Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3D Scanners Give Scientist a Glimpse of the Real Jurassic World

b2ap3_thumbnail_fossils_scanning_400.jpgWho remembers seeing Jurassic Park in theaters in 1993? By now, the dinosaur flick is ancient history, but with Jurassic World hitting theaters today, you might have huge lizards on the brain. What does this have to do with technology? Well, researchers in Kenya are using 3D scanning and printing to preserve fossils, so the real ones can be safely removed from hazardous weather conditions in the Turkana Basin.

According to CNet, 3D scanners and printers have been used in many different industries for several purposes. They can be used for construction, making prosthetic limbs, and even recreating crime scenes for forensic specialists. However, one of the more innovative features is using 3D printing technology to create 3D models of fossils. These replicas can be subject to study while the real deals are kept safe and preserved in a museum, where they belong. The scanners in question were created by Artec, the company responsible for the Shapify 3D-printed selfies.

As you might expect, the climate of Kenya, where the fossils were located, isn’t exactly hospitable to relics that are millions of years old. The Turkana Basin is particularly well known for its harsh climate. With sunlight that’s powerful enough to give most electronics a run for their money, the laptops that would normally receive the 3D scans from these handheld scanners were rendered useless. To make matters worse, there wasn’t a nearby power source, limiting the amount of time the researchers could spend with the fossils in any given sitting. With the help of two 3D specialists, the team was able to make the batteries last for a whole two days.

Over the course of two weeks, the excavation team was able to uncover and replicate a crocodile skull, a full crocodile skeleton, a huge tortoise, and an extinct species of elephant. As you might expect, the harsh conditions heavily damaged the fossils, so it was up to the team to get them to safety as quickly as possible. By replicating the fossils with 3D technology, the scientists were able to study the fossils more in-depth without risking their integrity due to the undesirable environmental conditions.

Just like anyone who wants to change the face of the industry, these brave scientists decided to do something differently in order to find a better way to accomplish their goals. People like these innovators are always working toward optimizing the way in which professionals perform their daily functions. This is why Total Tech Care provides quality managed IT services. We want to help businesses like yourself better accomplish your goals through the wondrous power of technology.

If your business is ready to let go of your fossil-like technology, give us a call at 866-348-2602. We can help you dust off your business practices so you can get back in the game.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Business Continuity Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Phishing Managed IT Services Upgrade Windows Outsourced IT Data Backup Ransomware Windows 10 Cloud Computing Office Server Save Money Data Recovery Passwords Windows 10 Virtualization Saving Money Holiday Tech Term Social Media Chrome Gadgets Managed Service Automation Microsoft Office Managed IT Services Computers Artificial Intelligence Facebook Cybercrime Operating System Wi-Fi BYOD Mobile Device Management Networking IT Support Health Hacking Internet of Things Information Office 365 Telephone Systems Covid-19 Information Technology Managed Service Provider Spam Alert Remote Bandwidth Employer-Employee Relationship Recovery Router Social Engineering BDR Mobility Mobile Computing Password Money App Application History Encryption Applications Data Breach Human Resources Big Data Law Enforcement Remote Monitoring Managed IT Data Storage Apps Patch Management Office Tips Training VPN Government Remote Computing Private Cloud Blockchain How To Mobile Office Paperless Office Marketing WiFi Bring Your Own Device Data Management Work/Life Balance IT solutions Entertainment Website Infrastructure Budget Vulnerability Voice over Internet Protocol Wireless Windows 7 Word Gmail Google Drive Servers Settings Two-factor Authentication Avoiding Downtime Data Security Mouse HaaS Flexibility Meetings Machine Learning Connectivity Remote Work Cleaning Vendor Risk Management Conferencing Hacker USB Managed Services Display End of Support Scam The Internet of Things Education Lithium-ion battery Physical Security Safety Employee/Employer Relationship HIPAA Sports Redundancy RMM Data Protection Vendor Management Keyboard Firewall Virtual Reality Apple Social Save Time User Error Telephone System Staff Software as a Service Data storage Help Desk Automobile Printing Wearable Technology Retail Hard Drives Update Hiring/Firing Instant Messaging Printer Robot Excel Computing Infrastructure Managed Services Provider Bluetooth Google Docs Going Green Biometrics Identity Theft Virtual Desktop Database Battery Remote Workers Business Intelligence Shadow IT DDoS Processor IT Consultant Augmented Reality Audit Legal Worker Fraud SharePoint IT Management Internet Exlporer Hard Drive Remote Worker Botnet Humor IT Plan Cryptocurrency Customer Service PDF Environment Computing Unsupported Software Fax Server Proactive IT Comparison Charger Best Practice CES Compliance YouTube SaaS Black Market OneNote Computer Care Current Events Digital Signage Business Technology Telephony Content Management Network Congestion Access Control Samsung Document Management eWaste Virus Virtual Assistant Solid State Drive Wireless Technology Downtime Procurement Authentication Unified Threat Management How to Value Workplace Strategy Net Neutrality Computer Accessories Spam Blocking Electronic Medical Records Employee/Employer Relationships Project Management Nanotechnology Screen Mirroring Cost Management Telecommuting Loyalty Employees Social Networking Cortana Windows 365 Colocation Books Uninterrupted Power Supply ISP Frequently Asked Questions Cameras Mobile Digital Signature Windows 10s Video Conferencing ROI Sales Monitor Bitcoin Warranty Shortcuts Cast Tip of the week Google Apps webinar Point of Sale Emergency Personal Cryptomining Running Cable HVAC Professional Services Analysis Public Cloud Memory Employer Employee Relationship Supply Chain Management Assessment Monitoring Reputation Batteries Streaming Media Administrator Devices Enterprise Content Management Windows Server 2008 Printer Server Content Windows 8.1 Digitize Tech Support Windows Server 2008 R2 MSP Tools Accountants Techology Laptop Credit Cards Television Customer relationships Customers Microchip Thought Leadership Password Management Password Manager Audiobook Email Best Practices Science IT Assessment Manufacturing Touchpad Multi-Factor Security Public Computer Computer Tips Managed IT Service Search Engine Security Cameras Twitter NIST Regulations Customer Relationship Management Business Mangement Politics Virtual CIO Advertising Transportation OneDrive Biometric Security Distributed Denial of Service Smart Tech Computer Fan Analyitcs Trending Rootkit Peripheral Amazon Digital Security Cameras Using Data Notifications Addiction Programming Recycling Workers Benefits Copiers 5G Wiring Practices FENG Quick Tip Amazon Web Services IBM Ergonomics Relocation Smartwatch Consultant Antivirus Cache Safe Mode Flash Analytics Criminal Windows 8 Smart Technology Development OLED Virtual Machine GDPR IT service Hosted Computing Video Games PCI DSS Online Shopping Worker Commute Supercomputer 2FA Fiber Optics Employee Best Available Wireless Internet Software Tips File Sharing Sync Experience Emails Tablet Messaging Cabling WIndows 7 Hypervisor Camera Domains Inventory Specifications Scalability Policy Evernote Business Owner Dark mode Trend Micro Wire IaaS Maintenance Netflix Travel Two Factor Authentication SMS NarrowBand Default App Saving Time Printers Root Cause Analysis Bloatware Millennials Search Procedure Wireless Charging Knowledge dark theme iPhone Music Shopping Google Search Smart Office HBO Skype PowerPoint Windows Media Player Tablets AI IT Infrastructure User Virtual Private Network Bing Data loss Entrepreneur Workforce FinTech Cables Leadership Files Troubleshooting Social Network Outlook Start Menu Shortcut Chromecast Investment Managing Stress

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code