Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Basic Economics Is Slowing Down Moore’s Law

b2ap3_thumbnail_transistor_moores_law_400.jpgIn 1965, the technological landscape was much different from what we see now. The idea of having a small computer in your pocket in the form of a smartphone was but a distant dream. Now, it’s commonplace for all but the youngest of children to have a smartphone. How is this possible? Well, it’s all thanks to Moore’s law, which has led the development of new technology for the past 50 years.

Moore’s law is a series of observations made by the co-founder of Intel, Gordon Moore, that were published in Electronics Magazine in 1965. The concept behind Moore’s law is that the number of processors via a given die area would double every two years, effectively doubling the power output of a machine. This, naturally, leads to incredibly powerful technology that’s faster and more responsive than previous models.

As you can see by simply looking out your front door, we live in a technology-laden society. There are cars that drive themselves, and security systems that can receive commands from a homeowner's smartphone. Some argue that technology has finally caught up with Moore’s law, claiming that technology manufacturing can no longer keep up with the rate at which processors are growing. As reported by ComputerWorld:

Conventional computers could be replaced by quantum computers and systems with brain-like, or neural chips, which function differently than current processors. Silicon could also be replaced by chips made using new materials, such as graphene or carbon nanotubes.

When you think about it, this makes sense. The physical limitations of a piece of hardware can be difficult to work around. Chips can only get so small before other materials or resources must be considered. Despite these continuous roadblocks, Intel challenges Moore’s law at every turn, always pushing toward new and improved technology that revolutionizes the world. This, in turn, helps make technology cheaper for both businesses and consumers.

From an economical standpoint, however, it’s growing more difficult to justify building new, specialized factories dedicated toward producing new, smaller chips. This is due to the overall decrease in the return-on-investment that comes from driving consumer costs down. Yet, despite these shortcomings, researchers are dedicated toward finding new materials that make chips smaller and more efficient, in order to keep Moore’s law going strong.

Moore’s law is surrounded by the legacy it has achieved over the past 50 years, continuously urging the human race to expand and move beyond the limitations of technology. Even if Moore’s law is indeed limited in scope, it continues to inspire people to innovate and come up with new solutions.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 03 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade Business Management VoIP Smartphones AI Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Information Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Managed Service Provider Remote Work Server Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking Managed Services Voice over Internet Protocol App Employer-Employee Relationship BYOD Office 365 Conferencing WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Help Desk Office Tips Analytics Augmented Reality Retail 2FA Storage Password Bring Your Own Device Managed IT Services Big Data Healthcare Operating System Computers Router Virtual Private Network Risk Management Website Health Monitoring Firewall Document Management Windows 11 Telephone The Internet of Things Scam Data loss Excel Social Cooperation Remote Workers Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Customer Service Cybercrime Project Management Windows 7 Physical Security Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Employees Integration Word Smart Technology Outlook Machine Learning Money Saving Time Humor Holidays Managed IT Service Maintenance Data Storage Safety Antivirus Sports Downloads Supply Chain Mouse Video Conferencing Licensing Managed Services Provider Virtual Machines Professional Services Entertainment Administration Telephone System Robot iPhone Customer Relationship Management Cost Management Settings Printing Wireless Vulnerabilities Content Filtering Data Privacy Hacking IT Management Presentation VPN Images 101 YouTube Meetings Cryptocurrency Multi-Factor Authentication Mobility Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Data storage LiFi Hard Drives Windows 8 Laptop Websites Mirgation Trend Micro Security Cameras Workplace Strategies Meta Domains Drones Nanotechnology Software as a Service Electronic Medical Records Language Managing Costs Amazon SharePoint Addiction Refrigeration Management Halloween Chatbots eCommerce SSID Virtual Assistant Outsource IT Public Speaking Lenovo Screen Reader Surveillance Writing Distributed Denial of Service Service Level Agreement Virtual Reality Computing Infrastructure Virtual Machine Environment Media Lithium-ion battery Hacks Server Management Reviews Entrepreneur Scary Stories Private Cloud Identity Medical IT Fun Transportation Small Businesses Superfish Bookmark Identity Theft Smart Tech Development Deep Learning Download Twitter Alerts Hypervisor Displays Undo Shopping Error Optimization PowerPoint Social Engineering Break Fix Employer/Employee Relationships Outsourcing Browsers Education Connectivity Upload PCI DSS Remote Computing Navigation Mobile Computing Social Network Gig Economy Multi-Factor Security Workplace Search Dark Web Teamwork Hiring/Firing Tablet IoT Internet Service Provider Application Best Practice Trends Regulations Compliance Alert Evernote Paperless Managed IT Customer Resource management Buisness File Sharing Regulations Memes Dark Data Google Calendar Co-managed IT How To Microsoft Excel SQL Server Technology Care IBM Legal Data Analysis IT solutions Star Wars Net Neutrality Business Growth Gamification Financial Data Notifications Staff History Business Communications Smartwatch Travel Social Networking IT Legislation Scams Cortana Azure Hybrid Work Techology Fileless Malware Google Maps Procurement Alt Codes Content Telework Wearable Technology Cyber security Tech Human Resources Competition Health IT CES Downtime Unified Threat Management Motherboard Communitications Comparison Cables Supply Chain Management Permissions Unified Threat Management Directions Hosted Solution Assessment Typing FinTech Term Google Apps IT Maintenance IT Assessment Network Congestion Specifications Flexibility Knowledge Fraud Value Business Intelligence Google Drive User Error Microchip User Internet Exlporer Username Organization Shortcuts Ransmoware Digital Security Cameras Point of Sale Smart Devices 5G Black Friday Remote Working Experience Memory Vendors IP Address Google Docs Unified Communications Database Bitcoin Network Management Running Cable Tech Support IT Technicians Data Breach Google Play Be Proactive Workforce Google Wallet Proxy Server Videos Cookies Electronic Health Records Monitors Cyber Monday Hotspot Wasting Time Threats Recovery Tactics

Blog Archive