ct logo wslogan

3 minutes reading time (514 words)

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from i-medIT.

 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Business Computing Cloud Hackers Backup Microsoft Email Internet Innovation Android Network Security Cybercrime Small Business Hardware Business Malware Software Data Ransomware Efficiency Smartphones VoIP How To Browser Smartphone Cybersecurity Windows Computers Cloud Computing User Tips Mobile Devices Data Backup Business Management Chrome Automation Internet of Things Collaboration Business Continuity Communication Productivity Mobile Device Management Law Enforcement Managed IT Services Social Engineering Tech Term Saving Money Network Server App Telephone Systems Data Protection Phishing Outsourced IT Disaster Recovery Computer Data Breach Spam Artificial Intelligence Money Data Recovery Safety Managed IT Services Bring Your Own Device Windows 10 Data Security Vulnerability Operating System Two-factor Authentication Gadgets Social Media Communications Alert Upgrade Hosted Solutions Bandwidth Wi-Fi Unsupported Software IT Services Internet Exlporer Redundancy Avoiding Downtime Apps BDR Comparison Office 365 Spam Blocking Data storage Physical Security Router Cleaning BYOD Passwords Save Money Word Data Storage Government Private Cloud Google Drive Gmail Downtime Remote Monitoring Identity Theft Managed IT IT Management Business Intelligence Windows 10 Public Cloud Recovery OneNote Update Virtualization The Internet of Things Miscellaneous Infrastructure IT Plan VPN Quick Tips CES Productivity Monitor PDF Travel Password Manager Uninterrupted Power Supply Going Green IT Consultant Touchpad iPhone Frequently Asked Questions Workforce HaaS Nanotechnology Audit Cortana Big Data Budget Screen Mirroring Office Trending Microsoft Office Practices Internet exploMicrosoft Start Menu Data Management NarrowBand Addiction Root Cause Analysis Hacking Marketing Google Docs Content Management Electronic Medical Records Black Market History Amazon Mobile Device Business Mangement Office Tips Software Tips Managed Service Provider Excel Telecommuting Holiday Smart Tech Computer Fan Tools Google Apps DDoS Cast Relocation Hosted Computing Charger Advertising Wireless Technology Website Blockchain Digital Signature Netflix Sync Amazon Web Services FENG Recycling webinar Tip of the week Remote Work Flexibility Connectivity Employer-Employee Relationship Current Events Specifications Sports Inventory Computer Care Windows 10s Outlook Networking Meetings Voice over Internet Protocol HIPAA Hiring/Firing Encryption IT Support User Error Online Shopping eWaste Tech Support Conferencing Health Windows Server 2008 YouTube Devices Workers Patch Management Knowledge Password Access Control Samsung Humor IBM Facebook Human Resources Automobile Accountants Robot Telephony Evernote Reputation Criminal Shadow IT Emails Windows 7 Credit Cards Legal Thought Leadership Hybrid Cloud Botnet Scam Network Congestion Laptop Apple HBO Millennials Authentication Value Solid State Drive Chromecast Supercomputer Data loss Multi-Factor Security Staff Work/Life Balance Settings End of Support Skype Wireless Charging Customer Applications Files Flash Fraud Keyboard Transportation Entertainment Remote Computing Loyalty Vendor Management Users Bluetooth IT solutions Experience Information Technology Benefits IT Support SaaS Books Cache Virtual Reality Save Time Thank You Video Games Music Battery Firewall Emergency Wireless Internet Worker Commute Congratulations Worker Scalability Wearable Technology Assessment Education Smart Technology Mobility Risk Management Search Content USB Employer Employee Relationship Rootkit Workplace Tips Television Wireless Computing Infrastructure Two Factor Authentication Politics How to Techology Audiobook Instant Messaging Troubleshooting Computer Accessories Training Twitter Public Computer CrashOverride WiFi Webinar Best Practice