(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from NTConnections.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Productivity Hosted Solutions Internet Malware Backup Google Mobile Devices Efficiency VoIP Business IT Support Network Security IT Services Email Managed Service Provider Miscellaneous Innovation Server Data Workplace Tips Network Upgrade Disaster Recovery Business Continuity Software Windows Business Management Communication Computer Managed IT Services Saving Money Hardware Browser Smartphone Virtualization Save Money Android Mobile Device Management Smartphones communications User Tips Data Backup Outsourced IT Cybercrime Holiday Microsoft Office WiFi Computers Internet of Things Windows 10 BYOD Data Recovery Social Media Remote Monitoring Operating System Mobile Computing Cloud Computing Hacking Chrome Big Data Small Business Ransomware Proactive IT Avoiding Downtime Collaboration VPN Managed IT Services IT Solutions Application Alert Automation Apple Information Technology Social Engineering Office BDR Employer-Employee Relationship Budget Passwords Marketing The Internet of Things Quick Tips Tech Term Recovery Bandwidth Telephone Systems Artificial Intelligence Health Managed IT Mobility Bring Your Own Device Going Green Remote Computing spam Cybersecurity Gadgets Router Compliance App Gmail How To Vulnerability Wireless Technology Data Security User Error Private Cloud IT Support Redundancy Website Document Management Data Protection Office 365 Money Two-factor Authentication Vendor Management Save Time Business Intelligence Firewall iPhone Retail Memory Search Office Tips Analytics Facebook Networking Lithium-ion battery Phishing Identity Theft Mouse Law Enforcement Apps PowerPoint Productivity Excel Phone System Windows 10 Content Filtering Risk Management Data Management Word Downtime Connectivity History Tablet Entertainment Antivirus Value Servers Mobile Office YouTube Maintenance USB Hard Drives Smart Tech Customer Relationship Management IT Plan Data loss CES Best Available Public Cloud Unsupported Software People Content Management Update Programming DDoS Intranet Physical Security Network Congestion Trending Robot Education HIPAA Environment Google Drive Human Resources SaaS Humor Credit Cards Statistics Training Safety IT Consultant Solid State Drive Government Cleaning Applications Meetings Outlook HaaS Infrastructure Saving Time Fax Server Analysis Black Market Workers Data Storage Flexibility Online Currency Business Owner Comparison OneNote Administration Windows 7 Streaming Media Internet Exlporer Printer Data storage Encryption Running Cable Biometrics Mobile Device Sports Work/Life Balance Skype Unified Threat Management IT Management Current Events eWaste Root Cause Analysis Notifications Managing Stress Wireless Charging Criminal Content Filter Machine Learning Patch Management LinkedIn Computer Repair Advertising Virus Workforce Reputation Net Neutrality Wearable Technology Flash Social Fiber-Optic Software as a Service NarrowBand Debate Storage HVAC Scam Insurance Computer Accessories Telecommuting Customers Sync Best Practice Charger Social Networking Cables Chromecast Addiction Video Surveillance Analyitcs Hybrid Cloud Practices Cameras Remote Work Software Tips Touchscreen Telephony Computer Care Consultant Unified Communications Blockchain Google Docs Laptop Settings Cache Distributed Denial of Service PDF Hosted Computing Printer Server Spam Blocking Start Menu Virtual Desktop Theft Staff Worker Commute Voice over Internet Protocol Touchpad Piracy Audit IT service Wireless Internet Keyboard Virtual Reality Inventory Relocation HBO Mobile Uninterrupted Power Supply User Cortana Digital Signature Multi-Factor Security Licensing Screen Mirroring Domains Wire IaaS Samsung Bloatware Access Control Fraud Computer Fan Frequently Asked Questions Google Apps Twitter Professional Services Customer Service Files Strategy Lifestyle Cast Smart Office FENG Tip of the week Crowdfunding Entrepreneur Password Authentication Amazon Tools Tech Support Wi-Fi Hacker Colocation Company Culture Paperless Office Windows Server 2008 Electronic Medical Records Windows 8.1 Update Cost Management Nanotechnology Amazon Web Services Password Manager Shadow IT Students Hosted Solution Science Computing Infrastructure Accountants Windows Media Player Wireless Instant Messaging Legal Online Shopping Business Mangement Botnet Shortcut Healthcare Windows 8 End of Support Specifications Hiring/Firing Data Warehousing SharePoint Regulations Devices WIndows 7 Evernote Recycling Travel Thought Leadership Print Server Bluetooth Electronic Health Records Tablets Internet exploMicrosoft IoT Millennials Monitor Worker Supercomputer Content Users IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Smart Technology Windows 10s Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Books Emails CrashOverride IBM Emergency Webinar