Software advice on fitting an orifice within a cylinder

AI Thread Summary
The discussion centers on finding suitable software to fit an orifice within a cylinder, specifically using an STP file format that is not supported by the current platform. Participants suggest changing the file extension to "txt" for uploading and recommend informing others to revert it back to "stp" for use in 3D design software. Additionally, sharing screenshots in JPG or PDF formats is advised to provide visual context for the design. Various online resources and viewers for STP files are mentioned, including links to file viewers and conversion tools that could assist in the process.
JD_PM
Messages
1,125
Reaction score
156
TL;DR Summary
I'd like to get some advice on what software is best to fit an orifice within a cylinder.
I have a stp file (PF does not support it so I cannot upload it here. If there is a way I can share it please let me know) of an orifice and I want to create a new file where the orifice is fit inside a cylinder.

What software do you recommend me to use?

Thank you! :)
 
Technology news on Phys.org
JD_PM said:
Summary:: I'd like to get some advice on what software is best to fit an orifice within a cylinder.

I have a stp file (PF does not support it so I cannot upload it here. If there is a way I can share it please let me know)
You can change the file extension to "txt" and upload it. Then tell people that it's an "stp" file, so they need to change the file extension before loading it into their 3-D mechanical design package.

It also helps if you save a few screenshots as JPG or PDF files and upload those too, so that others have an idea what your design looks like in your design package.

https://fileinfo.com/extension/stp
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
Dear Peeps I have posted a few questions about programing on this sectio of the PF forum. I want to ask you veterans how you folks learn program in assembly and about computer architecture for the x86 family. In addition to finish learning C, I am also reading the book From bits to Gates to C and Beyond. In the book, it uses the mini LC3 assembly language. I also have books on assembly programming and computer architecture. The few famous ones i have are Computer Organization and...
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...
Back
Top