094 90 48200     Get SUPPORT

Aniar IT Services Blog

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from Aniar IT Services.

These 3 Industries are Being Fundamentally Changed...
Tech Term: Bandwidth


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Google Cloud Business Computing Email Innovation Network Security Microsoft Hackers Data Backup Malware User Tips Hardware Internet VoIP Data Data Recovery Workplace Tips Mobile Devices Android Communication Cloud Computing Browser Artificial Intelligence How To Backup Smartphones Communications IT Services Windows 10 Managed IT Services Small Business Internet of Things Applications Chrome Cybersecurity Windows Saving Money Smartphone Network Collaboration Computer Software Cybercrime Computers BDR Office 365 Miscellaneous Server Hosted Solutions Efficiency Outsourced IT Business Business Continuity Spam Information Vulnerability Mobile Device Management Business Management Data Protection IT Support Two-factor Authentication Passwords Word Ransomware Facebook Router Connectivity Gadgets Data Security Money CES Unsupported Software Managed IT Fraud Encryption Website Scam Data Storage Business Intelligence Update Infrastructure Content Management Keyboard Upgrade Social Media VPN Spam Blocking Windows 7 Password Blockchain Bring Your Own Device Virtual Assistant Managed IT services Operating System IT Management Redundancy Managed Service App Telephone Systems BYOD Paperless Office Save Money Social Engineering Avoiding Downtime Identity Theft Phishing Apps Telephone System Comparison IT Plan Productivity Remote Monitoring OneNote Microsoft Office Settings Sports Virtualization Law Enforcement Public Cloud Mobile Computing Evernote Cleaning Big Data Cryptocurrency Telephony Trending Training HaaS Recycling Devices Human Resources Computer Fan YouTube Mouse Windows Server 2008 Authentication Data loss Cache Software Tips Smart Office HBO Practices Safe Mode Remote Worker Botnet Telecommuting Amazon Networking eWaste Thought Leadership Disaster Recovery Staff FENG Computer Care Bandwidth Cortana Alert Wireless Internet Document Management Camera Outlook Government Charger Hosted Computing Skype Wiring Travel Remote Work Amazon Web Services Accountants Enterprise Content Management Voice over Internet Protocol Legal Automation Tools Work/Life Balance Wi-Fi Patch Management Password Manager Nanotechnology HIPAA USB Solid State Drive Frequently Asked Questions Recovery Wireless Charging Inventory Meetings Start Menu Windows 10s Google Drive Firewall Holiday Downtime Augmented Reality Password Management Sync Multi-Factor Security Criminal MSP Millennials Digital Signature Servers Business Mangement Smart Tech Screen Mirroring Electronic Medical Records Wire Audit Physical Security Entertainment Warranty Excel Google Apps Mobile Device Employer-Employee Relationship Addiction Private Cloud Unified Threat Management Online Shopping Root Cause Analysis The Internet of Things NIST File Sharing Value Workforce Credit Cards PDF HVAC Flash Google Docs Gmail Cast Specifications Data Management Machine Learning Printer Tip of the week Workers Access Control IP Address Hard Drives Search Users Customer Service Regulation Mobile Office Quick Tips CrashOverride Domains Emergency Wireless Company Culture Windows 10 Managed Service Provider Public Speaking Presentation Managing Stress Lithium-ion battery Printers Hiring/Firing Twitter Fun Wireless Technology 5G WiFi Tech Support Safety IBM Marketing Hacker Productivity Budget Competition Customer Relationship Management Compliance