shutterstock 9311 TEST SIZE V3 051016


 "Fast Response Times and Resolutions."

Have IT Questions?
Call us now (888) 894-6411


TWINTEL Solutions has been serving the Orange County, Los Angeles County, Riverside County, and San Diego County, areas. Since 2005, TWINTEL has provided IT Support such as technical help desk support, computer support, and overall IT consulting to small and medium-sized businesses.

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from TWINTEL Solutions.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, June 23 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Business Computing Backup Hackers Network Security Malware Hosted Solutions Microsoft Google VoIP bgc roundup nonprofit Software Alert Email Managed IT Services Disaster Recovery Business Continuity Mobile Devices Business Outsourced IT Internet Data Windows 10 communications Ransomware Smartphones Browser Innovation IT Services Cybercrime Android Saving Money Hardware Computers IT Support Managed IT Services Small Business Computer Server Efficiency Cloud Computing Data Backup Office Smartphone Business Management Productivity Internet of Things Mobile Device Management Quick Tips Telephone Systems Social Engineering Managed IT BDR Recovery Cybersecurity Data Recovery User Tips BYOD Windows Tech Term Passwords Money Hacking Virtualization Collaboration Law Enforcement Network Productivity Artificial Intelligence Mobility Communication Work/Life Balance Upgrade Save Money Phishing Vulnerability IT Support App Private Cloud Wi-Fi Bandwidth Holiday Automation Two-factor Authentication Managed Service Provider Flexibility Data Protection VPN Avoiding Downtime Proactive IT How To Firewall Miscellaneous Bring Your Own Device Health Chrome Office 365 Social Media Remote Monitoring Facebook Office Tips Budget Gadgets Password Identity Theft Windows 10 Business Intelligence Google Drive Word HaaS Safety Redundancy Apps Operating System Microsoft Office Remote Computing Compliance Data Security Workplace Tips Black Market Connectivity Data Breach Applications Information Technology History Router Value Mobile Device Worker IT Management USB Business Owner Entertainment CES Sports SaaS IT Plan Mobile Computing Workers Document Management Government Physical Security Computing Infrastructure Content Management Big Data Marketing Credit Cards Wireless Technology Save Time OneNote Data storage Windows 7 Automobile Charger Risk Management Unsupported Software Electronic Medical Records Data Management Infrastructure End of Support Battery Employer-Employee Relationship Spam Blocking Keyboard Comparison Content Filtering Servers Hiring/Firing Update Cleaning Emergency PDF Solid State Drive Computer Care Legal Patch Management YouTube Samsung HIPAA Scam Spam Website Data Storage The Internet of Things Skype Worker Commute Audiobook Customers Cables User Error Criminal Laptop Computer Fan Voice over Internet Protocol Loyalty Video Games Benefits Wireless Hosted Computing Remote Work Addiction Knowledge Excel Start Menu Rootkit Unified Communications Colocation Touchpad FENG Multi-Factor Security Troubleshooting Smart Technology Inventory Cache NarrowBand Network Congestion Tip of the week Tools Training Techology Theft Trending Shadow IT Two Factor Authentication Access Control Wireless Internet Windows Server 2008 Vendor Management Cortana Hacker Blockchain Lifestyle Assessment Data Warehousing Books Authentication Fraud Wire IT Consultant Settings Mobile Apple Google Apps Internet Exlporer Human Resources CrashOverride Television Hosted Solution Monitor Amazon Smart Office Leadership Regulations Professional Services Politics iPhone Staff Meetings Nanotechnology Public Computer Software Tips Amazon Web Services Paperless Office Chromecast Password Manager Software as a Service Unified Threat Management Advertising Digital Signature Data loss Smart Tech Scalability Education Hard Drives Online Shopping Machine Learning Business Mangement Windows 10s Experience Encryption Specifications HBO webinar Flash Employer Employee Relationship Relocation Evernote HVAC Files Gmail Going Green Public Cloud WiFi Screen Mirroring Instant Messaging Accountants Millennials Devices IBM Outlook Conferencing Sync Users Computer Accessories Humor Wireless Charging Recycling Google Docs Content Cast Best Practice Search Downtime Workforce Thought Leadership Supercomputer Netflix Telephony Virtual Reality Bluetooth Reputation Fiber-Optic eWaste Audit How to Transportation Practices Robot Telecommuting Twitter Current Events Frequently Asked Questions Password Management NIST nonprofits Networking Thank You Enterprise Content Management Congratulations