Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Nanotechnology Holds the Key to Doubling Computing Power

b2ap3_thumbnail_ibm_processor_400.jpgEarly in July, IBM announced that they have developed an ultra-dense computer chip that has roughly four times the computing capacity of today’s most powerful chips. These prototype chips, and ones they will develop to fuel computing into the next decade and beyond, are the result of the evolution of 21st century informatics.

Moore’s Law is an observation made in a 1965 paper by the co-founder of Intel, Gordon Moore. Moore’s Law suggests the number of transistors per square inch on integrated circuits will double every year since they were invented and would continue to do so. This theory has seen some difficulty entering its fifth decade. That’s not to say that this “law,” that has held up well for decades, has been proven false, but eventually, it will inevitably fail. In an interview for Time magazine, renowned theoretical physicist Michio Kaku said:

...we will see the collapse of Moore’s Law. In fact, already, we see a slowing down of Moore’s Law. Computer power simply cannot maintain its rapid exponential rise using standard silicon technology. Intel Corporation has admitted this.

To counteract this prediction, the scientists at IBM, Intel, AMG and other research facilities, have begun using alternative materials to produce a density that allows for billions of transistors to be built into a single chip. This presents a challenge for these manufacturers to consistently produce chips that pushes computing capabilities forward. IBM’s new chips are made from a silicon-germanium alloy that produces the necessary semiconducting material needed to successfully produce integrated circuits for transistors.

trigate

Currently, the most advanced commercially available chip, Intel’s i7-5960X processor has 2.6 billion transistors, and is built with a 22-nanometer process with their Tri-Gate 3D design. IBM’s newest chips have 20 million transistors and are built with a 7-nanometer process. To put that in perspective, the width of a human hair is between 80,000 and 100,000 nanometers. This comparison explains how these manufacturers are producing so many transistors in such a small space, as the average computer chip is the size of a postage stamp.

As computing systems have become more predominant in the 21st century, the progress of computing, and the sustained viability of Moore’s Law, relies on these nano technicians’ ability to find materials that will facilitate tens of billions of transistors. As of now, they have been able to do so, but eventually, we may need to look elsewhere to get more from our technology.

Do you think this technology will be developed to sustain Moore’s Law into the next decade, or will it fail? Share your thoughts in the comments below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 27 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Computer Google Email Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Microsoft Cybersecurity Backup Passwords Saving Money Communication Data Backup Smartphone Managed Service Android Business Management Smartphones VoIP Upgrade communications Mobile Devices Disaster Recovery Data Recovery Productivity Browser Windows Social Media Managed IT Services Microsoft Office AI Current Events Remote Tech Term Network Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Holiday Covid-19 Gadgets Managed Service Provider Training Information Remote Work Miscellaneous Server Outsourced IT Employee/Employer Relationship Spam Compliance Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Blockchain Windows 10 Business Technology Virtualization IT Support Bandwidth Two-factor Authentication Vendor Apps Data Security Mobile Office BYOD Mobile Device Management Gmail Chrome Budget Employer-Employee Relationship Managed Services Voice over Internet Protocol Apple Networking App Computing Information Technology HIPAA Access Control Applications Office 365 WiFi Tip of the week Conferencing How To Hacker BDR Avoiding Downtime Marketing Operating System Virtual Private Network Risk Management Router Health Analytics Office Tips Big Data Augmented Reality 2FA Retail Help Desk Storage Password Bring Your Own Device Managed IT Services Computers Healthcare Website Vendor Management Windows 7 Cybercrime Physical Security Microsoft 365 Firewall Display Solutions Printer Paperless Office Infrastructure The Internet of Things Windows 11 Document Management Social Monitoring Excel Scam Data loss Customer Service Remote Workers Telephone Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource End of Support Project Management Vulnerability Images 101 Content Filtering IT Management Word Multi-Factor Authentication Mobility VPN YouTube Meetings Telephone System Cost Management Cryptocurrency Computer Repair Safety Virtual Desktop Employees LiFi Integration Data storage Modem User Tip Processor Mobile Security Outlook Machine Learning Holidays Money Humor Data Storage Smart Technology Supply Chain Maintenance Video Conferencing Customer Relationship Management Antivirus Sports Managed Services Provider Saving Time Virtual Machines Professional Services Mouse Managed IT Service Hacking Administration Presentation Downloads iPhone Wireless Technology Licensing Robot Entertainment Vulnerabilities Settings Data Privacy Wireless Printing Hosted Solution Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Unified Threat Management Hard Drives Domains Typing Gamification Flexibility Staff Value Business Intelligence Network Congestion Social Networking Legislation Shortcuts Organization Fileless Malware Digital Security Cameras Knowledge Smart Devices Ransmoware Google Drive User Error Refrigeration Public Speaking Content Remote Working Wearable Technology Memory Vendors 5G Motherboard Data Breach Comparison Google Play Be Proactive Lithium-ion battery Point of Sale Health IT Unified Communications Entrepreneur Directions Videos Experience Assessment Electronic Health Records Permissions Workforce Google Docs Bitcoin Network Management Running Cable Tech Support Wasting Time Threats Monitors Trend Micro Specifications Security Cameras Workplace Strategies Google Wallet Microchip Internet Exlporer Software as a Service Fraud Meta Undo Windows 8 Laptop Websites Username Managing Costs Amazon eCommerce Black Friday SSID Drones Electronic Medical Records Database Surveillance Virtual Assistant Outsource IT SharePoint Media Halloween IT Technicians Virtual Machine Environment Writing Cookies Cyber Monday Medical IT Lenovo Application Proxy Server Reviews Virtual Reality Tactics Development Hotspot Transportation Small Businesses IBM Hacks Server Management Scary Stories Private Cloud Mirgation Hypervisor Displays Fun Nanotechnology Optimization PowerPoint Superfish Identity Theft Shopping Deep Learning Twitter Addiction Language Employer/Employee Relationships Outsourcing Navigation Error Management PCI DSS Chatbots Gig Economy Social Engineering Screen Reader Distributed Denial of Service Workplace Education Remote Computing Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Competition Identity Evernote Paperless Mobile Computing Regulations Compliance Bookmark Search Smart Tech Memes Co-managed IT Tablet Best Practice Alert Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Managed IT User Buisness File Sharing Financial Data Dark Data Browsers Smartwatch How To Connectivity IT Break Fix Scams Legal IT solutions Business Growth Notifications Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources IP Address Travel Social Network Telework Google Maps CES Cortana IoT Communitications Dark Web Cables Techology Alt Codes Trends Supply Chain Management Regulations Google Calendar Term Google Apps Recovery Downtime Unified Threat Management Customer Resource management FinTech

Blog Archive