3f4a18704ff5b833a699c3e529a4ab02.jpg

3D Printing Education Takes Off in China with Weistek’s MiniToy 3D Printer 3D Printer Hardware

In early April 3Dprint.com reported that China intends to install at least one 3D printer in each of its 400.000 elementary schools. One company that is well positioned to take advantage of this opportunity is 3D Printing Business Directory’s premium partner Weistek, which is about to launch its STEM-ready kid-friendly MiniToy 3D printer on Kickstarter, with prices starting as low as $249.

ae60a96a544c7108387cf8d140f86e45.jpg

Mixed Reality Devices Are On the Way to the Mass Market, How Will You Mix Your Reality? AM Software

While also used in research and university contexts, “mixed reality” is Microsoft’s term for their new holographic computing line associated with the Hololens. It’s also the term used by the increasingly less-stealthy startup Magic Leap. HP calls it “blended reality”; Autdoesk refers to it as “reality computing”; and 3D Systems uses the phrase “digital thread”. But all of these terms are meant to represent the emerging 3D ecosystem.

6a871f4e5d5251bcf4c87d107bc62841.jpg

Lenovo’s New 3D Printer L20 Proves the Market is Ready for Mass Adoption 3D Printer Hardware

At a conference held in Beijing Lenovo announced it is entering the market its first line of compact 3D printers, marking the first time a major technology manufacturer has entered the arena. Beyond Lenovo’s new 3D printer, the Chinese consumer electronics giant is already active in the virtual 3D market with the Lenovo Google Tango smartphone, capable of capturing environmental 3D data.

aebba817cf23168bc2ac6b7646a2cd10.jpg

Stolen 3D Models on Sale, What Can Designers Do to Protect Their IP’s? AM Software

A few days ago I spoke with Simone Fontana, who is part of a new generation of 3D designers, born with 3D printing in mind. He pointed out an issue that has been happening for some time but is now reaching worrying proportions: that of stolen 3D designs sold for a profit. How can designers protect themselves and what are the implication of a phenomenon which we could define is basically a form of “person to person IP theft”?