Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Basic Economics Is Slowing Down Moore’s Law

b2ap3_thumbnail_transistor_moores_law_400.jpgIn 1965, the technological landscape was much different from what we see now. The idea of having a small computer in your pocket in the form of a smartphone was but a distant dream. Now, it’s commonplace for all but the youngest of children to have a smartphone. How is this possible? Well, it’s all thanks to Moore’s law, which has led the development of new technology for the past 50 years.

Moore’s law is a series of observations made by the co-founder of Intel, Gordon Moore, that were published in Electronics Magazine in 1965. The concept behind Moore’s law is that the number of processors via a given die area would double every two years, effectively doubling the power output of a machine. This, naturally, leads to incredibly powerful technology that’s faster and more responsive than previous models.

As you can see by simply looking out your front door, we live in a technology-laden society. There are cars that drive themselves, and security systems that can receive commands from a homeowner's smartphone. Some argue that technology has finally caught up with Moore’s law, claiming that technology manufacturing can no longer keep up with the rate at which processors are growing. As reported by ComputerWorld:

Conventional computers could be replaced by quantum computers and systems with brain-like, or neural chips, which function differently than current processors. Silicon could also be replaced by chips made using new materials, such as graphene or carbon nanotubes.

When you think about it, this makes sense. The physical limitations of a piece of hardware can be difficult to work around. Chips can only get so small before other materials or resources must be considered. Despite these continuous roadblocks, Intel challenges Moore’s law at every turn, always pushing toward new and improved technology that revolutionizes the world. This, in turn, helps make technology cheaper for both businesses and consumers.

From an economical standpoint, however, it’s growing more difficult to justify building new, specialized factories dedicated toward producing new, smaller chips. This is due to the overall decrease in the return-on-investment that comes from driving consumer costs down. Yet, despite these shortcomings, researchers are dedicated toward finding new materials that make chips smaller and more efficient, in order to keep Moore’s law going strong.

Moore’s law is surrounded by the legacy it has achieved over the past 50 years, continuously urging the human race to expand and move beyond the limitations of technology. Even if Moore’s law is indeed limited in scope, it continues to inspire people to innovate and come up with new solutions.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 17 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Passwords Saving Money Managed Service Cybersecurity Communication Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Facebook Information Miscellaneous Training Covid-19 Gadgets Cloud Computing Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Computing Information Technology Hacker Access Control Conferencing Avoiding Downtime Office 365 Marketing How To BDR HIPAA Applications 2FA Help Desk Virtual Private Network Risk Management Computers Health Analytics Website Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Router Operating System Windows 11 Physical Security Monitoring Customer Service Display Printer Excel Paperless Office Infrastructure Remote Workers Telephone Document Management Cooperation Free Resource Firewall Project Management Windows 7 Scam Data loss Microsoft 365 The Internet of Things Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime VPN Holidays YouTube Meetings Data Storage Cryptocurrency Smart Technology Supply Chain Hacking Video Conferencing Presentation Computer Repair Managed Services Provider Professional Services Saving Time Virtual Machines Virtual Desktop LiFi Wireless Technology Data storage Managed IT Service Outlook Machine Learning Downloads iPhone Money Licensing Word Humor Vulnerabilities Entertainment Maintenance Data Privacy Antivirus Sports Images 101 Mouse Telephone System Safety Multi-Factor Authentication Mobility Administration Cost Management Robot Employees Integration Settings Wireless User Tip Printing Modem Mobile Security Content Filtering Processor IT Management Customer Relationship Management Cyber Monday Medical IT Network Congestion Proxy Server Reviews Cookies Tactics Development Competition Hotspot Transportation Small Businesses Knowledge Google Drive User Error Mirgation Hypervisor Displays PowerPoint 5G Shopping Nanotechnology Optimization Point of Sale Addiction Unified Communications Language Employer/Employee Relationships Outsourcing Experience Google Docs Management PCI DSS Bitcoin Network Management Chatbots Running Cable Tech Support User Navigation Distributed Denial of Service Workplace Monitors Gig Economy Google Wallet Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Regulations Compliance Windows 8 IP Address Identity Laptop Websites Evernote Paperless Co-managed IT Bookmark Drones Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care Electronic Medical Records SharePoint Financial Data History Halloween Recovery Business Communications Hard Drives Break Fix Scams Writing Browsers Smartwatch Lenovo Connectivity IT Upload Procurement Domains Azure Hybrid Work Virtual Reality Social Network Telework Hacks Server Management Cyber security Scary Stories Private Cloud Multi-Factor Security Tech Human Resources Refrigeration Dark Web Cables Fun CES Superfish IoT Communitications Identity Theft Trends Supply Chain Management Deep Learning Public Speaking Twitter Customer Resource management FinTech Lithium-ion battery Regulations Error Google Calendar Term Google Apps Microsoft Excel IT Maintenance Social Engineering Entrepreneur Data Analysis Star Wars IT Assessment Education Gamification Flexibility Staff Value Business Intelligence Remote Computing Organization Mobile Computing Social Networking Legislation Shortcuts Tablet Undo Ransmoware Search Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Best Practice Wearable Technology Memory Vendors Alert Dark Data Health IT Managed IT Motherboard Data Breach Buisness File Sharing Comparison Google Play Be Proactive IT solutions Permissions Workforce How To Directions Videos Legal Assessment Electronic Health Records Business Growth Wasting Time Threats Notifications Trend Micro Travel Application Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Google Maps Fraud Meta Cortana Microchip Techology Username Alt Codes IBM Managing Costs Amazon Black Friday SSID eCommerce Downtime Unified Threat Management Database Surveillance Hosted Solution Virtual Assistant Outsource IT Unified Threat Management Typing IT Technicians Virtual Machine Environment Media

Blog Archive