(707) 268-8850    Get SUPPORT

Network Management Services Blog

Network Management Services has been serving the Eureka area since 1995, providing IT Support including technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from Network Management Services.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 25 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Managed IT Services Privacy Malware Hackers Backup Google VoIP Hosted Solutions Email Data Backup IT Support Outsourced IT Mobile Devices Data Recovery Microsoft Software Saving Money Innovation Cloud Computing Business Continuity Internet Internet of Things Cybercrime Efficiency Data Communications Small Business Business Ransomware Hardware Disaster Recovery Cybersecurity Android BDR Tech Term IT Services Avoiding Downtime Smartphones How To Smartphone Alert Browser Artificial Intelligence User Tips Server Managed IT Communication Computers Chrome Social Engineering Phishing Mobile Device Management Data Protection Data Security Two-factor Authentication Mobility Vulnerability Managed IT Services Collaboration Law Enforcement Business Intelligence Windows Money Business Management Router BYOD Spam Flexibility Redundancy Bandwidth Network VPN Budget Gadgets Document Management Compliance Private Cloud Upgrade Firewall Virtualization Social Media Connectivity Save Money Windows 10 Productivity Operating System Computer Passwords Managed Service Provider Identity Theft Proactive IT Telephone Systems Word Office 365 Remote Monitoring Data storage Infrastructure Data Breach Data loss Comparison Solid State Drive Spam Blocking Value Networking Hacking Apps Business Owner Holiday Productivity Update Physical Security Government Big Data Employer-Employee Relationship Analysis Data Storage Miscellaneous Google Drive Workers Facebook Public Cloud Windows 10 Office Tips Mobile Device Content Filtering CES Wi-Fi App OneNote Content Management IT Management Windows 7 Bring Your Own Device Smart Tech IT Plan Information Technology Automation Credit Cards Quick Tips Website Unsupported Software Work/Life Balance Servers Botnet Human Resources Patch Management Root Cause Analysis Healthcare Mobile Computing Practices Applications Software Tips Humor HaaS Hard Drives Files Settings Amazon Storage Computer Care Flash Travel Staff Scam Monitor Meetings Internet Exlporer Reputation Password Manager Electronic Health Records webinar Hosted Computing Amazon Web Services Samsung Digital Signature Workplace Tips End of Support Customer Business Mangement Machine Learning Conferencing Inventory HBO Entertainment USB Online Shopping Addiction Sync Software as a Service Encryption Screen Mirroring Internet exploMicrosoft Safety Gmail YouTube The Internet of Things IT Support Specifications Access Control Outlook Hiring/Firing Audit Windows 10s Evernote Cache Telephony Recycling Supercomputer Strategy Cast Advertising Millennials Authentication Frequently Asked Questions Skype Legal Hosted Solution Computer Fan Colocation Wireless Charging Wireless Internet SaaS eWaste Recovery Workforce Nanotechnology Save Time Training Excel Risk Management Start Menu FENG Computing Infrastructure Fiber-Optic Wire Criminal HVAC Current Events Google Docs Accountants Apple Telecommuting Tip of the week Mobile Cables Sports Knowledge Voice over Internet Protocol Data Warehousing Hybrid Cloud iPhone Emails Remote Work Devices Charger Windows Server 2008 HIPAA Professional Services Cortana History Unified Communications Smart Office Wireless Technology Network Congestion Multi-Factor Security IoT Black Market Electronic Medical Records PDF IBM Thought Leadership Password Tools Hacker Marketing Theft Paperless Office Blockchain IT Consultant Trending Data Management Microsoft Office Office Streaming Media Unified Threat Management Regulations Keyboard Emergency Downtime User Error Google Apps Students Leadership Lifestyle Insurance Education Relocation Health Netflix Fraud Content Filter Cleaning Scalability Mobile Office Domains Computer Accessories Content Music Public Speaking Virtual Reality Bluetooth Audiobook Wearable Technology Twitter Transportation Lithium-ion battery Worker Commute Augmented Reality Tech Support Instant Messaging Benefits Worker Troubleshooting Loyalty Company Culture How to Smart Technology Competition Rootkit Fun Users Managing Stress WiFi Best Practice Shadow IT Two Factor Authentication Wireless Vendor Management Politics Search Administration Assessment Enterprise Content Management Presentation Books Television Password Management Automobile 5G Webinar Video Games CrashOverride Public Computer NIST Battery Customer Relationship Management IT solutions Techology Remote Computing IP Address Employer Employee Relationship Customer Service Experience

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *