Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

Nanotechnology is the smallest “technology” yet. At its core, it’s a manipulation of the smallest elements of matter, measured in nanometers. Consider that your fingernails grow at about a rate of a nanometer per second, or that a single molecule of water is about a quarter of a nanometer across, and it will give you an idea just how small a nanometer is. It is quite literally one-billionth of a meter.

That’s really the start. Nanotechnology deals with anything in that arena that measures between 1 and 100 nanometers, and largely consists of the engineering of structures that function inside or alongside nature’s nanomachine, cells.

How Is This Technology?
It really is a true combination of science, engineering, and technology. To answer the question, engineers are currently at work attempting to create smaller, more powerful microprocessors that could be used to adjust the practical uses of every material of the physical world. You could make structures stronger, cure disease, and alter matter at the subatomic level. If that’s not technology, I don’t know what is.

When semiconductor manufacturers create the latest and greatest processors or microprocessors for use in a myriad of devices, they measure their nodes in nanometers. Today, these manufacturers are working on the five nanometer chip--a feat thought impossible by many - until IBM announced they had developed one. If DNA is only two nanometers across, we may only be a short time until machines will fit everywhere.

Why Don’t People Know About It?
Nanotechnology is in its relative infancy. In 2017, Dr. George Tulevski of IBM spoke to the challenges the field faces going forward. His perspective was that nanotechnology development and research actually has slowed since the 1980s. In the same TED Talk, he opined that the use of carbon nanotubes could potentially improve computing tenfold, but the development of this technology is just in its early stages.

Is This Technology a Good Thing?
With people today only having a limited understanding of the technology, there aren’t a lot of trustworthy opinions on the issue. Intellectia even seem hedged about the applications of nanotechnology. On one hand, theoretically it could do more than any other technology to help the human race. On the other, any technology made from wonder, and with benevolent intentions, can also be manufactured for malevolent use. Like with other contemporary technologies such as artificial intelligence, researchers will have to move slowly and not let potential profits influence their release of products involving nanotechnology.

Do you consider nanotechnology to be interesting? Would you like to see how far this rabbit hole goes, or should we as a people leave well enough alone? Leave your thoughts in our comments section below, and return to read more great technology blogs from Professional Computer Associates.

These 3 Industries are Being Fundamentally Changed...
Tech Term: Bandwidth


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, June 21 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Hackers Network Security Business Computing Backup Hosted Solutions Managed IT Services Malware Google Microsoft Disaster Recovery VoIP Software Email Business Continuity Business Internet Mobile Devices Productivity Outsourced IT Data Innovation Cybercrime Windows 10 communications Computer Ransomware Data Backup Smartphones Efficiency IT Support Android Hardware IT Services Browser Office Cloud Computing Internet of Things Data Recovery Saving Money Computers Server Telephone Systems Business Management Alert Windows Virtualization Small Business Smartphone BDR Upgrade User Tips Mobile Device Management Collaboration Law Enforcement Network Managed IT Cybersecurity Tech Term Chrome Workplace Tips Quick Tips BYOD Social Engineering Money Microsoft Office Artificial Intelligence Save Money How To Holiday Office 365 Recovery Social Media Miscellaneous Mobility Passwords Private Cloud Work/Life Balance App Firewall Avoiding Downtime Hacking Productivity Bandwidth Office Tips Managed Service Provider Communication Facebook Proactive IT Data Protection Operating System Budget Phishing Gmail Password Data Security HaaS Automation Flexibility Information Technology Wi-Fi Health Redundancy Router Business Intelligence Data Management VPN Bring Your Own Device Two-factor Authentication Remote Monitoring SaaS Value Spam Document Management Safety User Error Marketing Connectivity Entertainment Vulnerability Apps Managed IT Services Compliance Gadgets Mobile Device Identity Theft Black Market Risk Management Data Breach Applications Windows 10 Employer-Employee Relationship Google Drive Big Data Cleaning Word Unsupported Software Wireless Best Practice Servers Apple Data storage Samsung Shadow IT Government Comparison Infrastructure Patch Management Business Owner eWaste End of Support Internet Exlporer Keyboard YouTube Scam Analysis Spam Blocking Settings Data loss Streaming Media The Internet of Things Save Time Sports Update Worker Automobile Encryption Public Cloud Remote Computing USB Wireless Technology Wearable Technology Legal Website Data Storage Battery Workers CES Smart Tech Training PDF Education Computing Infrastructure Content Management Physical Security Mobile Computing Content Filtering Windows 7 Credit Cards Charger DDoS IT Management Electronic Medical Records Downtime OneNote Solid State Drive IT Plan Hiring/Firing History Meetings Computer Care HIPAA Instant Messaging Leadership Relocation Cache Supercomputer Google Apps Emergency Amazon Web Services Digital Signature Employer Employee Relationship Worker Commute Netflix HVAC Laptop Access Control Travel Root Cause Analysis Software Tips Search Mouse Wireless Internet Current Events IaaS Online Shopping Strategy Computer Accessories Flash Touchpad Outlook Authentication How to webinar Wire Specifications Password Manager Evernote Bluetooth Sync Lithium-ion battery Environment Internet exploMicrosoft Humor Nanotechnology Loyalty Software as a Service Experience Techology Running Cable HBO Conferencing iPhone Smart Office Millennials Business Mangement Transportation Accountants Telephony Windows 10s Advertising Monitor Music Screen Mirroring Benefits Frequently Asked Questions IT Support SharePoint Paperless Office NarrowBand Workforce Recycling Skype Reputation Devices Assessment Google Docs Wireless Charging Cast Smart Technology Excel Files Students Telecommuting Criminal People IoT Rootkit Start Menu Notifications Audit Hybrid Cloud Fax Server Customer Thought Leadership Television Fiber-Optic Troubleshooting Tip of the week Colocation Healthcare Chromecast Remote Work Mobile Office Mobile Content Computer Fan Knowledge IT solutions Content Filter Public Computer Voice over Internet Protocol Cables Hosted Solution Two Factor Authentication Windows Server 2008 Electronic Health Records Insurance Vendor Management Uninterrupted Power Supply Professional Services Audiobook FENG Network Congestion Storage Multi-Factor Security Unified Communications Data Warehousing Emails hacker Machine Learning Blockchain Practices Tools Politics Hard Drives Antivirus Video Games Networking Trending Theft Human Resources Regulations Users Fraud Hosted Computing Unified Threat Management Scalability Distributed Denial of Service IT Consultant WiFi Addiction IBM Lifestyle Cortana Books Staff Virtual Reality Going Green Amazon Robot Inventory Tech Support Botnet Thank You Congratulations Twitter Webinar Administration Company Culture IT solutions Managing Stress CrashOverride

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!