XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from XFER.

These 3 Industries are Being Fundamentally Changed...
Tech Term: Bandwidth


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Data Hackers Small Business Google Hardware Mobile Devices Productivity VoIP Mobile Office Malware Email Gadgets Quick Tips Network Security Efficiency Network Innovation IT Support IT Services Social Media Business Management Business Business Continuity Miscellaneous Smartphones Server Upgrade Communication Virtualization Disaster Recovery User Tips Windows Data Backup Communications Computer Microsoft Office Managed IT Services Users Smartphone Passwords Browser Data Recovery Mobile Device Management Android Holiday WiFi Save Money Marketing Tech Term Ransomware Outsourced IT Alert Internet of Things Cybercrime Mobile Computing BDR Vendor Management Chrome Router Operating System Windows 10 Remote Monitoring Cloud Computing Bring Your Own Device Computers Apple Artificial Intelligence BYOD Automation Information Technology Avoiding Downtime Big Data Remote Computing History Best Practice IT Solutions The Internet of Things Going Green Firewall Managed IT Services Telephone Systems Spam VPN Cybersecurity Current Events Phone System Wireless Technology Application Trending Collaboration IT Consultant Hacking Social Engineering Printer Facebook Employer-Employee Relationship Health Productivity Lithium-ion Battery Excel Windows 10 Bandwidth App Money Office Proactive IT Mobility Budget Office 365 Mouse Maintenance Applications Windows 8 Recovery Content Filtering Phishing Mobile Device IT Support Networking Unified Threat Management Business Managament Two-factor Authentication Business Intelligence How To iPhone Fax Server Training Word Hard Drives Encryption Analytics Data Security Google Drive Website Access Control Apps User Error Managed IT Value Sports Gmail Humor PowerPoint Outlook Information Tutorials Settings Virus Private Cloud Data Protection Redundancy Customer Relationship Management Law Enforcement Blockchain Antivirus Connectivity Saving Time Inbound Marketing Network Congestion Hacker Social Identity Theft Tech Support Downtime File Sharing Memory Administration Save Time Scam Voice over Internet Protocol Conferencing Office Tips Digital Payment Social Networking IT Management Servers Vulnerability Computer Repair Tablet Compliance Search Flexibility Twitter Machine Learning Document Management Wi-Fi Entertainment Administrator Streaming Media Risk Management Software as a Service Analysis Retail Managed Service Data Management Human Resources IT service Help Desk Solid State Drive Data loss Augmented Reality Intranet Telephony Running Cable Comparison Black Market Windows 7 Spam Blocking Google Docs Virtual Assistant Wearable Technology Wireless Physical Security Botnet Cleaning Password Touchscreen Public Cloud Display SaaS USB Best Available Robot Telephone System Credit Cards Bluetooth People OneNote Data storage Video Surveillance Samsung Smart Tech Fraud eWaste CES Internet Exlporer Data Storage Keyboard Online Currency PDF IT Plan Recycling Work/Life Balance Data Breach Piracy HaaS End of Support Point of Sale IBM Safety Government Leadership Content Management YouTube Instant Messaging Education Meetings Workers Infrastructure Environment Statistics Unsupported Software Computer Accessories Paperless Office Webinar DDoS Skype Update Biometrics Programming Remote Work Customers WIndows 7 Wiring Company Culture Alerts Password Manager Uninterrupted Power Supply Virtual Reality Enterprise Content Management Law Firm IT Software Tips Shortcut Hosted Computing Proactive Knowledge Unified Communications Advertising Students Bing FENG Printer Server Text Messaging Online Shopping Distributed Denial of Service Files User Cache Project Management Patch Management LinkedIn Staff Chromecast Worker Commute Managing Stress Domains Devices GDPR 360 Net Neutrality Emails Work Station Business Mangement Bloatware Password Management Screen Mirroring Gaming Console Inventory Remote Monitoring and Maintenance Windows 8.1 Update Start Menu Theft Notifications Science Healthcare Shortcuts Electronic Medical Records Data Warehousing Specifications Regulations Evernote Colocation Wireless Internet Warranty Windows 10s Digital Signature Laptop IoT Business Owner HBO SharePoint Thought Leadership E-Commerce Travel Criminal Shadow IT Entrepreneur NIST Macro Charger Debate Cast Line of Business HIPAA Mobile Cortana Hybrid Cloud Tablets Electronic Health Records eCommerce Co-managed IT Hiring/Firing Millennials Wireless Charging IaaS Computing Infrastructure Hiring/Firing Wire Microchip Multi-Factor Security Strategy Touchpad Windows Media Player Virtual Desktop Frequently Asked Questions Relocation Content Filter Camera Hosted Solution Legal Cost Management Cryptocurrency Computer Care Monitor Authentication MSP Professional Services Google Apps Upgrades Analyitcs Vendor Webcam Workforce Flash Fiber-Optic Smart Office Audit Lifestyle Customer Service Insurance Tip of the week Amazon Consultant Storage Netflix Safe Mode IT Security Reputation Nanotechnology Remote Worker PC Care Tools HVAC Security Cameras Print Server Root Cause Analysis Telecommuting Practices Remote Support Supercomputer 3D Sync Cables Internet exploMicrosoft Search Engine nternet Crowdfunding Computer Fan Scheduling Cameras eBay Windows Server 2008 Amazon Web Services Licensing Addiction Virtual Private Network NarrowBand Accountants Business Technology Music Employee/Employer Relationship Worker Thank You Audiobook Scalability Assessment Rootkit Congratulations Politics Television Transportation How to Smartwatch Troubleshooting Webinar Techology Automobile Public Computer Benefits Regulation IT solutions Employer Employee Relationship CrashOverride Utility Computing Smart Technology Printers Books Loyalty Experience Content Two Factor Authentication Battery Emergency Video Games

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *