crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Nanotechnology is the Next Big Thing

One of the primary goals of technology development has long been to make technology as small as possible, while simultaneously improving its performance. The result of these efforts is the field of nanotechnology, which is now applied in a variety of uses.

What is Nanotechnology?
If you break up the word nanotechnology, the prefix nano usually indicates “one billionth,” and is derived from the Latin nanus, or “dwarf.” However, as the word “technology” is not a unit of measure, nano indicates that the subject (in this case, technology) is measured on a scale of nanometers. For reference, a strand of DNA is about two nanometers in diameter, and in the time it takes a man to lift a razor to his face to shave, his facial hair will grow about one nanometer. It is now accepted that nanotechnology specifically refers to technology that is sized between one and one hundred nanometers.

Nanotechnology operates on a different version of physics than the world as you experience it does. As a result, vast changes can result based on seemingly unrelated or insignificant stimuli.

Why This Technology Isn’t Everywhere
In 2017, Dr. George Tulevski, a researcher at IBM’s TJ Watson Research Laboratory, delivered a TED Talk on nanotechnology and the challenges it faces. According to Tulevski, nanotechnology has slowed where progress and advancement are concerned since its heyday in the 1980s.

However, Tulevski says that there is a solution to this problem that all scientific indicators point to - the use of carbon nanotubes. As Tulevski puts it, these nanoscopic tubes constructed of carbon could potentially improve computer performance by ten. However, using these tubes to create a computer chip would require the careful arrangement of billions to create a single chip.

The Potential Solution, and Other Applications
Clearly, this is a problem. Yet, by leveraging chemistry, nanoparticles can be arranged into circuits that generate a much better final product.

Of course, while computing is the application that Tulevski is focused on, there are many other technological and practical benefits that nanotechnology can grant us. From improved medicine delivery and improved fuel production to improved electronics and cleaner natural resources, nanotechnology is poised to create some truly impactful advancements in everyday life.

Can you think of any ways that nanotechnology could benefit the systems and solutions we have today? Share your thoughts in the comments, and make sure you subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Business Management Privacy Managed Service Provider Cloud Internet Microsoft Business Computing Saving Money Productivity Best Practices Workplace Tips IT Services Hackers Backup Hosted Solutions Email Malware Mobile Devices IT Support Business Small Business Software Hardware Network Communication Server Smartphones Data Upgrade Windows Business Continuity Mobile Device Management VoIP Google Virtualization Efficiency Computer Microsoft Office Disaster Recovery Mobile Office Vendor Management Miscellaneous Holiday Innovation Gadgets Social Media Outsourced IT Smartphone Android Quick Tips Passwords User Tips BYOD Mobile Computing WiFi Windows 10 Data Backup Browser Ransomware Bring Your Own Device Internet of Things Spam Best Practice Network Security Remote Monitoring The Internet of Things Apple Remote Computing Users Managed IT services Alert Data Management Wireless Technology Trending Operating System Going Green Content Filtering Firewall Artificial Intelligence History Data Recovery Information Technology Current Events Gmail App Unified Threat Management Big Data Office Analytics IT Solutions Lithium-ion Battery Save Money Printer IT Consultant Tech Support Managed IT Antivirus Saving Time Tech Term Avoiding Downtime Maintenance Hard Drives Encryption Cloud Computing Customer Relationship Management Windows 8 Router Facebook Humor Managed IT Services Phishing IT service Apps Document Management Application Applications Business Growth Virus Mobile Device Digital Payment Cybersecurity VPN Employer-Employee Relationship Fax Server Risk Management Website Customer Service Hacking Computers Outlook Health Collaboration Two-factor Authentication Phone System Marketing Excel Automation Office Tips Retail Money Computer Repair Proactive IT Running Cable Mouse Licensing Project Management Chrome Government Training Social Net Neutrality Wi-Fi PowerPoint Social Networking User Error Data Security Co-Managed IT Office 365 Compliance Tablet Password Regulations Bandwidth iPhone Presentation Infrastructure Budget Administration Inbound Marketing Paperless Office Augmented Reality Recovery Sports End of Support Analyitcs LiFi Education Redundancy Point of Sale Computing Data loss Safety Specifications Twitter Settings Cost Management Wireless Cybercrime Save Time IBM Hiring/Firing File Sharing Help Desk Wearable Technology Files Mobility Statistics Display Alerts HIPAA Tip of the week Competition Network Congestion Downtime Intranet Business Intelligence Hosted Solution Search Flexibility Internet Exlporer Virtual Desktop USB Scam Data storage Smart Technology Business Owner Vulnerability Mobile Security Hacker Robot Piracy Unified Communications Programming User Productivity Printing Star Wars IP Address Computer Accessories Managed IT Service Virtual Reality Language Travel Identity Refrigeration Google Calendar Disaster Utility Computing Monitors Break Fix Computing Infrastructure Deep Learning Company Culture SaaS BDR Google Wallet Legislation Digital Signature Memory Assessment Healthcare Writing Touchscreen Dark Web Cooperation Macro Business Technology Laptop Identity Theft Motherboard Drones Buisness IT Management Hard Drive Social Engineering Data Warehousing Documents Telephony Staff Entrepreneur Identities Networking Halloween Modem Undo Backups Software as a Service Gaming Console CIO People Network Management Cache 5G Microsoft Excel PDF Conferencing Operations Solid State Drive Scary Stories Cookies Legal Technology Tips PC Care Windows 10 Blockchain Machine Learning Value Alt Codes Technology Laws Techology Nanotechnology Domains eBay Comparison YouTube Leadership Fun Remote Support Permissions Private Cloud Streaming Media IT Technicians Word Typing New Additions Unified Threat Management Disaster Resistance Skype Software Tips Print Server Screen Reader Public Speaking Google Drive Text Messaging Black Friday Adminstration 3D Server Management Cortana How To Work Station Fraud eWaste Public Cloud Mirgation Cryptocurrency Congratulations Access Control IT Consulting LinkedIn Law Firm IT Smart Tech Google Docs Video Surveillance Cyber Monday Windows 8.1 Update Knowledge Recycling Environment Sync Storage Bitcoin SharePoint Data Breach Best Available Connectivity Samsung communications Debate Experience Troubleshooting Mobile Device Managment Migration Heating/Cooling Hacks Downloads Scheduling IT Support Bluetooth IoT Distributed Denial of Service Consumers Crowdfunding Virtual Private Network Online Currency Hotspot Chatbots Multi-Factor Security

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code