Feeds

WTF is... 3D printing

Roll your own

3 Big data security analytics techniques

Home made

This process is, essentially, the reverse of a traditional milling machine, which cuts away material from a solid block to create an object. One of the advantages of additive manufacturing is that there’s much less waste.

RepRap

HP's 3D printing rig costs around 11 grand

One of the commonly used materials for this sort of work is a polymer, like ABS, extruded from print heads that look a little like a glue gun. You’ll find countless examples of objects like clothes hooks, cups, and fairly simply objects. But that’s by no means all that can be created, or the only way of doing it.

For objects like those titanium aircraft parts, powdered metal particles are fused together with a laser, a process known as sintering. In stereolithography, a laser focuses on the surface of a vat of polymer, causing localised hardening – you can see the process in action in this video – and very complex designs can be created.

Clever software will even automatically add supporting structures, so that you can create designs with internal spaces or overhanging sections, either simply snapping them off or – in the case of systems like the Object Polyjet - by flushing them out with water or dissolving them.

That, in fact, is one of the key things to remember about the current generation of 3D printing systems: many of them don’t produce a fully finished product, and require extra steps like removing supports, or curing polymers using ultraviolet light, before the object is finally ready.

3D printing isn’t the sole preserve of the professional manufacturer. There are several projects that aim to make it easy for just about anyone to print objects at home. One of the most well know is RepRap - read more about this one on my blog. It’s not the only one: there are several similar projects, such as Makerbot and Fab@Home.

RepRap

The RepRap rig, built by Bits From Bytes

Typically open source, you can put together a printer based on one of these systems for under a few hundred pounds, or buy one ready built for under £1000. There are libraries of basic designs that you can download and create, or use as starting points for your own objects, from sites like Thingiverse.

SANS - Survey on application security programs

Next page: Fast food

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.