XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from XFER.

These 3 Industries are Being Fundamentally Changed...
Tech Term: Bandwidth
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Data Hosted Solutions Hackers Google Productivity Hardware Mobile Office Mobile Devices VoIP Gadgets Email Quick Tips Malware IT Support Network Efficiency Social Media Business Management Innovation Network Security IT Services Miscellaneous Business Continuity Smartphones Upgrade Business Server Virtualization Windows Disaster Recovery Communication Microsoft Office Managed IT Services Users Communications Computer Passwords User Tips Mobile Device Management Android Data Backup Browser Smartphone Marketing Holiday Save Money WiFi Alert Data Recovery Vendor Management Ransomware Operating System Cybercrime Remote Monitoring Mobile Computing Outsourced IT Windows 10 Tech Term Computers Avoiding Downtime Cloud Computing BDR Bring Your Own Device Apple BYOD Internet of Things Information Technology Current Events IT Solutions Chrome The Internet of Things VPN Best Practice History Automation Telephone Systems Router Going Green Big Data Remote Computing Health Collaboration Trending Cybersecurity Hacking Artificial Intelligence Social Engineering Phone System Employer-Employee Relationship Wireless Technology Spam Firewall Facebook IT Consultant Application Bandwidth Excel App Lithium-ion Battery Money Printer Office Proactive IT Budget Managed IT Services Fax Server Maintenance Windows 8 How To iPhone Networking Content Filtering Two-factor Authentication Business Intelligence Mobility Business Managament Recovery PowerPoint Unified Threat Management Managed IT Data Security Website Customer Relationship Management Value Hard Drives Gmail Mouse Phishing Private Cloud Redundancy User Error Law Enforcement Office 365 Humor Antivirus Applications Outlook Tutorials Apps Virus Data Protection Analytics Blockchain Downtime Word Google Drive File Sharing Memory Save Time Conferencing Tech Support Identity Theft Office Tips Productivity Compliance Tablet Sports Search Twitter Analysis Flexibility Inbound Marketing Document Management IT Management Entertainment Windows 10 Streaming Media Risk Management Data Management Retail Connectivity IT Support Administration Mobile Device Vulnerability Digital Payment Saving Time Social Networking Network Congestion Computer Repair Update SaaS Workers IBM Piracy USB Data storage Leadership Comparison Robot Best Available Administrator Access Control Windows 7 Smart Tech Bluetooth eWaste Data loss People Internet Exlporer Computer Accessories Machine Learning Samsung PDF Safety Wi-Fi Scam Training Spam Blocking HaaS End of Support Information Online Currency Government Social Credit Cards YouTube Recycling Meetings Point of Sale Education Paperless Office Instant Messaging Servers Touchscreen CES Environment DDoS Settings Statistics Human Resources IT Plan OneNote Solid State Drive Programming Black Market Biometrics Skype Encryption Content Management IT service Data Storage Hacker Augmented Reality Intranet Wireless Physical Security Unsupported Software Running Cable Cleaning Password Video Surveillance Infrastructure Data Breach Wearable Technology Webinar Public Cloud Work/Life Balance Wireless Internet Bloatware Netflix Net Neutrality Colocation Webcam Windows Server 2008 Amazon Web Services IoT Telephone System Managing Stress Domains Laptop Password Manager Thought Leadership Science Windows 8.1 Update SharePoint Software Tips Remote Work NIST Root Cause Analysis Shadow IT Help Desk Line of Business Supercomputer Display Electronic Health Records Computer Fan Hybrid Cloud Telephony Unified Communications PC Care Google Docs Staff Wire Entrepreneur IaaS Computing Infrastructure Online Shopping Debate Touchpad Botnet Business Mangement Content Filter Tablets Relocation Scheduling Cryptocurrency Legal 3D Authentication Hiring/Firing MSP Knowledge Monitor Data Warehousing Specifications Windows Media Player Virtual Desktop FENG eBay Start Menu Theft Alerts Voice over Internet Protocol Digital Signature Smart Office Cost Management Patch Management Regulations Evernote Insurance Travel Criminal Storage Upgrades Analyitcs 360 Emails Macro HBO Safe Mode Screen Mirroring Nanotechnology Reputation Co-managed IT Millennials HVAC Customer Service Electronic Medical Records Text Messaging Mobile Cortana IT Security Work Station Multi-Factor Security Strategy Windows 10s Internet exploMicrosoft Gaming Console Wireless Charging Practices Managed Service Consultant Business Owner Addiction Frequently Asked Questions Fraud Accountants Business Technology Charger Cast Print Server NarrowBand HIPAA Remote Support Customers Workforce Enterprise Content Management Cameras Hiring/Firing nternet Crowdfunding Uninterrupted Power Supply Professional Services Google Apps Lifestyle Students Advertising Flash Fiber-Optic Hosted Computing Licensing Proactive Software as a Service Cache Virtual Reality Hosted Solution Company Culture Distributed Denial of Service Files Tip of the week Amazon Virtual Assistant WIndows 7 Computer Care Law Firm IT Chromecast Devices Keyboard Telecommuting Password Management Printer Server Shortcut Tools Healthcare Worker Commute Audit LinkedIn Notifications Sync Cables Inventory Remote Monitoring and Maintenance User Books Loyalty How to Experience Techology Content Two Factor Authentication Thank You Emergency Regulation Music Worker Audiobook Congratulations Assessment Rootkit Remote Worker Politics Battery Transportation Television Troubleshooting Webinar Video Games Wiring Benefits Automobile Public Computer IT solutions Scalability Employer Employee Relationship CrashOverride Smart Technology

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *