4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Introducing Biocompatible Ferroelectret Nanogenerators: the Most Advanced T-Shirt You’ll Ever Wear

Introducing Biocompatible Ferroelectret Nanogenerators: the Most Advanced T-Shirt You’ll Ever Wear

How would you like to be able to charge your smartphone by simply walking down the street? Or to be able to turn the tie you’re wearing into a voice-recognition security system? Thanks to a team at Michigan State University, these abilities may not be so out of the question, as they have developed a promising little device that could be used to achieve these goals and many others.

Developed by MSU Associate Professor of Electrical and Computer Engineering Nelson Sepulveda and his team, these devices can generate power as they are bent and folded. The devices are called biocompatible ferroelectret nanogenerators, or FENG for short.

Power is generated by the device’s many layers as energy is introduced via other sources, such as the user’s motion. This could potentially lead to the ability to charge a device by simply moving around with FENG technology.

Furthermore, there are potential security applications to this new tech. Since FENG material is so sensitive, it can be used as a microphone that would make it practically impossible to trick a voice-recognition system. On the other side of the coin, FENG can also be used as a speaker.

It’s also very possible that FENG technology will help lead to the discoveries that allow us to use more efficient devices, for longer. This could potentially allow business to be done for longer in the day, without fear of losing precious charge.

What do you think? Do you see FENG becoming the status quo anytime soon? Let us know in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Internet software Business Computing Business Management Hackers Backup Productivity Hosted Solutions Managed Service Provider Malware Google IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Hardware VoIP Business Continuity Workplace Tips Network Security Mobile Devices User Tips Computer Saving Money Windows 10 Miscellaneous Virtualization Mobile Device Management Upgrade Data Email Server communications Alert Mobile Computing Small Business Communication Network Save Money Microsoft Office Apps Social Media Managed IT Services Smartphone Outsourced IT Smartphones Quick Tips Browser Information Technology Productivity BYOD Going Green Mobile Office Cybercrime Android Gadgets Health Holiday Office Application Ransomware Operating System Chrome Managed IT Cybersecurity Mobility Risk Management Tablet WiFi Data Backup Firewall The Internet of Things Avoiding Downtime Passwords Disaster Best Practice Data Management BDR Data Recovery History Search Collaboration Telephone Systems Internet of Things Automation Remote Computing Unified Threat Management IT Solutions Spam Saving Time Phishing User Error Remote Monitoring Employer-Employee Relationship Budget VPN Wireless Technology Apple Facebook Vendor Management Marketing Hacking Hard Drives Proactive IT Vulnerability Password iPhone Customer Relationship Management Maintenance Hosted Solution Money Computers Phone System Recovery Data Security Big Data Office Tips Law Enforcement Content Filtering Office 365 Humor Gmail Router Administration Social Government App Wearable Technology Social Engineering Intranet PowerPoint Lithium-ion battery Virus Telephony Google Drive OneNote Current Events Bring Your Own Device Two-factor Authentication Printer Tech Support Work/Life Balance USB Antivirus IT Support Encryption Analytics Shortcut Windows 10 Computer Repair Retail Politics Personal Information Cost Management Bandwidth Wireless Printer Server Unsupported Software Laptop Users Private Cloud Cloud Computing Data Breach Windows 8 Save Time Trending Education Net Neutrality Identity Theft Data Protection Flexibility SaaS Excel Audit HaaS Point of Sale Outlook IT COnsultant Business Intelligence Blockchain Applications Commerce Update Customer Service Streaming Media Biometrics hacker Uninterrupted Power Supply online currency Virtual Reality Transportation Networking Meetings Data Loss Computer Care Managed IT Services Battery Social Networking Robot Google Docs Emails Data Storage Instant Messaging Redundancy Automobile End of Support HIPAA Entertainment Efficency Benefits DDoS Computer Accessories Legal Internet Exlporer Mouse Compliance Display Solid State Drive eWaste Sports Managing Stress Network Congestion Augmented Reality Cortana Project Management Paperless Office Help Desk Samsung Wi-Fi Fax Server Emergency Artificial Intelligence Travel Workplace Colocation SharePoint Google Maps Consultant The Blindside Of Specifications Updates Regulation Company Culture Black Market Access Teamwork Identities Software as a Service Touchscreen IT Security Twitter Conferencing Busines Continuity Microsoft Word Near Field Communication Sync Cleaning Surge Protector IoT iOS Experience Managed IT Service Keyboard Avoid Downtime Television Gifts Human Resources Device Security IT consulting Adobe 3D Printing Hard Drive Running Cable Computer Fan Music Hiring/Firing Devices Reliable Computing Licensing Data storage Books Uograde Images Microsoft Excel ISP Dark Web Credit Cards Screen Mirroring Smart Technology Video Games Bloatware Spyware Document Management Sales Blogging Advertising File Sharing Programming FAQ Cast Touchpad Branding Fraud Mobile Device Windows 10s Nanotechnology Managed Security Website Distributed Denial of Service systems Charger Scam Wiring Edge WIndows 7 Tablets Hard Disk Drive Root Cause Analysis Information Storage hack Inbound Marketing OneDrive Wireless Charging Regulations HBO Employer Employee Relationship Amazon Operating Sysytem Ciminal NFL best practices Worker Commute Co-managed IT Debate CrashOverride PDF Value WannaCry Cameras IT Management Scalability Files Lifestyle User Word IT Budget data breach Settings Safety Ebay Text Messaging Science Legislation Evernote Presentation WIndows Server 2008 Computing How To Chromecast Virtual Desktop Bluetooth MSP Best Available Windows Ink Upgrades risk management Nokia IT Technicians Comparison Workers Patch Management Training Administrator Tutorial Buisness Shadow IT Relocation Language Youtube Webinar Microblogging Gift Giving Tech Term Mobile IT solutions Proactive Managed Service Provder Professional Services Webinar Websites Taxes IT service Supercomputer Electronic Medical Records Domains Reputation