crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Nanotechnology is the Next Big Thing

One of the primary goals of technology development has long been to make technology as small as possible, while simultaneously improving its performance. The result of these efforts is the field of nanotechnology, which is now applied in a variety of uses.

What is Nanotechnology?
If you break up the word nanotechnology, the prefix nano usually indicates “one billionth,” and is derived from the Latin nanus, or “dwarf.” However, as the word “technology” is not a unit of measure, nano indicates that the subject (in this case, technology) is measured on a scale of nanometers. For reference, a strand of DNA is about two nanometers in diameter, and in the time it takes a man to lift a razor to his face to shave, his facial hair will grow about one nanometer. It is now accepted that nanotechnology specifically refers to technology that is sized between one and one hundred nanometers.

Nanotechnology operates on a different version of physics than the world as you experience it does. As a result, vast changes can result based on seemingly unrelated or insignificant stimuli.

Why This Technology Isn’t Everywhere
In 2017, Dr. George Tulevski, a researcher at IBM’s TJ Watson Research Laboratory, delivered a TED Talk on nanotechnology and the challenges it faces. According to Tulevski, nanotechnology has slowed where progress and advancement are concerned since its heyday in the 1980s.

However, Tulevski says that there is a solution to this problem that all scientific indicators point to - the use of carbon nanotubes. As Tulevski puts it, these nanoscopic tubes constructed of carbon could potentially improve computer performance by ten. However, using these tubes to create a computer chip would require the careful arrangement of billions to create a single chip.

The Potential Solution, and Other Applications
Clearly, this is a problem. Yet, by leveraging chemistry, nanoparticles can be arranged into circuits that generate a much better final product.

Of course, while computing is the application that Tulevski is focused on, there are many other technological and practical benefits that nanotechnology can grant us. From improved medicine delivery and improved fuel production to improved electronics and cleaner natural resources, nanotechnology is poised to create some truly impactful advancements in everyday life.

Can you think of any ways that nanotechnology could benefit the systems and solutions we have today? Share your thoughts in the comments, and make sure you subscribe to our blog!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 22 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Microsoft Business Computing Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Business Software Mobile Devices Data IT Support Network Hardware Small Business Communication Server Smartphones VoIP Computer Upgrade Efficiency Business Continuity Google Windows Disaster Recovery Mobile Device Management Innovation Microsoft Office Virtualization Miscellaneous Data Backup Tech Term Mobile Office Outsourced IT Vendor Management Social Media Holiday Gadgets User Tips Network Security Quick Tips Passwords BYOD Mobile Computing Browser Smartphone Android Managed IT services WiFi Bring Your Own Device Windows 10 Productivity Internet of Things Best Practice The Internet of Things Ransomware Remote Monitoring Spam Data Recovery Users Save Money Trending Operating System Wireless Technology Apple Remote Computing Artificial Intelligence Alert Data Management Firewall Encryption Customer Relationship Management Unified Threat Management Gmail Content Filtering History Going Green Office Collaboration App Analytics IT Solutions Lithium-ion Battery Facebook IT Consultant Router Cloud Computing Managed IT Printer Tech Support Big Data Information Technology Current Events IT Support Maintenance Hard Drives Phishing Windows 8 Paperless Office Antivirus Document Management Humor Employer-Employee Relationship Mobile Device Website Saving Time Applications Avoiding Downtime Two-factor Authentication Managed IT Services Fax Server Compliance Automation Phone System Outlook Office Tips Health Retail Bandwidth Project Management Cybersecurity IT service Marketing Chrome Excel Business Growth Wi-Fi Digital Payment Customer Service Hacking Computers VPN Risk Management Apps Application Government Virus Help Desk iPhone Managed Service Budget User Error Co-Managed IT Administration Regulations Files Recovery Augmented Reality Money Running Cable Licensing Proactive IT Computer Repair Point of Sale Mouse Inbound Marketing Unified Communications Net Neutrality Data Security Social File Sharing Office 365 PowerPoint Healthcare Social Networking Password Infrastructure Tablet Training Presentation Search Information Blockchain Intranet Virtual Desktop USB Vulnerability HIPAA Business Intelligence Business Owner Data loss Recycling BDR Hacker User Programming Redundancy Analyitcs Piracy Education Machine Learning Internet Exlporer Storage Safety Specifications Flexibility Smart Technology Sports Hosted Solution Settings Mobile Security Cost Management Mobility Wireless Data storage Cybercrime Save Time IoT Scam Company Culture Twitter Robot Hiring/Firing Windows 10 Printing IBM End of Support LiFi Tip of the week Computing Statistics Wearable Technology Conferencing Competition Display Alerts Network Congestion eWaste Downtime Remote Workers Print Server Environment CIO Text Messaging Cookies Favorites Knowledge Technology Tips Politics Solid State Drive Work Station Management Congratulations Samsung Gaming Console Meetings LinkedIn Legal Technology Laws Law Firm IT Troubleshooting Video Surveillance Debate Monitoring Nanotechnology Instant Messaging Experience Comparison Telephony Permissions Windows 8.1 Update Heating/Cooling Alt Codes Virtual Private Network Enterprise Resource Planning Crowdfunding MSP IT Technicians Best Available Unified Threat Management Consumers YouTube How To Screen Reader Black Friday Mobile Fraud Typing Proactive Identity Theft Mirgation Consulting IP Address Google Drive Access Control Cyber Monday Bluetooth Assessment Smart Tech How To Managing Stress Adminstration Online Currency Refrigeration Cryptocurrency Disaster Remote Monitoring and Management 3D Managed Services Provider Google Docs SharePoint Computer Accessories IT Management Connectivity Business Technology Enterprise Content Management Private Cloud Bitcoin Digital Signature Memory WPA3 Migration E-Commerce Downloads Laptop Distributed Denial of Service communications Network Management Vulnerabilities Public Cloud Hotspot Hacks Networking Documents Fleet Tracking Chatbots Features Multi-Factor Security Halloween Managed IT Service Entrepreneur Touchscreen Star Wars Scheduling Geography Sync Language Undo PDF People Asset Tracking Software Tips Identity Electronic Health Records 5G Google Calendar Scary Stories Virtual Reality Break Fix Utility Computing High-Speed Internet Mobile Device Managment Computing Infrastructure Techology OneNote Cyberattacks Monitors Legislation SaaS Dark Web Deep Learning Server Management Development Cooperation Domains Google Wallet Disaster Resistance Employee-Employer Relationship Motherboard Read Only Fun Writing Chromebook Data Warehousing Word PC Care Hard Drive Cables G Suite Staff Public Speaking Drones IT Consulting Value Buisness eBay Modem Bookmarks Macro Cortana Social Engineering Software as a Service Microsoft Excel Identities Remote Support Leadership Patch Management Cache New Additions Wires Travel Operations Skype Backups Data Breach Streaming Media

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...