Male Rep1

 

 "Affordable, Effective, and Fast"

Have IT Questions?
Call us now (888) 894-6411

Blog

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from TWINTEL Solutions.

These 3 Industries are Being Fundamentally Changed...
Tech Term: Bandwidth

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Network Security Hackers Backup Malware Hosted Solutions Mobile Devices Google Microsoft VoIP bgc Disaster Recovery Software Email roundup Data nonprofit Managed IT Services Alert Innovation Internet Business Business Continuity Outsourced IT Smartphones communications Windows 10 Hardware IT Services Tech Term Saving Money Ransomware Android Browser Data Backup Cybercrime Managed IT Services Server Cloud Computing Efficiency Internet of Things IT Support Computers Computer Small Business Productivity Quick Tips User Tips Network Windows BDR Passwords Office Data Recovery Save Money Smartphone Business Management Artificial Intelligence Money Applications Telephone Systems BYOD Social Engineering Managed IT Recovery Cybersecurity Communication IT Support Miscellaneous Mobile Device Management Virtualization Workplace Tips Collaboration Vulnerability Productivity Social Media Firewall Mobility Gadgets Upgrade Law Enforcement Hacking Work/Life Balance Phishing Facebook Holiday Router Office 365 Automation Office Tips Remote Monitoring Windows 10 Managed Service Provider Two-factor Authentication Avoiding Downtime Health Data Protection VPN Budget Flexibility Proactive IT How To Microsoft Office Private Cloud Bandwidth App Bring Your Own Device Compliance Wi-Fi Chrome Password History Mobile Computing Black Market Business Intelligence Data Breach Word Operating System Safety HaaS Redundancy Value Remote Computing Apps Mobile Device Data Security Google Drive Information Technology Sports Connectivity Identity Theft Cleaning Emergency Training Workers Big Data Physical Security Encryption Managed Service Wireless Technology Content Management Document Management Credit Cards YouTube Computer Care Patch Management Legal HIPAA OneNote End of Support Blockchain Virtual Assistant Save Time Windows 7 Risk Management Samsung Data storage Spam Charger Settings Unsupported Software Scam Data Storage Website Automobile The Internet of Things Electronic Medical Records Infrastructure Paperless Office Worker Government USB IT Management PDF Data Management Keyboard Computing Infrastructure Employer-Employee Relationship Solid State Drive Entertainment Unified Threat Management Spam Blocking Battery Content Filtering Comparison Marketing Servers IT Plan Information Update SaaS CES Business Owner Hiring/Firing Wiring Tools Theft Windows 10s Business Mangement HVAC Education HBO Smart Technology Specifications Network Congestion Inventory Flash Evernote Apple Wireless Internet Trending Devices Screen Mirroring WiFi Internet Exlporer Safe Mode Techology Going Green Windows Server 2008 Employer Employee Relationship webinar Access Control Public Cloud Gmail Networking Outlook Two Factor Authentication Millennials Sync Vendor Management Wireless Charging iPhone Cortana Wire Shadow IT Books Data Warehousing Lifestyle IBM Accountants MSP Fraud Conferencing Thought Leadership Instant Messaging Cast Google Docs Assessment Computer Accessories Authentication Mobile User Error Recycling Enterprise Content Management Users Workforce IT Consultant Telephony Downtime Fiber-Optic Google Apps Smart Office Hosted Solution Supercomputer Wireless File Sharing Best Practice Content Regulations Bluetooth Amazon Netflix Twitter Search Television Reputation CrashOverride Advertising Human Resources Telephone System Nanotechnology Camera Politics Professional Services Monitor Audit Colocation eWaste Password Management Virtual Reality Frequently Asked Questions Telecommuting Leadership Hard Drives Audiobook Skype Robot Cables Software Tips Transportation Current Events Practices Augmented Reality Amazon Web Services Addiction How to Chromecast Voice over Internet Protocol Public Computer Customers Staff Regulation Laptop Smart Tech Meetings Software as a Service Loyalty Computer Fan Criminal NIST Worker Commute Excel Remote Work Relocation Video Games Start Menu Unified Communications Files Password Manager Machine Learning Benefits Knowledge Hosted Computing Remote Worker Rootkit Online Shopping Cache Troubleshooting Multi-Factor Security Digital Signature Touchpad Scalability Experience NarrowBand Data loss FENG Hacker Cryptocurrency Tip of the week Humor GDPR nonprofits E-Commerce Thank You Congratulations Printers