XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from XFER.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 18 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Hackers Google Mobile Office Hosted Solutions Productivity Data Hardware Mobile Devices VoIP Quick Tips Gadgets Email Malware IT Support Efficiency Network Business Management Social Media Business Continuity Virtualization Smartphones Upgrade Network Security Business IT Services Server Miscellaneous Innovation Windows Disaster Recovery Communication Microsoft Office Users Managed IT Services Mobile Device Management Computer Communications Android Passwords User Tips Smartphone Browser Marketing Holiday WiFi Alert Vendor Management Save Money Data Backup Cybercrime Operating System Mobile Computing Windows 10 Remote Monitoring Ransomware BYOD Information Technology Avoiding Downtime Bring Your Own Device Apple Computers Going Green IT Solutions The Internet of Things Current Events Internet of Things Best Practice VPN History Cloud Computing Data Recovery Telephone Systems Outsourced IT Big Data Chrome Remote Computing Hacking Automation Trending Social Engineering Health Employer-Employee Relationship Phone System Spam Wireless Technology BDR Application Firewall Router IT Consultant Collaboration Bandwidth Tech Term Artificial Intelligence Cybersecurity Office Money Excel Budget Proactive IT App Lithium-ion Battery Printer Facebook Business Managament Managed IT Services Fax Server Maintenance Windows 8 How To Two-factor Authentication iPhone Mobility Content Filtering Recovery Business Intelligence Analytics Outlook Redundancy Data Protection Law Enforcement Tutorials Apps Website Virus Office 365 PowerPoint Unified Threat Management Networking Data Security Gmail Value Customer Relationship Management Managed IT Hard Drives Mouse Phishing Antivirus User Error Private Cloud Humor Data Management Mobile Device Save Time Connectivity Vulnerability Digital Payment Downtime Social Networking Office Tips Memory Word Computer Repair Conferencing Compliance Identity Theft Flexibility Entertainment Tablet Sports Search Twitter Tech Support Retail Google Drive Document Management Productivity Streaming Media Risk Management Inbound Marketing Network Congestion Windows 10 Saving Time Administration Robot OneNote USB Wearable Technology DDoS Update Video Surveillance Solid State Drive Data Storage Encryption Best Available Black Market Comparison Webinar Windows 7 Work/Life Balance Data Breach Bluetooth Piracy Cleaning People IBM Wireless Physical Security Administrator Public Cloud Samsung Leadership Workers SaaS Online Currency Credit Cards Computer Accessories Settings Environment Point of Sale Data loss Human Resources Smart Tech Data storage Recycling IT Management Biometrics Training Scam Spam Blocking IT service Internet Exlporer Statistics CES Social eWaste PDF Hacker IT Plan HaaS End of Support Skype Safety Wi-Fi Programming Government Touchscreen YouTube Content Management Running Cable Infrastructure Meetings Intranet Unsupported Software Addiction Internet exploMicrosoft Hiring/Firing LinkedIn Sync Cables Accountants HIPAA IT Support Net Neutrality Windows Server 2008 Amazon Web Services NarrowBand Blockchain Entrepreneur Software Tips Remote Work Uninterrupted Power Supply Computer Care File Sharing Password Manager Tablets Hosted Computing Customers Hosted Solution Windows 8.1 Update Windows Media Player Virtual Desktop Cache Advertising Telephony Unified Communications Hiring/Firing Applications Keyboard Display Devices Distributed Denial of Service Files Audit Online Shopping Chromecast Debate Google Docs Staff Webcam Cost Management Netflix Password Botnet Business Mangement Help Desk Upgrades Analyitcs Inventory Customer Service Wireless Internet Notifications Root Cause Analysis Start Menu Theft IoT Data Warehousing Specifications Thought Leadership Colocation Computer Fan Regulations Evernote PC Care Consultant Laptop Supercomputer Voice over Internet Protocol Digital Signature Instant Messaging HBO 3D Shadow IT Travel Criminal Scheduling Access Control SharePoint eBay Cameras Wire Hybrid Cloud Mobile Cortana Millennials Content Filter IaaS Computing Infrastructure FENG Servers Wireless Charging Licensing Alerts Touchpad Knowledge IT Security Education Multi-Factor Security Strategy Relocation Patch Management Frequently Asked Questions Fraud Macro WIndows 7 Machine Learning Legal Print Server Virtual Reality Authentication Co-managed IT Text Messaging Printer Server Shortcut Smart Office nternet Screen Mirroring Crowdfunding Professional Services Google Apps Insurance Monitor 360 Remote Support Emails Workforce Worker Commute Storage Electronic Medical Records Flash Fiber-Optic Work Station User Analysis Lifestyle Gaming Console Windows 10s Company Culture Tip of the week Amazon Managing Stress Domains Business Owner Law Firm IT Software as a Service Bloatware Nanotechnology Telecommuting Paperless Office Charger Cast Tools Science Practices Reputation Augmented Reality Battery Benefits Video Games Automobile Public Computer Students IT solutions Employer Employee Relationship CrashOverride Smart Technology Scalability Healthcare Loyalty Books Thank You Experience Two Factor Authentication How to Content Emergency Electronic Health Records Techology Worker Congratulations Music Audiobook Assessment Rootkit Politics Transportation HVAC Television Troubleshooting Webinar

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *