Contact Us Today! 800-626-8277

One World Technology Inc. Blog

One World Technology Inc. has been serving the Medina area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from One World Technology Inc..

These 3 Industries are Being Fundamentally Changed...
Tech Term: Bandwidth
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Privacy Best Practices Cloud Technology Network Security Business Computing Managed IT Services Hackers Backup Hosted Solutions Malware Software Outsourced IT Microsoft Google VoIP Business Business Continuity Email Data Disaster Recovery Data Backup IT Support Windows 10 Cloud Computing Efficiency Saving Money Smartphones Android Cybercrime Ransomware Mobile Devices Internet Communications Innovation Productivity Hardware IT Services Browser Data Recovery Small Business Alert Internet of Things Business Management Computer Office Computers Server Managed IT BDR Smartphone Virtualization Tech Term Law Enforcement Cybersecurity User Tips Productivity Passwords Communication Mobility Collaboration Chrome Work/Life Balance Artificial Intelligence How To Telephone Systems Health Managed IT Services Avoiding Downtime Wi-Fi Save Money Flexibility Holiday Hacking Office Tips Data Security Windows Mobile Device Management App Quick Tips Router Social Engineering Money Remote Monitoring Data Protection Password Facebook Firewall Business Intelligence Phishing Office 365 Budget Private Cloud Social Media Document Management Miscellaneous Bring Your Own Device HaaS Spam Connectivity Vulnerability Identity Theft Proactive IT Word Apps Information Technology Two-factor Authentication Network Data Breach Redundancy Applications Bandwidth Gadgets Value BYOD Mobile Device Upgrade Recovery Compliance Automation Big Data SaaS Spam Blocking Keyboard Two Factor Authentication IT Plan Training Operating System Website VPN Unsupported Software Save Time Windows 7 Computing Infrastructure Black Market Entertainment PDF Electronic Medical Records Marketing Workers Charger Remote Computing CES Google Drive Government Patch Management Content Management USB Data loss Hiring/Firing History Scam Credit Cards Automobile Solid State Drive Workplace Tips End of Support Risk Management Battery Cleaning Smart Tech Data Management Computer Care Infrastructure Data Storage Employer-Employee Relationship Microsoft Office Legal HIPAA Managed Service Provider Comparison Windows 10 Update Content Filtering Worker OneNote Public Cloud IT Management Business Owner Wireless Technology Access Control Wireless Charging Content Start Menu Google Docs Shadow IT Supercomputer Hybrid Cloud Humor Recycling Analysis Books Workforce IT Support Windows Server 2008 Wireless Internet Colocation Authentication Fiber-Optic Audiobook Mobile Experience Root Cause Analysis eWaste Telecommuting Vendor Management Wire Video Games Assessment Nanotechnology Cables Windows 10s Professional Services Music Voice over Internet Protocol Current Events Criminal Accountants Emergency Software Tips Remote Work Regulations Sports Television hacker Unified Communications Tools Wearable Technology Meetings Multi-Factor Security Knowledge Devices Smart Office Files Physical Security Hard Drives Scalability Public Computer Internet Exlporer Theft Audit Trending Network Congestion Thought Leadership Paperless Office IoT Emails Servers Unified Threat Management Botnet Downtime Cortana Blockchain Troubleshooting Screen Mirroring Lifestyle Employer Employee Relationship Streaming Media User Error Transportation HBO Fraud Flash Computer Fan Travel Instant Messaging Internet exploMicrosoft Google Apps Politics Human Resources Cast Mobile Computing Education Leadership Computer Accessories Content Filter Apple Insurance Benefits Amazon The Internet of Things Safety Staff Hosted Solution Outlook Wireless Bluetooth Storage iPhone Samsung Practices Smart Technology Amazon Web Services Netflix Sync FENG Software as a Service Search Advertising Password Manager Digital Signature Virtual Reality Frequently Asked Questions Techology Machine Learning Hosted Computing Online Shopping Settings Telephony Best Practice How to Networking Relocation Business Mangement Encryption Users Data Warehousing Specifications Worker Commute webinar Excel Addiction Loyalty YouTube Inventory Evernote Skype IBM Gmail Strategy Millennials Conferencing Tip of the week Rootkit Cache Company Culture CrashOverride Managing Stress HVAC Students Webinar Robot Healthcare IT solutions Electronic Health Records Twitter WiFi

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *