094 90 48200     Get SUPPORT

Aniar IT Services Blog

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from Aniar IT Services.

These 3 Industries are Being Fundamentally Changed...
Tech Term: Bandwidth
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy User Tips Productivity Email Cloud Google Internet Microsoft Hosted Solutions Data Workplace Tips Hackers Tech Term Network Security Innovation Data Backup Hardware Communication Mobile Devices Efficiency Data Recovery Cloud Computing Business Malware VoIP Smartphone Communications Small Business IT Support Android Windows 10 Smartphones Network Software Gadgets IT Services Managed IT Services Mobile Device Artificial Intelligence Collaboration Business Management Browser Users Backup Internet of Things Spam Chrome How To Cybersecurity Server Windows Information Router Computers Applications BDR Computer Outsourced IT Business Continuity Word Office 365 Phishing Cybercrime Miscellaneous Saving Money Data Security Money Mobile Device Management Encryption Two-factor Authentication Passwords Staff Windows 7 Vulnerability Operating System Data Protection BYOD Holiday Ransomware Facebook Managed Service Upgrade Remote Monitoring Paperless Office Social Media Connectivity Settings Law Enforcement Sports Access Control Virtualization CES Unsupported Software Education Telephony Data Storage Telephone System Managed IT Fraud Scam Business Intelligence Wi-Fi Human Resources Update Infrastructure Content Management Keyboard Spam Blocking Botnet Augmented Reality VPN Machine Learning Cryptocurrency Display Disaster Recovery Password Apps Blockchain Bring Your Own Device Training Government Software as a Service Managed IT services Automation IT Management Redundancy Voice over Internet Protocol Microsoft Office App Telephone Systems Meetings Social Engineering Google Drive Avoiding Downtime Virtual Assistant Website Identity Theft Comparison Private Cloud IT Plan Save Money OneNote Google Docs Social Specifications Wireless Data Management Firewall Tip of the week Cabling Workers Password Management Public Cloud MSP Net Neutrality Evernote Cleaning Servers Bing Trending Employee Entertainment Warranty HaaS GDPR Recycling Devices NIST Vendor Computer Fan Unified Threat Management Windows Server 2008 Cables Authentication Data loss Cache Software Tips File Sharing ISP HBO OLED Practices HVAC Help Desk Digital Signage Telecommuting Amazon Printer Remote Computing eWaste Thought Leadership 5G FENG Mobile Computing Computer Care Default App Bandwidth Cortana Alert Wireless Internet Cryptomining Outlook Biometric Security Charger Hosted Computing Skype Legal Google Search Travel Remote Work The Internet of Things Amazon Web Services Accountants YouTube Mouse Hacker Windows Server 2008 R2 Safe Mode Security Cameras Tools Work/Life Balance Smart Office Quick Tips Patch Management IT Infrastructure Password Manager Nanotechnology HIPAA USB Solid State Drive Remote Worker Database Frequently Asked Questions Recovery Manufacturing Wireless Charging Inventory Networking Shortcuts Start Menu Criminal Windows 10s Save Time Big Data Downtime Microchip Sync Multi-Factor Security Smartwatch Millennials Digital Signature Document Management Camera WiFi Investment Business Mangement Smart Tech Screen Mirroring Electronic Medical Records Wire Audit Physical Security Wiring Business Technology Excel Virtual Reality Google Apps Employer-Employee Relationship Enterprise Content Management Mobility Addiction Proactive IT Online Shopping Root Cause Analysis Search Engine Cast Health Value Workforce Credit Cards PDF Flash ROI Gmail Windows 10 Hard Drives Public Speaking Search Presentation Lithium-ion battery Compliance CrashOverride Emergency Wireless Technology Tech Support Safety IBM Regulation Productivity Managed Service Provider Marketing Budget Competition Customer Relationship Management Hiring/Firing Twitter Company Culture IP Address Processor Fun Customer Service Managing Stress Mobile Office Domains Printers