Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register
3 minutes reading time (514 words)

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from Alternative IT Solutions.

These 3 Industries are Being Fundamentally Changed...
Tech Term: Bandwidth
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 25, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Privacy Email Network Security Google Malware Data Backup Hackers Microsoft Managed IT Services Outsourced IT Software VoIp Managed IT Services Cloud Computing Android Tech Term Backup Efficiency Small Business Data Recovery Internet Mobile Devices How To User Tips Cybersecurity Internet of Things Cybercrime Hosted Solutions Alert IT Support Saving Money Ransomware Communication Hardware Browser Collaboration Productivity Data Protection Business Management Router Business Continuity Chrome Money Artificial Intelligence Communications Data Phishing Smartphone Two-factor Authentication Smartphones Data Security Mobile Device Management Computers Innovation BDR Connectivity IT Services Word Windows Windows 10 Disaster Recovery Vulnerability Network Office 365 Remote Monitoring Social Engineering IT Management BYOD Business Intelligence Managed IT Identity Theft Telephone Systems Spam Business Law Enforcement Unsupported Software Mobile Device Windows 7 Servers Wi-Fi Redundancy Server Data Storage Website Employer-Employee Relationship Upgrade Comparison OneNote App Operating System Social Media Spam Blocking Networking Value Bring Your Own Device Infrastructure Work/Life Balance Facebook Budget Gadgets CES Data Breach Avoiding Downtime Compliance Update Content Management Private Cloud Workers Apps VPN Computer Holiday Credit Cards Document Management Virtualization IT Plan Big Data Cast Google Docs Theft PDF Computer Fan Office Tips Leadership Hosted Computing Software as a Service Keyboard HIPAA USB Charger Network Congestion Outlook Professional Services Fraud Legal Marketing Trending YouTube Risk Management Business Mangement Devices Passwords Cortana Encryption Samsung The Internet of Things Software Tips Botnet Inventory Electronic Medical Records Meetings Patch Management Wireless Charging Data Management Wire Recovery HaaS Skype Frequently Asked Questions Netflix Amazon Criminal Addiction Hiring/Firing Sync Content Filtering Travel Telecommuting Gmail Thought Leadership Proactive IT Scam Google Apps Black Market Access Control Flash Government Human Resources Sports Cleaning Solid State Drive IT Consultant Specifications Downtime Excel Bandwidth Amazon Web Services Applications Windows 10s Telephony SaaS Information Technology Lifestyle Smart Tech Remote Work Recycling Save Money IT Support Flexibility IBM Voice over Internet Protocol Physical Security Password Authentication Data loss Staff Smart Office Computer Care Audit Start Menu Millennials HVAC Root Cause Analysis Tip of the week Microsoft Office Online Shopping Cache Regulations Current Events Mobile Computing Automation webinar eWaste Training Google Drive Firewall Supercomputer Entertainment Password Manager Nanotechnology Screen Mirroring Digital Signature Paperless Office Data Warehousing Tools Workforce Practices Windows Server 2008 Mobility Settings Evernote Blockchain Wireless Internet Public Cloud Knowledge FENG HBO Workplace Tips Mobile Conferencing Multi-Factor Security Accountants Machine Learning Education Consultation Windows 10 Enterprise Content Management Automobile Twitter Thank You Students Computer Accessories Congratulations Password Management IoT Company Culture Rootkit Strategy Healthcare Business Owner Fiber-Optic Bluetooth Bata Backup Assessment Managing Stress Two Factor Authentication NIST Employer Employee Relationship Vendor Management Streaming Media Analysis Electronic Health Records Worker Cables Television Insurance Office Health VoIP Content Filter Save Time Managed Service Provider Loyalty WiFi Unified Communications Public Computer Hacking Battery Help Desk Quick Tips Safety Storage Unified Threat Management

Latest News & Events

Alternative IT Solutions is proud to announce the launch of our new website at https://www.alternative-IT.co.uk. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Alternative IT Solutions can do for your business.

Call Us Today
Call us today
(0)20 8498 4300

Avocet House, Trinity Park, Trinity Way
London, England E4 8TD