MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Introducing Biocompatible Ferroelectret Nanogenerators: the Most Advanced T-Shirt You’ll Ever Wear

Introducing Biocompatible Ferroelectret Nanogenerators: the Most Advanced T-Shirt You’ll Ever Wear

How would you like to be able to charge your smartphone by simply walking down the street? Or to be able to turn the tie you’re wearing into a voice-recognition security system? Thanks to a team at Michigan State University, these abilities may not be so out of the question, as they have developed a promising little device that could be used to achieve these goals and many others.

Developed by MSU Associate Professor of Electrical and Computer Engineering Nelson Sepulveda and his team, these devices can generate power as they are bent and folded. The devices are called biocompatible ferroelectret nanogenerators, or FENG for short.

Power is generated by the device’s many layers as energy is introduced via other sources, such as the user’s motion. This could potentially lead to the ability to charge a device by simply moving around with FENG technology.

Furthermore, there are potential security applications to this new tech. Since FENG material is so sensitive, it can be used as a microphone that would make it practically impossible to trick a voice-recognition system. On the other side of the coin, FENG can also be used as a speaker.

It’s also very possible that FENG technology will help lead to the discoveries that allow us to use more efficient devices, for longer. This could potentially allow business to be done for longer in the day, without fear of losing precious charge.

What do you think? Do you see FENG becoming the status quo anytime soon? Let us know in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 25 June 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Business Computing Hackers Best Practices Malware Hosted Solutions Internet Backup Computer Software Network Security Productivity Business Microsoft Windows 10 google Business Continuity Managed IT Services Disaster Recovery Innovation VoIP Business Management Hardware IT Services IT Support Mobile Devices Mobility Save Money Efficiency Saving Money communications Ransomware Productivity Apps User Tips Smartphone Windows Quick Tips Operating System Outsourced IT Telephone Systems Recovery Email Cybercrime Virtualization Data Mobile Device Management Server BDR Passwords Law Enforcement Information Technology Small Business Budget upgrade Social Wireless Communication Managed IT Cybersecurity Android Hosted Solution Hacking Avoiding Downtime VPN Facebook Health Miscellaneous browser Money Password Office 365 Smartphones Data Management Chrome Cloud Computing USB search App Save Time BYOD Automation Telephony Alert Government Managed Service Provider Work/Life Balance Computers Private Cloud Office tips Firewall Application Gadgets Workplace Tips Current Events Social Media HaaS Saving Time The Internet of Things Humor Office Television Disaster Personal Information Computer Care Social Engineering Cleaning Employer-Employee Relationship Streaming Media Automobile Unsupported Software Users WiFi Going Green Bandwidth Hacker Microsoft Office Internet Exlporer Solid State Drive Wireless Technology Risk Management Google Drive Identity Theft Samsung Mobile Computing Flexibility Transportation Audit Gmail Robot Applications History Update Wi-Fi End of Support Remote Computing Antivirus DDoS Best Practice Holiday Internet of Things Battery Exchange iOS Reputation Entertainment Electronic Medical Records Distributed Denial of Service altivista Advertising Touchscreen Point of Sale SBS Computer Fan HIPAA Black Market compaq Phishing Data storage Scam Apple Avoid Downtime Dark Web Administration Chromecast Politics Wearable Technology Shadow IT hp Data Breach Network Employer Employee Relationship Sports Document Management domain Data Backup Colocation Experience Keyboard Tech Support Hard Drives Emails Computer Accessories Files Lithium-ion battery Video Games remote Nanotechnology Mobile Device Administrator Phone System Marketing Shortcut eWaste Virtual Reality Yahoo Webinar Music Running Cable Legal Server 2008 Root Cause Analysis Relocation Cost Management Access Hiring/Firing Encryption Ali Rowghani IT solutions Vendor Management Trending Analytics User Error Augmented Reality iPhone SaaS Benefits Instant Messaging PDF Windows 10s Worker Commute Big Data server installation dvd "cannot install required files" Spam Unified Threat Management Managing Stress stock Text Messaging Hard Disk Drive Training Books Scalability OneNote Upgrades Compliance Education tweet Router Windows 10 Company Culture How To calculator Meetings Consultant Laptop Smart Technology IT solutions Uninterrupted Power Supply Twitter Artificial Intelligence control Vulnerability Value Proactive IT Content Filtering Two-factor Authentication Touchpad WSJ

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.