ct logo wslogan

3 minutes reading time (514 words)

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from i-medIT.

 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Cloud Business Computing Hackers Innovation Microsoft Tech Term Backup Malware Hardware Email Data Internet Small Business VoIP Network Security Cybercrime Data Backup Smartphones Android Mobile Devices Software User Tips Ransomware Windows Business Cloud Computing Efficiency Network Managed IT Services How To Browser Data Recovery Smartphone Internet of Things Gadgets Cybersecurity Computers Business Management Outsourced IT Hosted Solutions Collaboration Law Enforcement Social Engineering Social Media Miscellaneous Communications Computer Upgrade Chrome Business Continuity Automation Communication Productivity Mobile Device Management Money Artificial Intelligence Router IT Support Office 365 Windows 10 Bandwidth Vulnerability Saving Money Server Telephone Systems Managed IT Services Operating System Facebook Disaster Recovery Alert Passwords Save Money Bring Your Own Device Data Protection App Word Phishing Applications BDR Connectivity Data Breach Spam IT Services Data Security Safety Two-factor Authentication Windows 7 Downtime Networking Update Google Drive Infrastructure Public Cloud IT Management CES Internet Exlporer OneNote IT Plan Redundancy Password Quick Tips Content Management Avoiding Downtime Cleaning Comparison Unsupported Software Information Website Sports Blockchain Gmail Paperless Office YouTube Productivity Spam Blocking Data storage Windows 10 Wi-Fi Microsoft Office Remote Monitoring Physical Security Recovery Identity Theft Managed IT Virtualization Business Intelligence The Internet of Things BYOD Private Cloud VPN Data Storage Apps Government Credit Cards Chromecast Devices User Error Meetings Criminal Password Management Botnet HBO Conferencing Millennials Access Control Health File Sharing Samsung Skype Uninterrupted Power Supply Flexibility Wireless Charging Going Green Humor Wire Knowledge Multi-Factor Security Staff Accountants Flash Fraud Robot Thought Leadership IBM NIST Travel Password Manager Reputation Frequently Asked Questions Data Management Emails Workforce NarrowBand Authentication Hiring/Firing Augmented Reality Value Start Menu Office Tips Solid State Drive Cortana Smart Office Hybrid Cloud Network Congestion Trending Laptop Apple DDoS Settings Amazon End of Support Supercomputer Google Docs Data loss Patch Management Cryptocurrency Workplace Tips Business Mangement USB Customer Servers Excel Telecommuting Wireless Technology Automobile Nanotechnology Files Tools Audit Legal Google Apps Monitor Document Management PDF IT Consultant Touchpad Practices iPhone Sync Amazon Web Services Addiction Internet exploMicrosoft Budget Screen Mirroring Scam Office Safe Mode Smart Tech History Root Cause Analysis Recycling Hacking HVAC Marketing Tip of the week Remote Work Work/Life Balance Black Market Tech Support Computer Fan Employer-Employee Relationship Keyboard Specifications Software Tips Hosted Computing Managed Service Provider Managed Service Charger HaaS Online Shopping Entertainment Cache Advertising Voice over Internet Protocol Cast HIPAA Digital Signature Relocation Virtual Assistant eWaste Big Data Enterprise Content Management Windows Server 2008 Netflix Shadow IT FENG Mobile Device Workers Machine Learning webinar Inventory Electronic Medical Records MSP Computer Care Telephony Windows 10s Evernote Holiday Outlook Wireless Internet Current Events Human Resources Encryption Telephone System Books Worker Assessment Video Games Music Company Culture Virtual Reality Save Time Remote Computing Battery Firewall Compliance Rootkit WiFi Emergency Television Scalability Wearable Technology Managing Stress Wireless Worker Commute Mobility Risk Management Education Smart Technology Regulation Training Content Twitter Search Thank You Public Computer CrashOverride Webinar Employer Employee Relationship Remote Worker Loyalty Politics Computing Infrastructure Two Factor Authentication Vendor Management Techology Audiobook How to Computer Accessories Wiring Congratulations Instant Messaging Troubleshooting Bluetooth IT solutions SaaS Best Practice Information Technology Transportation Experience Users IT Support Benefits