Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Nanotechnology Holds the Key to Doubling Computing Power

b2ap3_thumbnail_ibm_processor_400.jpgEarly in July, IBM announced that they have developed an ultra-dense computer chip that has roughly four times the computing capacity of today’s most powerful chips. These prototype chips, and ones they will develop to fuel computing into the next decade and beyond, are the result of the evolution of 21st century informatics.

Moore’s Law is an observation made in a 1965 paper by the co-founder of Intel, Gordon Moore. Moore’s Law suggests the number of transistors per square inch on integrated circuits will double every year since they were invented and would continue to do so. This theory has seen some difficulty entering its fifth decade. That’s not to say that this “law,” that has held up well for decades, has been proven false, but eventually, it will inevitably fail. In an interview for Time magazine, renowned theoretical physicist Michio Kaku said:

...we will see the collapse of Moore’s Law. In fact, already, we see a slowing down of Moore’s Law. Computer power simply cannot maintain its rapid exponential rise using standard silicon technology. Intel Corporation has admitted this.

To counteract this prediction, the scientists at IBM, Intel, AMG and other research facilities, have begun using alternative materials to produce a density that allows for billions of transistors to be built into a single chip. This presents a challenge for these manufacturers to consistently produce chips that pushes computing capabilities forward. IBM’s new chips are made from a silicon-germanium alloy that produces the necessary semiconducting material needed to successfully produce integrated circuits for transistors.

trigate

Currently, the most advanced commercially available chip, Intel’s i7-5960X processor has 2.6 billion transistors, and is built with a 22-nanometer process with their Tri-Gate 3D design. IBM’s newest chips have 20 million transistors and are built with a 7-nanometer process. To put that in perspective, the width of a human hair is between 80,000 and 100,000 nanometers. This comparison explains how these manufacturers are producing so many transistors in such a small space, as the average computer chip is the size of a postage stamp.

As computing systems have become more predominant in the 21st century, the progress of computing, and the sustained viability of Moore’s Law, relies on these nano technicians’ ability to find materials that will facilitate tens of billions of transistors. As of now, they have been able to do so, but eventually, we may need to look elsewhere to get more from our technology.

Do you think this technology will be developed to sustain Moore’s Law into the next decade, or will it fail? Share your thoughts in the comments below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 15 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Quick Tips Saving Money Passwords Communication Cybersecurity Managed Service Smartphone Data Backup Android Disaster Recovery Data Recovery AI Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Covid-19 Gadgets Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT Encryption Employee/Employer Relationship Spam IT Support Office Windows 10 Business Continuity Data Management Government Windows 10 Virtualization Blockchain Wi-Fi Business Technology Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget How To BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Storage Password Bring Your Own Device Managed IT Services Big Data Operating System 2FA Router Virtual Private Network Risk Management Computers Health Help Desk Healthcare Analytics Website Office Tips Augmented Reality Retail Windows 7 Firewall Telephone Scam Microsoft 365 Data loss Solutions The Internet of Things Cooperation Going Green Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Vendor Management Windows 11 Cybercrime Physical Security Customer Service Excel Display Printer Paperless Office Infrastructure Remote Workers Monitoring Document Management Free Resource Project Management Maintenance Images 101 Antivirus Sports Downloads Multi-Factor Authentication Mouse Mobility Licensing Safety Entertainment Administration Employees Integration Telephone System Robot Cost Management Settings Printing Wireless Content Filtering Holidays IT Management Customer Relationship Management Data Storage VPN YouTube Meetings Supply Chain Cryptocurrency Video Conferencing Managed Services Provider User Tip Modem Hacking Presentation Computer Repair Mobile Security Virtual Machines Processor Professional Services Virtual Desktop LiFi Wireless Technology Data storage Smart Technology Outlook iPhone Machine Learning Money Saving Time Word Humor Vulnerabilities Data Privacy Managed IT Service IT Maintenance Deep Learning Download Public Speaking Twitter Alerts IT Assessment Flexibility Value Business Intelligence Lithium-ion battery Error Social Engineering Break Fix Entrepreneur Organization Browsers Shortcuts Education Connectivity Ransmoware Upload Remote Computing Digital Security Cameras Smart Devices Remote Working Memory Vendors Mobile Computing Social Network Multi-Factor Security Search Dark Web Data Breach Google Play Be Proactive Tablet IoT Undo Workforce Best Practice Trends Alert Videos Electronic Health Records Wasting Time Threats Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Trend Micro Legal Data Analysis Security Cameras Workplace Strategies IT solutions Star Wars Meta Business Growth Gamification Notifications Staff Software as a Service Managing Costs Amazon Travel Social Networking Application Legislation Cortana eCommerce Techology Fileless Malware SSID Google Maps Virtual Assistant Outsource IT Alt Codes Content IBM Wearable Technology Surveillance Virtual Machine Environment Health IT Media Downtime Unified Threat Management Motherboard Comparison Permissions Reviews Unified Threat Management Directions Medical IT Hosted Solution Assessment Transportation Small Businesses Typing Development Hypervisor Displays Network Congestion Specifications Competition Knowledge Fraud Shopping Optimization Google Drive User Error Microchip PowerPoint Internet Exlporer Employer/Employee Relationships Outsourcing Username PCI DSS Navigation Point of Sale 5G Black Friday Unified Communications Database Experience Gig Economy Google Docs Workplace Teamwork Hiring/Firing Bitcoin Network Management Running Cable Tech Support IT Technicians User Internet Service Provider Monitors Cyber Monday Regulations Compliance Google Wallet Proxy Server Evernote Paperless Cookies Tactics Hotspot Memes Co-managed IT SQL Server Technology Care Windows 8 IP Address Laptop Websites Mirgation Net Neutrality Financial Data History Drones Business Communications Nanotechnology Addiction Electronic Medical Records Language Smartwatch IT SharePoint Scams Azure Hybrid Work Management Halloween Chatbots Recovery Procurement Writing Distributed Denial of Service Telework Cyber security Lenovo Tech Human Resources Screen Reader Hard Drives Service Level Agreement Domains Virtual Reality Computing Infrastructure CES Communitications Cables Supply Chain Management Hacks Server Management Scary Stories Private Cloud Identity Fun FinTech Superfish Bookmark Term Google Apps Identity Theft Smart Tech Refrigeration

Blog Archive