Convergence: Printing Circuits and 3D Printing - at Home

Microsoft Research released a video called Printing Interactivity: Customizable 3D Printing. I've embedded this video below so you don't have to go find it.

In this video Microsoft is showing how they are working towards printing electronic circuit boards onto paper using a tool Like Visio. They then use a special tape from 3M to be able to tape components to what you printed. The end result is the ability to create circuits and electronic components. When you combine these printed electronics with objects you create using a 3D printer, lots of new opportunities begin to be available.

In the video, they illustrate a simple example; however, if you have messed with any of the "Maker" boards such as the Arduino or Intel Galileo, then you are already one step ahead of others in knowing the possibilities of what could be done.

Take a look at the video. Do you have any good ideas on things that could be done?  Feel free to share them on the comments below!



Blog Categories

Blog Archives

Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • On-demand Event Event Date: September 10, 2014 Modern mobile applications connect systems-of-engagement (mobile apps) with systems-of-record (traditional IT) to deliver new and innovative business value. But the lifecycle for development of mobile apps is also new and different. Emerging trends in mobile development call for faster delivery of incremental features, coupled with feedback from the users of the app "in the wild." This loop of continuous delivery and continuous feedback is how the best mobile …

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds