Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 500 000 títulos
  • Títulos exclusivos + Storytel Originals
  • 14 días de prueba gratis, luego $24,900 COP/al mes
  • Cancela cuando quieras
CO -Device Banner Block 894x1036
Cover for 3D Printing

3D Printing

18 calificaciones

3.7

Duración
5 h 3 m
Idioma
Inglés
Formato
Categoría

No ficción

The use of 3D printing—digitally controlled additive manufacturing—is growing rapidly. Consumer models of 3D printers allow people to fabricate small plastic objects, from cabinet knobs to wedding cake toppers. Industrial uses are becoming widespread, as businesses use the technology to fabricate prototypes, spare parts, custom-fitted prosthetics, and other plastic or metal items, often at lower cost and with greater efficiency than standard manufacturing. In this volume in the MIT Press Essential Knowledge series, John Jordan offers an accessible introduction to 3D printing.

Jordan outlines the stages of 3D printing, from idea to software model to a printable file that slices the planned object into printable layers to the finished object itself. He describes additive technologies, consumer 3D printing in homes and schools, mass customization, and industrial uses. He considers the possible unintended consequences of 3D printing on jobs, as companies scramble to find employees with an uncommon skill set; on business models and supply chains, as manufacturing is decentralized; and on patent law, as machines can be programmed to copy protected property. Finally, Jordan looks at new and emerging uses, including bioprinting, building construction, and micromachines.

© 2019 Ascent Audio (Audiolibro): 9781469073026

Fecha de lanzamiento

Audiolibro: 26 de marzo de 2019

Etiquetas

Otros también disfrutaron ...

