Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3D Scanners Give Scientist a Glimpse of the Real Jurassic World

b2ap3_thumbnail_fossils_scanning_400.jpgWho remembers seeing Jurassic Park in theaters in 1993? By now, the dinosaur flick is ancient history, but with Jurassic World hitting theaters today, you might have huge lizards on the brain. What does this have to do with technology? Well, researchers in Kenya are using 3D scanning and printing to preserve fossils, so the real ones can be safely removed from hazardous weather conditions in the Turkana Basin.

According to CNet, 3D scanners and printers have been used in many different industries for several purposes. They can be used for construction, making prosthetic limbs, and even recreating crime scenes for forensic specialists. However, one of the more innovative features is using 3D printing technology to create 3D models of fossils. These replicas can be subject to study while the real deals are kept safe and preserved in a museum, where they belong. The scanners in question were created by Artec, the company responsible for the Shapify 3D-printed selfies.

As you might expect, the climate of Kenya, where the fossils were located, isn’t exactly hospitable to relics that are millions of years old. The Turkana Basin is particularly well known for its harsh climate. With sunlight that’s powerful enough to give most electronics a run for their money, the laptops that would normally receive the 3D scans from these handheld scanners were rendered useless. To make matters worse, there wasn’t a nearby power source, limiting the amount of time the researchers could spend with the fossils in any given sitting. With the help of two 3D specialists, the team was able to make the batteries last for a whole two days.

Over the course of two weeks, the excavation team was able to uncover and replicate a crocodile skull, a full crocodile skeleton, a huge tortoise, and an extinct species of elephant. As you might expect, the harsh conditions heavily damaged the fossils, so it was up to the team to get them to safety as quickly as possible. By replicating the fossils with 3D technology, the scientists were able to study the fossils more in-depth without risking their integrity due to the undesirable environmental conditions.

Just like anyone who wants to change the face of the industry, these brave scientists decided to do something differently in order to find a better way to accomplish their goals. People like these innovators are always working toward optimizing the way in which professionals perform their daily functions. This is why Total Tech Care provides quality managed IT services. We want to help businesses like yourself better accomplish your goals through the wondrous power of technology.

If your business is ready to let go of your fossil-like technology, give us a call at 866-348-2602. We can help you dust off your business practices so you can get back in the game.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Cybersecurity Quick Tips Business Management Users Windows Upgrade Managed IT Services Phishing Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Data Recovery Cloud Computing Windows 10 Passwords Saving Money Holiday Tech Term Gadgets Chrome Virtualization Social Media Microsoft Office Automation Managed Service Managed IT Services Artificial Intelligence Operating System Facebook Computers Cybercrime Internet of Things Mobile Device Management Networking IT Support Wi-Fi Hacking Health BYOD Alert Spam Managed Service Provider Office 365 Remote Telephone Systems Information Technology Covid-19 Information Bandwidth Social Engineering Mobility Router Recovery Employer-Employee Relationship BDR Remote Monitoring Data Breach Password Big Data Money App History Encryption Applications Mobile Computing Human Resources Law Enforcement Application Remote Computing Data Storage Private Cloud Patch Management Mobile Office Managed IT Apps Office Tips Training Blockchain Paperless Office How To VPN Government Vulnerability Mouse HaaS Windows 7 Word Bring Your Own Device Data Management Work/Life Balance Servers Wireless Data Security Flexibility Google Drive Marketing Gmail WiFi Settings IT solutions Entertainment Avoiding Downtime Website Budget Infrastructure Voice over Internet Protocol Two-factor Authentication Apple Conferencing Social Scam Save Time User Error Data Protection Meetings Cleaning Vendor Management Risk Management Hacker End of Support Vendor Education Physical Security The Internet of Things Managed Services Lithium-ion battery Safety Display Software as a Service Telephone System Staff Sports HIPAA Machine Learning Redundancy Connectivity Remote Work Keyboard Employee/Employer Relationship Firewall RMM USB Virtual Reality Document Management IT Consultant Augmented Reality Solid State Drive Wireless Technology Fraud Network Congestion eWaste How to Business Intelligence Downtime Humor Digital Signage Remote Worker Audit Worker IT Management Cryptocurrency Data storage Automobile Botnet Wearable Technology IT Plan Procurement Hard Drives Computing Infrastructure Net Neutrality Comparison Retail Workplace Strategy Instant Messaging Going Green Help Desk Robot Unsupported Software Excel CES Printing Biometrics Charger Virtual Desktop Battery Business Technology Content Management Access Control Shadow IT Compliance Legal OneNote Managed Services Provider Virus Computer Care DDoS Virtual Assistant Current Events Authentication Database Internet Exlporer Unified Threat Management Telephony SharePoint Computer Accessories Samsung Remote Workers PDF Processor Value Update Customer Service Environment Spam Blocking Proactive IT Electronic Medical Records Hard Drive Printer Best Practice Google Docs Fax Server Bluetooth YouTube Hiring/Firing Identity Theft Black Market SaaS Computing PCI DSS Search Password Management Virtual Machine Assessment Password Manager Employee Multi-Factor Security IaaS Maintenance 2FA Windows Server 2008 Fiber Optics iPhone Tools Search Engine Bloatware Messaging Twitter Cabling Policy NIST Hypervisor Television Business Mangement Files Smart Tech Trending Dark mode Tablets Trend Micro Entrepreneur SMS Addiction Default App Chromecast Amazon Procedure Saving Time Public Computer Recycling Shopping Colocation Practices Google Search Uninterrupted Power Supply Transportation Shortcut dark theme Regulations Wiring Cost Management AI Consultant Computer Fan Cache IT Infrastructure Rootkit Amazon Web Services Bing Social Networking FinTech Safe Mode Monitor Analytics Criminal Social Network Workers Hosted Computing Benefits GDPR Best Available FENG Wireless Internet Investment Online Shopping Streaming Media Running Cable Employees WIndows 7 File Sharing Employee/Employer Relationships Reputation IBM Memory Inventory ISP Tech Support Smart Technology Specifications Windows 365 Content Flash Camera Video Conferencing Techology Wire ROI Laptop Evernote Shortcuts Travel Sales Software Tips Bitcoin Customers Supercomputer Personal Emails Cryptomining Millennials Point of Sale Audiobook Sync Printers Supply Chain Management Smart Office Touchpad Wireless Charging Windows Media Player Monitoring User Science Batteries PowerPoint Digitize Advertising Netflix Two Factor Authentication Workforce Windows 8.1 Politics Virtual Private Network Root Cause Analysis Windows Server 2008 R2 Cables Notifications Music Distributed Denial of Service Customer Relationship Management Customer relationships Managing Stress HBO Knowledge Skype Project Management Analyitcs IT Assessment Nanotechnology Manufacturing Telecommuting Email Best Practices Programming Data loss Cameras Cortana Leadership Digital Signature Security Cameras Troubleshooting Computer Tips Outlook Managed IT Service Relocation Start Menu Warranty OneDrive Biometric Security Virtual CIO Antivirus Peripheral Video Games Screen Mirroring HVAC Loyalty Google Apps Analysis Books Digital Security Cameras Worker Commute Frequently Asked Questions Windows 8 Using Data Mobile Administrator Copiers Windows 10s Devices 5G IT service Experience Quick Tip Scalability Cast Enterprise Content Management Printer Server webinar Accountants Smartwatch Emergency Ergonomics Business Owner Tip of the week MSP Tablet Professional Services Microchip Development Public Cloud Thought Leadership OLED NarrowBand Employer Employee Relationship Credit Cards Domains

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code