Feeds

How hard is 3D printing?

Modelling technology takes shape

Gartner critical capabilities for enterprise endpoint backup

If you want to make your own gun or harboured a desire to make a boat perhaps the device you need is a 3D Printer. In principle it sounds easy: just download a 3D model from the net, throw it at the printer, and whatever you desire comes out the other end.

MakerBot The Replicator

MakerBot's The Replicator

The truth is, it’s not quite that straightforward. We used a Makerbot Replicator to build a physical manifestation of the El Reg vulture. The first challenge was to find an existing model of a vulture, online. All the decent-looking ones and quite a lot of the rubbish ones were expensive.

The Pirate Bay has a section called Physibles but there isn’t much there other than bits of guns and a model of Mark Zuckerberg’s head. Even the much richer model stream of Thingiverse only yielded an eagle.

El Reg vulture in Sketchup

El Reg vulture in Sketchup

This meant that the only viable option was to build something from modelled on The Register logo. I imported The Register masthead bitmap into SketchUp – the free 3D modelling application Google recently sold to Trimble – and traced around the outline of the vulture head with the line and arc tools. This gave me a modelled, albeit, flat head.

Next, using the push tool I lofted it into a 3D shape, choosing a round eye rather than an accurate Reg Vulture eye because of something I had planned for later where a complicated intrusive shape wouldn’t have worked. So with a simple 3D shape modelled it was time to meet the Maker. The Replicator uses the STL file format (alternatively standing for STereoLithography or Standard Tessellation Language depending on who you ask). Fortunately, there is a plug-in for Sketchup which generates .STL files.

Greplicator software showing model

Greplicator software showing model

The file can then be read into the Makerbot software called ReplicatorG which produces the GCode script the model is built from. ReplicatorG helps make the model suitable for printing by positioning the shape on the platform and scaling it to fit, all the way up to the maximum size the Replicator can handle.

Boost IT visibility and business value

Next page: Crash and burn?

More from The Register

next story
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
FEAST YOUR EYES: Samsung's Galaxy Alpha has an 'entirely new appearance'
Wow, it looks like nothing else on the market, for sure
YES YES YES! Apple patents mousy, pressure-sensing iVibrator
Fanbois prepare to experience the great Cupertin-O
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
Apple analyst: fruity firm set to shift 75 million iPhones
We'll have some of whatever he's having please
Things are looking up in Flappy Bird sequel
'Swing Copters' offers the same gameplay but in a different direction
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.