4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Introducing Biocompatible Ferroelectret Nanogenerators: the Most Advanced T-Shirt You’ll Ever Wear

Introducing Biocompatible Ferroelectret Nanogenerators: the Most Advanced T-Shirt You’ll Ever Wear

How would you like to be able to charge your smartphone by simply walking down the street? Or to be able to turn the tie you’re wearing into a voice-recognition security system? Thanks to a team at Michigan State University, these abilities may not be so out of the question, as they have developed a promising little device that could be used to achieve these goals and many others.

Developed by MSU Associate Professor of Electrical and Computer Engineering Nelson Sepulveda and his team, these devices can generate power as they are bent and folded. The devices are called biocompatible ferroelectret nanogenerators, or FENG for short.

Power is generated by the device’s many layers as energy is introduced via other sources, such as the user’s motion. This could potentially lead to the ability to charge a device by simply moving around with FENG technology.

Furthermore, there are potential security applications to this new tech. Since FENG material is so sensitive, it can be used as a microphone that would make it practically impossible to trick a voice-recognition system. On the other side of the coin, FENG can also be used as a speaker.

It’s also very possible that FENG technology will help lead to the discoveries that allow us to use more efficient devices, for longer. This could potentially allow business to be done for longer in the day, without fear of losing precious charge.

What do you think? Do you see FENG becoming the status quo anytime soon? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 15 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Innovation IT Support Disaster Recovery Business Continuity Hardware VoIP Workplace Tips User Tips Saving Money Computer Miscellaneous Windows 10 Virtualization Upgrade Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Alert Email Save Money Microsoft Office Communication Network communications Quick Tips Smartphone Small Business Social Media Smartphones BYOD Going Green Mobile Office Information Technology Android Office Apps Health Application Ransomware Managed IT Services Outsourced IT Browser Operating System Gadgets Chrome Avoiding Downtime Productivity Managed IT Disaster Tablet Mobility WiFi Holiday Firewall Cybercrime The Internet of Things Remote Computing Telephone Systems Unified Threat Management Passwords IT Solutions Spam BDR Cybersecurity Risk Management Search Best Practice Data Management Apple Facebook Employer-Employee Relationship Budget Vendor Management Hard Drives Automation Saving Time Hacking History Remote Monitoring VPN Hosted Solution Money Computers Big Data Data Backup Phone System Content Filtering Marketing Recovery Proactive IT Law Enforcement Office Tips User Error iPhone Customer Relationship Management Collaboration Data Recovery Phishing Wireless Technology Password Telephony Printer Bring Your Own Device USB Analytics Encryption Gmail Router Government Humor Work/Life Balance Administration Wearable Technology Office 365 Lithium-ion battery Antivirus Maintenance Shortcut PowerPoint Vulnerability Social Virus Current Events Education Social Engineering Trending Windows 8 Net Neutrality Wireless Unsupported Software Cloud Computing Google Drive Tech Support Private Cloud Save Time Data Security Outlook Data Protection Point of Sale IT COnsultant App Computer Repair SaaS Cost Management Audit HaaS Intranet Bandwidth Printer Server Business Intelligence Laptop Politics Personal Information OneNote Users Meetings Computer Care Battery Robot Data Storage Automobile Display Emails End of Support Instant Messaging Augmented Reality HIPAA Entertainment Benefits Paperless Office Internet Exlporer DDoS Computer Accessories Network Congestion Fax Server Internet of Things Mouse Identity Theft Compliance Workplace Solid State Drive Help Desk Flexibility Sports Streaming Media Two-factor Authentication Managing Stress Uninterrupted Power Supply Excel online currency Samsung Wi-Fi Artificial Intelligence Emergency IT Support Applications Windows 10 Travel Social Networking Update Customer Service Efficency hacker Biometrics Retail Transportation Virtual Reality Adobe Managed IT Services Website Google Docs Music Computer Fan Human Resources Hiring/Firing IT consulting Running Cable Licensing OneDrive Data storage Amazon Microsoft Excel Books Dark Web Smart Technology Screen Mirroring Reliable Computing Video Games Co-managed IT Wiring Document Management Advertising Information File Sharing Bloatware Data Breach Cast Legal Lifestyle Mobile Device Windows 10s Ebay Touchpad Debate Computing systems Managed Security Nanotechnology Branding Scam Distributed Denial of Service Tablets Hard Disk Drive hack Root Cause Analysis Employer Employee Relationship HBO WIndows 7 eWaste NFL Storage Worker Commute best practices Inbound Marketing Operating Sysytem Regulations PDF Nokia Cortana CrashOverride IT Management Scalability Files Twitter Word data breach Value Cameras Text Messaging Legislation Safety Settings WIndows Server 2008 User How To Chromecast Surge Protector Television Upgrades Windows Ink Science risk management 3D Printing Presentation Virtual Desktop Bluetooth Training Patch Management Best Available Administrator IT Technicians Consultant Google Maps Colocation The Blindside Of Commerce SharePoint Company Culture Regulation ISP Black Market Access Hard Drive Touchscreen Software as a Service IT Security Teamwork Cleaning Sync Programming Blogging Uograde Images Data Loss Experience iOS Busines Continuity Managed IT Service Near Field Communication Avoid Downtime Networking Keyboard Sales Redundancy Managed Service Provder Webinar Webinar Credit Cards Mobile IT solutions FAQ Professional Services Taxes Tutorial Supercomputer Electronic Medical Records IT service IT Budget Domains Reputation Comparison Specifications Gift Giving Conferencing Buisness Youtube Shadow IT Microblogging Relocation Gifts