crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Nanotechnology is the Next Big Thing

One of the primary goals of technology development has long been to make technology as small as possible, while simultaneously improving its performance. The result of these efforts is the field of nanotechnology, which is now applied in a variety of uses.

What is Nanotechnology?
If you break up the word nanotechnology, the prefix nano usually indicates “one billionth,” and is derived from the Latin nanus, or “dwarf.” However, as the word “technology” is not a unit of measure, nano indicates that the subject (in this case, technology) is measured on a scale of nanometers. For reference, a strand of DNA is about two nanometers in diameter, and in the time it takes a man to lift a razor to his face to shave, his facial hair will grow about one nanometer. It is now accepted that nanotechnology specifically refers to technology that is sized between one and one hundred nanometers.

Nanotechnology operates on a different version of physics than the world as you experience it does. As a result, vast changes can result based on seemingly unrelated or insignificant stimuli.

Why This Technology Isn’t Everywhere
In 2017, Dr. George Tulevski, a researcher at IBM’s TJ Watson Research Laboratory, delivered a TED Talk on nanotechnology and the challenges it faces. According to Tulevski, nanotechnology has slowed where progress and advancement are concerned since its heyday in the 1980s.

However, Tulevski says that there is a solution to this problem that all scientific indicators point to - the use of carbon nanotubes. As Tulevski puts it, these nanoscopic tubes constructed of carbon could potentially improve computer performance by ten. However, using these tubes to create a computer chip would require the careful arrangement of billions to create a single chip.

The Potential Solution, and Other Applications
Clearly, this is a problem. Yet, by leveraging chemistry, nanoparticles can be arranged into circuits that generate a much better final product.

Of course, while computing is the application that Tulevski is focused on, there are many other technological and practical benefits that nanotechnology can grant us. From improved medicine delivery and improved fuel production to improved electronics and cleaner natural resources, nanotechnology is poised to create some truly impactful advancements in everyday life.

Can you think of any ways that nanotechnology could benefit the systems and solutions we have today? Share your thoughts in the comments, and make sure you subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 17 August 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Microsoft Best Practices Business Computing Saving Money Productivity IT Services Workplace Tips Hackers Hosted Solutions Backup Malware Email Software Mobile Devices Business IT Support Small Business Data Hardware Network Communication Server Smartphones Upgrade VoIP Computer Windows Business Continuity Google Efficiency Mobile Device Management Virtualization Microsoft Office Disaster Recovery Innovation Vendor Management Miscellaneous Mobile Office Gadgets Social Media Holiday Tech Term Outsourced IT Quick Tips Passwords BYOD Data Backup User Tips Mobile Computing Network Security Android Smartphone Windows 10 Internet of Things Managed IT services Browser WiFi Bring Your Own Device Best Practice The Internet of Things Remote Monitoring Ransomware Spam Data Recovery Alert Users Data Management Trending Wireless Technology Operating System Apple Remote Computing Firewall Unified Threat Management Save Money Content Filtering Going Green Artificial Intelligence History Gmail Managed IT App Big Data Office Analytics Customer Relationship Management IT Solutions Lithium-ion Battery Facebook IT Consultant Encryption Router Printer Tech Support Information Technology Current Events Avoiding Downtime Employer-Employee Relationship Productivity Applications IT Support Maintenance Hard Drives Collaboration Two-factor Authentication Windows 8 Antivirus Document Management Cloud Computing Humor Saving Time Paperless Office Application Virus Website Customer Service Hacking Computers Fax Server Managed IT Services Phone System Outlook Health Compliance Automation Marketing Cybersecurity Excel Office Tips Retail Phishing Bandwidth IT service Digital Payment Mobile Device Chrome Business Growth VPN Wi-Fi Risk Management Apps Unified Communications Training Infrastructure Tablet Office 365 Password iPhone User Error Co-Managed IT Managed Service Administration Government Presentation Augmented Reality Budget Project Management Proactive IT Computer Repair Regulations Inbound Marketing Mouse Recovery Money Net Neutrality Running Cable Social Licensing Data Security File Sharing PowerPoint Social Networking Hiring/Firing Printing Display Alerts End of Support LiFi Computing Help Desk Statistics Intranet Competition Business Intelligence Network Congestion Vulnerability Recycling Data loss Blockchain eWaste Downtime HIPAA BDR Search USB Piracy Redundancy Virtual Desktop Business Owner Sports Files Hacker Internet Exlporer Scam User Point of Sale Programming Storage Mobility Smart Technology Company Culture Analyitcs Twitter Mobile Security Education Safety Specifications IoT IBM Settings Flexibility Hosted Solution Cost Management Wireless Data storage Save Time Tip of the week Cybercrime Wearable Technology Robot High-Speed Internet Server Management Computing Infrastructure Halloween Techology Entrepreneur Undo OneNote Macro PC Care Mobile Device Managment Legislation Dark Web 5G PDF Value People Healthcare Development eBay Cooperation Scary Stories Virtual Reality Disaster Resistance Employee-Employer Relationship Remote Support Motherboard Leadership New Additions Data Warehousing Monitors Skype Streaming Media Hard Drive Print Server Cables Gaming Console Text Messaging Patch Management Staff SaaS IT Consulting Deep Learning Domains Google Wallet Remote Workers Work Station Modem G Suite Software as a Service Congratulations Microsoft Excel Fun Writing LinkedIn Cache Law Firm IT Wires Video Surveillance Operations Chromebook Data Breach Word Public Speaking Drones Windows 8.1 Update Cookies Travel Technology Tips Cortana Social Engineering Best Available Buisness Management Virtual Private Network Technology Laws Identities Backups Nanotechnology Comparison Adminstration How To Permissions Knowledge Environment CIO Enterprise Resource Planning Bluetooth MSP 3D IT Technicians Telephony Unified Threat Management Solid State Drive Legal Online Currency Samsung Screen Reader Identity Theft Black Friday Mobile Assessment Fraud Experience Troubleshooting Debate Proactive Computer Accessories Mirgation Access Control Heating/Cooling Alt Codes Cyber Monday Consumers Crowdfunding Smart Tech Managing Stress IT Management YouTube Typing Remote Monitoring and Management Business Technology Machine Learning SharePoint IP Address Google Drive Connectivity Scheduling Enterprise Content Management Network Management How To Refrigeration Cryptocurrency Disaster WPA3 Touchscreen Networking Migration Private Cloud Downloads Distributed Denial of Service Google Docs Vulnerabilities Windows 10 Hotspot Bitcoin Digital Signature Fleet Tracking Chatbots Public Cloud Multi-Factor Security Software Tips Managed IT Service Memory Star Wars Geography Language Laptop communications Hacks Asset Tracking Identity Sync Google Calendar Break Fix Documents Conferencing Utility Computing

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code