(707) 268-8850    Get SUPPORT

Network Management Services Blog

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from Network Management Services.

These 3 Industries are Being Fundamentally Changed...
Tech Term: Bandwidth
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Backup VoIP Mobile Devices Hosted Solutions Innovation Google Email Data Recovery Outsourced IT Data Tech Term IT Support IT Services Internet of Things Saving Money Cloud Computing Internet Microsoft Software BDR Business Continuity Efficiency Hardware Communications Cybercrime Business Smartphones Communication Ransomware Small Business Cybersecurity User Tips Server Android Disaster Recovery Artificial Intelligence Managed IT Services Save Money Managed IT Network How To Alert Computers Gadgets Browser Smartphone Windows Avoiding Downtime Law Enforcement Miscellaneous Social Engineering Windows 10 Data Security Data Protection Social Media Chrome Firewall Mobile Device Management Workplace Tips Phishing Vulnerability Two-factor Authentication Mobility Computer Passwords Collaboration Money Productivity Router BYOD Business Management Business Intelligence Applications Upgrade Blockchain Compliance Redundancy Remote Monitoring Spam Flexibility Telephone Systems Virtualization Operating System Connectivity Productivity Bandwidth VPN Word Document Management Budget Proactive IT Managed Service Provider IT Support Facebook Identity Theft Office 365 Private Cloud Quick Tips Office Tips Mobile Device Credit Cards Employer-Employee Relationship Public Cloud Virtual Assistant Analysis Data loss Training Workers OneNote Data storage Comparison Windows 10 App Settings IT Management Solid State Drive Holiday Data Breach Wi-Fi Infrastructure Windows 7 Content Filtering Password IT Plan Business Owner Sports Update Information Technology Hacking Apps Work/Life Balance Information Value Unsupported Software CES Automation Data Storage Networking Microsoft Office Physical Security Servers File Sharing Encryption Government Bring Your Own Device Managed Service Access Control Mobile Computing Big Data Content Management Paperless Office Smart Tech Website Google Drive Spam Blocking Unified Threat Management Strategy Meetings Travel Wiring Emergency Theft Streaming Media Tip of the week Telecommuting Password Management HaaS Humor Mobile SaaS Evernote Authentication Computing Infrastructure Leadership Students HIPAA Insurance Files Data Warehousing Voice over Internet Protocol Recycling Wireless Internet Windows 10s Cleaning Netflix Apple Camera Patch Management Google Apps Content Filter Reputation Internet Exlporer Windows Server 2008 Remote Work NIST Entertainment Professional Services USB Wireless Charging Nanotechnology HBO Human Resources Healthcare Fraud Practices Multi-Factor Security Current Events eWaste Wire Hybrid Cloud Sync Telephone System Computer Care Accountants Hard Drives iPhone Screen Mirroring Software as a Service Scam PDF Black Market Storage Customer End of Support Cryptocurrency Electronic Health Records CrashOverride Tools Fiber-Optic Monitor History Outlook Specifications webinar Data Management Staff Samsung Keyboard Amazon Hosted Computing Trending Knowledge Augmented Reality Criminal Audit Telephony Cast Wireless Technology Password Manager Internet exploMicrosoft Regulations Safe Mode Charger Emails Digital Signature Machine Learning Downtime MSP Safety Hosted Solution Cables Devices Frequently Asked Questions Millennials HVAC Conferencing IBM Marketing Hacker Amazon Web Services Inventory Cortana Lifestyle Electronic Medical Records Network Congestion The Internet of Things Smart Office Office Computer Fan Skype Legal Risk Management IoT Education Business Mangement Addiction Advertising YouTube Root Cause Analysis Botnet Remote Worker Recovery Unified Communications Thought Leadership User Error Excel Workforce Enterprise Content Management Start Menu Online Shopping Colocation Software Tips IT Consultant Save Time Relocation FENG Hiring/Firing Health Google Docs Supercomputer Gmail Cache Flash Business Technology Company Culture Shadow IT Rootkit Customer Service Audiobook Proactive Mobile Office Wearable Technology Employer Employee Relationship Fun Domains Virtual Reality Managing Stress Wireless Remote Monitoring and Maintenance Administration Computer Accessories Automobile Two Factor Authentication Public Speaking Worker Commute Printers Presentation Vendor Management Search Line of Business Assessment Lithium-ion battery Instant Messaging Troubleshooting Bluetooth Video Games Regulation Tech Support Transportation 5G Battery Twitter Books Television How to Techology Remote Computing Experience WiFi Benefits Webinar Public Computer Competition Worker Customer Relationship Management Content Loyalty IP Address Scalability Music Users Best Practice Politics Smart Technology IT solutions