(707) 268-8850    Get SUPPORT

Network Management Services Blog

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from Network Management Services.

These 3 Industries are Being Fundamentally Changed...
Tech Term: Bandwidth
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup Hosted Solutions VoIP Email Google Mobile Devices Outsourced IT Data Recovery Data Tech Term IT Support Microsoft Software Internet of Things Saving Money Cloud Computing IT Services Business Continuity Efficiency BDR Communications Hardware Internet Cybersecurity Small Business Business Ransomware Cybercrime Communication Android Artificial Intelligence User Tips Smartphones Disaster Recovery How To Managed IT Smartphone Windows Alert Gadgets Browser Managed IT Services Network Avoiding Downtime Server Save Money Computers Two-factor Authentication Vulnerability Passwords Mobility Social Engineering Law Enforcement Productivity Collaboration Business Management Router Business Intelligence BYOD Miscellaneous Chrome Social Media Firewall Data Security Data Protection Phishing Windows 10 Applications Mobile Device Management Money Flexibility Productivity Bandwidth Workplace Tips Computer Telephone Systems Managed Service Provider Proactive IT Private Cloud Connectivity IT Support Word Budget Document Management Remote Monitoring Office 365 Operating System Compliance Virtualization Facebook Upgrade Spam Identity Theft Redundancy Blockchain VPN IT Management Credit Cards Wi-Fi App Analysis Physical Security Windows 7 Automation Solid State Drive Information Government File Sharing Value IT Plan Holiday Update Password Google Drive Apps Networking Infrastructure Business Owner Managed Service Bring Your Own Device Quick Tips Unsupported Software Microsoft Office Information Technology Sports Unified Threat Management Data Storage Work/Life Balance Public Cloud Servers Employer-Employee Relationship Big Data Data storage Virtual Assistant Mobile Computing Website CES Spam Blocking Encryption Training Workers Content Management Paperless Office Access Control Settings Smart Tech Data loss Office Tips Hacking Data Breach Windows 10 Content Filtering Comparison Mobile Device OneNote Cortana Safe Mode Samsung Multi-Factor Security Entertainment Insurance Office Knowledge Sync Recycling Wireless Internet Charger Emails Screen Mirroring Software as a Service Advertising MSP Google Apps USB Content Filter HVAC Human Resources Healthcare User Error Outlook Specifications Wireless Charging Nanotechnology Augmented Reality Conferencing CrashOverride Tools Colocation Trending Fraud Practices Relocation Wireless Technology Electronic Medical Records Network Congestion Audit Telephony PDF Black Market eWaste Wire Cast Data Management Accountants Remote Worker Safety Regulations Storage Hiring/Firing Health Enterprise Content Management IBM Staff Electronic Health Records Marketing Hacker Frequently Asked Questions Millennials Fiber-Optic Keyboard The Internet of Things Downtime Computing Infrastructure Business Technology Lifestyle Amazon Hosted Computing Humor IT Consultant Computer Fan Skype Criminal Wiring Supercomputer Password Manager Hosted Solution Files Password Management Digital Signature Machine Learning Reputation Internet Exlporer Emergency Excel Workforce Cables Devices Apple Root Cause Analysis Botnet SaaS Software Tips Legal Amazon Web Services Risk Management Inventory Leadership FENG Start Menu Education Smart Office Cleaning Netflix Google Docs IoT Hybrid Cloud Flash Recovery Business Mangement Addiction NIST Save Time YouTube Customer End of Support Patch Management Tip of the week Telecommuting Unified Communications Thought Leadership Hard Drives iPhone Meetings Travel Monitor History Telephone System Online Shopping Mobile Cryptocurrency Computer Care Data Warehousing Voice over Internet Protocol HaaS Current Events Windows 10s Gmail Cache Strategy Internet exploMicrosoft Scam Windows Server 2008 Remote Work Theft Streaming Media Students HBO Evernote HIPAA Authentication webinar Professional Services Presentation Automobile Managing Stress Lithium-ion battery Transportation Worker Commute Books Television Tech Support 5G Webinar Benefits Instant Messaging Troubleshooting Public Computer Video Games Worker Loyalty Fun Battery IT solutions WiFi Techology Competition Smart Technology How to Twitter Customer Relationship Management Proactive IP Address Remote Computing Experience Rootkit Users Administration Employer Employee Relationship Content Camera Customer Service Remote Monitoring and Maintenance Mobile Office Scalability Music Best Practice Politics Search Domains Computer Accessories Audiobook Printers Wireless Two Factor Authentication Shadow IT Company Culture Line of Business Wearable Technology Vendor Management Virtual Reality Regulation Assessment Public Speaking Bluetooth