Male Rep 1


 "The customer is the hero of the Story"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from TWINTEL Solutions.

These 3 Industries are Being Fundamentally Changed...
Tech Term: Bandwidth


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions Mobile Devices Data Google VoIP Business Microsoft roundup Disaster Recovery nonprofit Software Email bgc Innovation Internet Managed IT Services Business Continuity Alert communications Hardware Outsourced IT IT Services Smartphones Windows 10 Data Backup Browser Tech Term Managed IT Services User Tips Saving Money Computer Ransomware Server Cloud Computing Efficiency Cybercrime Data Recovery Android Business Management Small Business Smartphone Network Internet of Things IT Support BDR Computers Workplace Tips Productivity Quick Tips Windows Productivity Passwords Office IT Support Communication Miscellaneous Save Money Artificial Intelligence Managed IT Telephone Systems Money Social Engineering BYOD Recovery Cybersecurity Mobile Device Management Applications Chrome Facebook Windows 10 Firewall Vulnerability Mobility Work/Life Balance Social Media Virtualization Gadgets Collaboration Hacking Upgrade Law Enforcement Phishing Router Automation Budget Office Tips Flexibility Two-factor Authentication Managed Service Provider Avoiding Downtime App Data Protection VPN Health Wi-Fi Proactive IT How To Password Microsoft Office Holiday Private Cloud Office 365 Compliance Remote Monitoring Bring Your Own Device Bandwidth Information HaaS Mobile Computing Data Breach History Business Intelligence Black Market Word Operating System Apps Safety Mobile Device Spam Keyboard Scam Redundancy Value Remote Computing Data Security Google Drive Servers Information Technology Identity Theft Sports Connectivity HIPAA Cleaning Save Time Encryption Managed Service Training Workers Risk Management Physical Security Credit Cards WiFi Content Management Computer Care Automobile Wireless Technology YouTube Patch Management Windows 7 Fraud OneNote Blockchain Virtual Assistant USB Samsung Data Management End of Support Charger Settings Data storage Unsupported Software Battery Content Filtering Data Storage Website Entertainment Telephone System Electronic Medical Records Business Owner The Internet of Things Infrastructure Paperless Office Worker Emergency IT Management Voice over Internet Protocol PDF Big Data Government Software as a Service Employer-Employee Relationship Unified Threat Management Spam Blocking Solid State Drive Document Management Computing Infrastructure Comparison Marketing IT Plan SaaS Update Legal CES Hiring/Firing HBO Specifications Instant Messaging Inventory Wiring Windows 10s Humor Tools Theft NarrowBand Business Mangement HVAC Smart Technology Network Congestion Hacker Flash Evernote Users Wireless Internet Trending Windows Server 2008 Hosted Solution Devices Printer Apple Bing Screen Mirroring Best Practice Content Safe Mode Employer Employee Relationship webinar Outlook Millennials Search Going Green Access Control Public Cloud Gmail Networking Two Factor Authentication Internet Exlporer Politics Accountants MSP Vendor Management Sync Wireless Charging Virtual Reality Cortana Wire IBM Data Warehousing Lifestyle Computer Accessories Conferencing Thought Leadership Mouse Assessment iPhone Help Desk Cast Google Docs Audiobook Workforce How to Authentication Mobile Recycling Enterprise Content Management IT Consultant File Sharing Telephony Fiber-Optic Worker Commute Google Apps Smart Office Supercomputer User Error Bluetooth Netflix Wireless Regulations Amazon Twitter Administrator Television CrashOverride Downtime Video Games Human Resources Advertising Frequently Asked Questions Telecommuting Troubleshooting Nanotechnology Camera Audit Professional Services eWaste Password Management Leadership Reputation Scalability Experience Practices Augmented Reality Hard Drives Skype Cables Transportation Current Events Monitor Colocation Software Tips Regulation Amazon Web Services Education Addiction Public Computer Robot Staff Customers Excel Remote Work Laptop Smart Tech Printers Loyalty Computer Fan Microchip Meetings Chromecast Criminal NIST Hosted Computing Remote Worker Relocation Start Menu Unified Communications Techology Password Manager Machine Learning Benefits Knowledge Digital Signature Rootkit Online Shopping Cache Files Multi-Factor Security Tip of the week Shadow IT Books Touchpad Warranty FENG Search Engine Data loss Cryptocurrency GDPR E-Commerce Thank You Congratulations nonprofits