4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Introducing Biocompatible Ferroelectret Nanogenerators: the Most Advanced T-Shirt You’ll Ever Wear

Introducing Biocompatible Ferroelectret Nanogenerators: the Most Advanced T-Shirt You’ll Ever Wear

How would you like to be able to charge your smartphone by simply walking down the street? Or to be able to turn the tie you’re wearing into a voice-recognition security system? Thanks to a team at Michigan State University, these abilities may not be so out of the question, as they have developed a promising little device that could be used to achieve these goals and many others.

Developed by MSU Associate Professor of Electrical and Computer Engineering Nelson Sepulveda and his team, these devices can generate power as they are bent and folded. The devices are called biocompatible ferroelectret nanogenerators, or FENG for short.

Power is generated by the device’s many layers as energy is introduced via other sources, such as the user’s motion. This could potentially lead to the ability to charge a device by simply moving around with FENG technology.

Furthermore, there are potential security applications to this new tech. Since FENG material is so sensitive, it can be used as a microphone that would make it practically impossible to trick a voice-recognition system. On the other side of the coin, FENG can also be used as a speaker.

It’s also very possible that FENG technology will help lead to the discoveries that allow us to use more efficient devices, for longer. This could potentially allow business to be done for longer in the day, without fear of losing precious charge.

What do you think? Do you see FENG becoming the status quo anytime soon? Let us know in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 17 October 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows Innovation Disaster Recovery IT Support Hardware Business Continuity Workplace Tips Saving Money Computer VoIP Virtualization User Tips Upgrade Windows 10 Miscellaneous Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Email Save Money Communication Microsoft Office Network Alert Quick Tips communications BYOD Information Technology Going Green Mobile Office Social Media Smartphones Smartphone Apps Small Business Android Office Health Operating System Outsourced IT Chrome Browser Application Gadgets Ransomware Productivity Managed IT Services Disaster Firewall Avoiding Downtime Tablet Holiday Managed IT The Internet of Things Data Management Risk Management Cybersecurity Remote Computing Unified Threat Management IT Solutions Cybercrime WiFi Mobility Spam Telephone Systems BDR Search Passwords Vendor Management Hacking VPN Best Practice Facebook Phishing History Remote Monitoring Hard Drives Employer-Employee Relationship Saving Time Budget Apple Automation Marketing Office Tips Wireless Technology Law Enforcement Password Big Data iPhone Customer Relationship Management Hosted Solution Computers Proactive IT Recovery Phone System User Error Collaboration Data Recovery Current Events Antivirus Shortcut Humor Administration Social Wearable Technology Printer Maintenance USB Office 365 Data Backup Content Filtering PowerPoint Telephony Virus Analytics Encryption Gmail Router Money Lithium-ion battery Bring Your Own Device Laptop Save Time Audit OneNote HaaS Point of Sale IT COnsultant Trending Education Business Intelligence Net Neutrality Computer Repair Work/Life Balance Tech Support Social Engineering Outlook Data Security Users Private Cloud Windows 8 Government App Cost Management Wireless Intranet Unsupported Software Bandwidth Google Drive Printer Server Cloud Computing Network Congestion SaaS Excel Windows 10 Internet Exlporer Efficency Help Desk Vulnerability Internet of Things Identity Theft Data Protection Solid State Drive Flexibility Travel Update Customer Service Display Biometrics Data Storage Retail Augmented Reality Samsung Virtual Reality Wi-Fi Meetings Emergency Paperless Office Applications Social Networking Fax Server Instant Messaging Emails Politics Workplace hacker Personal Information HIPAA Transportation Streaming Media Entertainment Benefits DDoS Computer Accessories Uninterrupted Power Supply online currency Robot Computer Care Battery Mouse Compliance Automobile End of Support Two-factor Authentication IT Support Managing Stress Google Maps ISP Legal Value Commerce Touchpad Mobile Device Cameras Managed Security User Regulation Scam Science Programming Blogging Presentation Virtual Desktop Bluetooth Best Available Sync Nokia IT Technicians Employer Employee Relationship Data Loss iOS Website Sports Managed IT Service Operating Sysytem Worker Commute SharePoint Adobe PDF Managed IT Services OneDrive Scalability Computer Fan Files Amazon Teamwork Safety Licensing Text Messaging Co-managed IT Chromecast How To Busines Continuity Dark Web Near Field Communication Screen Mirroring Upgrades Networking Artificial Intelligence Administrator Training Ebay IT consulting Cast Computing Colocation Consultant Human Resources Running Cable Hard Drive The Blindside Of Windows 10s Access Company Culture Black Market Nanotechnology Reliable Computing Touchscreen Uograde Images IT Security Tablets Hard Disk Drive Cleaning Bloatware Root Cause Analysis Experience HBO Keyboard NFL Avoid Downtime best practices Twitter CrashOverride Music IT Management Branding Surge Protector Distributed Denial of Service Hiring/Firing Word data breach Data storage Television Settings Wiring Books WIndows 7 WIndows Server 2008 3D Printing Information eWaste Smart Technology Windows Ink Video Games Inbound Marketing risk management Document Management Regulations Data Breach Patch Management Advertising Debate Gift Giving Domains Software as a Service Taxes Supercomputer Electronic Medical Records Google Docs IT Budget Buisness Webinar Reputation Mobile IT solutions Lifestyle Professional Services Youtube Microblogging Tutorial Shadow IT Relocation Sales Managed Service Provder Webinar Storage IT service