  1. Haptics
    Haptics Lynette Jones
  2. The Great Persuasion: Reinventing Free Markets Since the Depression
    The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
  3. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  4. Fake Photos
    Fake Photos Hany Farid
  5. The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production
    The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production Vinnie Mirchandani
  6. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  7. Waves
    Waves Fredric Raichlen
  8. AI Ethics
    AI Ethics Mark Coeckelbergh
  9. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
    Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
  10. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
    The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
  11. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  12. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  13. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  14. Billionaires in World Politics
    Billionaires in World Politics Peter Hagel
  15. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  16. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
    Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
  17. Completing Capitalism: Heal Business to Heal the World
    Completing Capitalism: Heal Business to Heal the World Bruno Roche
  18. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
    Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
  19. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  20. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  21. The Vanishing American Corporation: Navigating the Hazards of a New Economy
    The Vanishing American Corporation: Navigating the Hazards of a New Economy Gerald F. Davis
  22. Chinese Rules: Mao's Dog, Deng's Cat, and Five Timeless Lessons from the Front Lines in China
    Chinese Rules: Mao's Dog, Deng's Cat, and Five Timeless Lessons from the Front Lines in China Tim Clissold
  23. The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence
    The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence John Rauscher
  24. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  25. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  26. Catching Lightning in a Bottle: How Merrill Lynch Revolutionized the Financial World
    Catching Lightning in a Bottle: How Merrill Lynch Revolutionized the Financial World Winthrop H. Smith
  27. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  28. Chain Blame: How Wall Street Caused the Mortgage and Credit Crisis
    Chain Blame: How Wall Street Caused the Mortgage and Credit Crisis Padilla Muolo
  29. Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval
    Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval Jon Hilsenrath
  30. Anatomy of a Ponzi: Scams Past and Present
    Anatomy of a Ponzi: Scams Past and Present Colleen Cross
  31. Understandable Economics: Because Understanding Our Economy Is Easier Than You Think and More Important Than You Know
    Understandable Economics: Because Understanding Our Economy Is Easier Than You Think and More Important Than You Know Howard Yaruss
  32. Winning at the Acquisition Game : Tools, Templates and Best Practices Across the M&A Process: Tools, Templates, and Best Practices Across the M&A Process
    Winning at the Acquisition Game : Tools, Templates and Best Practices Across the M&A Process: Tools, Templates, and Best Practices Across the M&A Process Timothy Galpin
  33. Deep Learning: Guide to Machine Learning and Artificial Intelligence
    Deep Learning: Guide to Machine Learning and Artificial Intelligence David Feldspar
  34. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  35. The Road to Reinvention: How to Drive Disruption and Accelerate Transformation
    The Road to Reinvention: How to Drive Disruption and Accelerate Transformation Josh Linkner
  36. The New Roaring Twenties: Prosper in Volatile Times
    The New Roaring Twenties: Prosper in Volatile Times Paul Zane Pilzer
  37. All You Can Pay: How Companies Use Our Data to Empty Our Wallets
    All You Can Pay: How Companies Use Our Data to Empty Our Wallets Anna Bernasek
  38. The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy
    The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy William E. Forbath
  39. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  40. The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace
    The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace Eric Rauchway
  41. Trading at the Speed of Light: How Ultrafast Algorithms Are Transforming Financial Markets
    Trading at the Speed of Light: How Ultrafast Algorithms Are Transforming Financial Markets Donald MacKenzie
  42. The Future of China
    The Future of China Introbooks Team
  43. Business Ethics for Better Behavior
    Business Ethics for Better Behavior Jason Brennan
  44. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  45. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
    Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
  46. Corporate Canaries: Avoid Business Disasters with a Coal Miner's Secrets
    Corporate Canaries: Avoid Business Disasters with a Coal Miner's Secrets Gary Sutton
  47. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
    RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
  48. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
    The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
  49. Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines
    Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines Sean V. Bradley
  50. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
    Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  51. Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants
    Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants Maurice E. Stucke
  52. Probability Theory
    Probability Theory Introbooks Team
  53. Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy
    Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy Elizabeth Popp Berman
  54. The Tyranny of Dead Ideas: Revolutionary Thinking for a New Age of Prosperity
    The Tyranny of Dead Ideas: Revolutionary Thinking for a New Age of Prosperity Matt Miller
  55. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  56. Mastering Research Papers: A Guide for PhD Students
    Mastering Research Papers: A Guide for PhD Students Arvind Chopra
  57. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  58. Long Hard Road: The Lithium-Ion Battery and the Electric Car
    Long Hard Road: The Lithium-Ion Battery and the Electric Car Charles J. Murray
  59. Bailout Nation: How Greed and Easy Money Corrupted Wall Street and Shook the World Economy
    Bailout Nation: How Greed and Easy Money Corrupted Wall Street and Shook the World Economy Barry Ritholtz
  60. Exchange-Traded Funds For Dummies
    Exchange-Traded Funds For Dummies Russell Wild
  61. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  62. Experience, Inc.: Why Companies That Uncover Purpose, Create Connection, and Celebrate Their People Will Triumph
    Experience, Inc.: Why Companies That Uncover Purpose, Create Connection, and Celebrate Their People Will Triumph Jill Popelka
  63. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
    Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
  64. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  65. Virtual Reality
    Virtual Reality Samuel Greengard
  66. Digital Resilience: Is Your Company Ready for the Next Cyber Threat?
    Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
  67. The $10 Trillion Prize: Captivating the Newly Affluent in China and India
    The $10 Trillion Prize: Captivating the Newly Affluent in China and India Michael J. Silverstein
  68. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  69. Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
    Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves Adam Levin
  70. Artificial Intelligence: Data Analytics and Robot Learning in Practice and Theory
    Artificial Intelligence: Data Analytics and Robot Learning in Practice and Theory John Cobar
  71. Deep Learning
    Deep Learning John D. Kelleher
  72. The Messenger: Moderna, the Vaccine, and the Business Gamble That Changed the World
    The Messenger: Moderna, the Vaccine, and the Business Gamble That Changed the World Peter Loftus
  73. Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever
    Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever Chip Walter
  74. Disrupting Sacred Cows
    Disrupting Sacred Cows Garrett Gunderson
  75. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  76. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
    The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
  77. The Deal Maker: How William C. Durant Made General Motors
    The Deal Maker: How William C. Durant Made General Motors Axel Madsen
  78. How Big-Tech Barons Smash Innovation—and How to Strike Back
    How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
  79. Let the Cash Flow: A practical guide to getting paid on time by your customers
    Let the Cash Flow: A practical guide to getting paid on time by your customers Mark Laudi
  80. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
    CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  81. The Knowledge Gene
    The Knowledge Gene Lynne Kelly