate of Kenya, where the fossils were located, isn’t exactly hospitable to relics that are millions of years old. The Turkana Basin is particularly well known for its harsh climate. With sunlight that’s powerful enough to give most electronics a run for their money, the laptops that would normally receive the 3D scans from these handheld scanners were rendered useless. To make matters worse, there wasn’t a nearby power source, limiting the amount of time the researchers could spend with the fossils in any given sitting. With the help of two 3D specialists, the team was able to make the batteries last for a whole two days.

Over the course of two weeks, the excavation team was able to uncover and replicate a crocodile skull, a full crocodile skeleton, a huge tortoise, and an extinct species of elephant. As you might expect, the harsh conditions heavily damaged the fossils, so it was up to the team to get them to safety as quickly as possible. By replicating the fossils with 3D technology, the scientists were able to study the fossils more in-depth without risking their integrity due to the undesirable environmental conditions.

Just like anyone who wants to change the face of the industry, these brave scientists decided to do something differently in order to find a better way to accomplish their goals. People like these innovators are always working toward optimizing the way in which professionals perform their daily functions. This is why Total Tech Care provides quality managed IT services. We want to help businesses like yourself better accomplish your goals through the wondrous power of technology.

If your business is ready to let go of your fossil-like technology, give us a call at 866-348-2602. We can help you dust off your business practices so you can get back in the game.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Business Management Users Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Office Server Data Recovery Save Money Cloud Computing Windows 10 Passwords Gadgets Social Media Saving Money Holiday Chrome Virtualization Tech Term Automation Microsoft Office Managed Service Managed IT Services Artificial Intelligence Cybercrime Operating System Computers Facebook BYOD Wi-Fi Mobile Device Management Health Networking IT Support Hacking Internet of Things Information Technology Alert Covid-19 Managed Service Provider Spam Information Office 365 Telephone Systems Remote Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Router BDR Data Breach Application Password Human Resources Money Encryption Remote Monitoring Big Data Applications App Law Enforcement History Mobile Computing VPN Managed IT Apps Remote Computing Blockchain Mobile Office Paperless Office How To Government Data Storage Office Tips Patch Management Training Private Cloud IT solutions Windows 7 Word Entertainment Gmail Website Budget Settings Bring Your Own Device Servers Data Management Work/Life Balance Two-factor Authentication Data Security Mouse HaaS Google Drive Flexibility Avoiding Downtime Infrastructure Marketing Voice over Internet Protocol Wireless Vulnerability WiFi Scam Lithium-ion battery Save Time Vendor USB Data Protection Managed Services Firewall Display Vendor Management Cleaning Virtual Reality Apple Employee/Employer Relationship End of Support Social RMM Education Physical Security Safety User Error Staff Software as a Service Telephone System Sports Meetings HIPAA Redundancy Machine Learning Connectivity Remote Work Keyboard Risk Management Hacker Conferencing The Internet of Things Solid State Drive Printer Wireless Technology Fraud SharePoint Audit Worker Bluetooth How to Downtime Remote Worker IT Management Managed Services Provider Customer Service Data storage Cryptocurrency Botnet IT Plan Database Automobile Environment Fax Server IT Consultant Remote Workers Computing Infrastructure Unsupported Software Comparison Going Green Processor CES SaaS Charger Humor Compliance Hard Drive Content Management OneNote Computer Care Battery Business Technology Shadow IT Access Control Network Congestion Current Events Legal Telephony eWaste Samsung Virtual Assistant Computing Internet Exlporer Authentication Value PDF Spam Blocking Electronic Medical Records Wearable Technology Digital Signage Update Retail Hard Drives Virus Proactive IT Instant Messaging Robot Hiring/Firing Excel Unified Threat Management Best Practice Google Docs Biometrics Computer Accessories YouTube Identity Theft Virtual Desktop Black Market Procurement Net Neutrality Workplace Strategy DDoS Help Desk Augmented Reality Printing Business Intelligence Document Management Search Engine Video Conferencing Twitter ROI Business Mangement Distributed Denial of Service Shortcuts Customer Relationship Management Sales NIST Bitcoin Personal Smart Tech Cryptomining Trending Public Computer Analyitcs Point of Sale Files Programming Transportation Printer Server Supply Chain Management Chromecast Addiction Regulations Amazon Recycling Computer Fan Rootkit Monitoring Batteries Colocation Wiring Digitize Uninterrupted Power Supply Practices Windows 8.1 Benefits Cache Windows Server 2008 R2 Amazon Web Services Antivirus Workers Criminal FENG Windows 8 Customer relationships Monitor Safe Mode GDPR IT Assessment Hosted Computing Manufacturing IT service IBM Email Best Practices Smart Technology Wireless Internet Flash Online Shopping Streaming Media Security Cameras Tablet Computer Tips Reputation File Sharing Managed IT Service Camera OneDrive Tech Support Inventory Software Tips Biometric Security Specifications Domains Supercomputer Content Virtual CIO Techology Peripheral Laptop Wire Sync Evernote Emails IaaS Travel Maintenance Digital Security Cameras Customers Using Data Printers Copiers 5G Millennials Audiobook Bloatware Consultant Two Factor Authentication Analytics Quick Tip Touchpad Smart Office Wireless Charging Netflix Root Cause Analysis Smartwatch Tablets Ergonomics Best Available Advertising Virtual Private Network Development HBO OLED Workforce Knowledge Politics Entrepreneur Music WIndows 7 PCI DSS Skype Virtual Machine Cables Fiber Optics Notifications Data loss Employee Shortcut 2FA Project Management Messaging Nanotechnology Outlook Cabling Telecommuting Leadership Cost Management Troubleshooting Social Networking Policy Start Menu Hypervisor Cortana Trend Micro Digital Signature Screen Mirroring Loyalty Dark mode Relocation Books Warranty SMS Frequently Asked Questions Default App Running Cable Windows 10s User Video Games PowerPoint Procedure HVAC Mobile Windows Media Player Saving Time Google Apps Shopping Analysis Cast Google Search Worker Commute Memory dark theme Emergency Administrator AI Devices Tip of the week IT Infrastructure webinar Experience Public Cloud Bing Employer Employee Relationship Managing Stress Scalability FinTech Enterprise Content Management Professional Services MSP Social Network Accountants Assessment Business Owner Microchip Cameras NarrowBand Thought Leadership Windows Server 2008 Investment Credit Cards Password Manager Search Science Employees Password Management Tools Employee/Employer Relationships ISP Multi-Factor Security Television Windows 365 iPhone

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code