XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from XFER.

These 3 Industries are Being Fundamentally Changed...
Tech Term: Bandwidth
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Data Small Business Hardware Hosted Solutions Mobile Devices Productivity Google Mobile Office VoIP Gadgets Email Malware Quick Tips Network Security Network Efficiency IT Support Innovation Social Media Business Management IT Services Server Smartphones Miscellaneous Business Continuity Upgrade Business Virtualization Communication Windows Disaster Recovery Computer Communications Microsoft Office Managed IT Services User Tips Users Data Backup Mobile Device Management Passwords Browser Android Save Money Smartphone Marketing Data Recovery Holiday Ransomware WiFi Alert Vendor Management Mobile Computing Tech Term Outsourced IT Windows 10 Internet of Things Operating System Cybercrime Remote Monitoring Apple BYOD Information Technology Computers Avoiding Downtime BDR Cloud Computing Bring Your Own Device Remote Computing Router IT Solutions Going Green The Internet of Things Artificial Intelligence Current Events Chrome Best Practice History VPN Automation Telephone Systems Firewall Big Data IT Consultant Trending Health Application Collaboration Hacking Cybersecurity Social Engineering Phone System Spam Wireless Technology Printer Employer-Employee Relationship Facebook Budget Managed IT Services Bandwidth Money Excel App Proactive IT Lithium-ion Battery Office Windows 10 Two-factor Authentication Business Managament Mobility Applications Fax Server Recovery Unified Threat Management Maintenance Windows 8 iPhone How To Networking Mouse Business Intelligence Content Filtering Humor Redundancy Analytics Outlook Law Enforcement Phishing Office 365 Tutorials Apps Virus PowerPoint Data Protection Value Sports Website Managed IT Customer Relationship Management Hard Drives Data Security Training Gmail Productivity Antivirus User Error Private Cloud Retail Data Management Settings IT Management Administration Mobile Device Downtime File Sharing Social Networking Memory Encryption Digital Payment Network Congestion Computer Repair IT Support Information Conferencing Vulnerability Analysis Tablet Google Drive Blockchain Search Save Time Tech Support Connectivity Word Twitter Office Tips Document Management Streaming Media Risk Management Scam Compliance Identity Theft Flexibility Inbound Marketing Entertainment Saving Time Environment Running Cable Augmented Reality Intranet Touchscreen Access Control Human Resources Servers DDoS Wearable Technology Smart Tech Biometrics CES Solid State Drive Fraud Machine Learning IT service IT Plan Black Market Hacker Best Available OneNote Video Surveillance Webinar Wireless Physical Security Content Management Bluetooth Cleaning Password Infrastructure People Public Cloud Data Storage Unsupported Software IBM Samsung SaaS Paperless Office Piracy Keyboard Managed Service Leadership Robot Update Administrator Work/Life Balance Data Breach USB Online Currency Data storage Point of Sale Comparison Recycling Computer Accessories Workers Windows 7 eWaste Education Internet Exlporer Virtual Assistant Statistics PDF Social HaaS End of Support Data loss Safety Wi-Fi Skype Government Programming YouTube Telephone System Meetings Spam Blocking Instant Messaging Credit Cards Line of Business Mobile Cortana Internet exploMicrosoft Screen Mirroring Electronic Health Records Millennials 360 Emails Wireless Charging LinkedIn Electronic Medical Records Wire Cameras Multi-Factor Security Strategy NarrowBand Net Neutrality Customers Windows 10s Content Filter Camera Uninterrupted Power Supply Business Owner Cryptocurrency Licensing Frequently Asked Questions Authentication MSP Virtual Reality Professional Services Google Apps Advertising Charger Cast WIndows 7 Workforce Windows 8.1 Update Flash Fiber-Optic Distributed Denial of Service Files Hiring/Firing Smart Office Printer Server Shortcut Lifestyle Display Chromecast HIPAA Insurance Amazon Storage Worker Commute Software as a Service Debate Safe Mode User Tip of the week Hosted Solution Nanotechnology Remote Worker Bloatware Tools Webcam Notifications Help Desk Computer Care HVAC Managing Stress Domains Telecommuting Science Sync Cables Colocation Laptop Practices Windows Server 2008 Amazon Web Services SharePoint Audit Addiction Virtual Private Network Shadow IT Accountants Business Technology Netflix Wiring Entrepreneur Password Manager Hybrid Cloud Enterprise Content Management Software Tips Remote Work PC Care Tablets Telephony Unified Communications Scheduling IaaS Computing Infrastructure Root Cause Analysis Students 3D Touchpad Hosted Computing Proactive Online Shopping Relocation Computer Fan Cache Project Management Windows Media Player Virtual Desktop Google Docs Staff IT Security eBay Legal Supercomputer Hiring/Firing Monitor Macro Devices GDPR Cost Management Botnet Business Mangement Print Server Password Management Alerts Upgrades Analyitcs Start Menu Theft nternet Crowdfunding Healthcare Data Warehousing Specifications Remote Support Co-managed IT Inventory Remote Monitoring and Maintenance Regulations Evernote FENG Wireless Internet Warranty Customer Service Voice over Internet Protocol Digital Signature Text Messaging Knowledge IoT Company Culture Work Station Reputation Patch Management Thought Leadership E-Commerce Travel Criminal Gaming Console Law Firm IT NIST Consultant HBO Rootkit Battery Video Games Politics Regulation Transportation Television Troubleshooting Webinar Scalability Benefits Printers Automobile Public Computer IT solutions Thank You Employer Employee Relationship CrashOverride How to Smart Technology Techology Books Loyalty Congratulations Experience Two Factor Authentication Content Emergency Worker Music Audiobook Assessment

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name *
      • Number of Participants *
      • First Name *
      • Last Name *
      • Phone *
      • Yes, subscribe me to: