MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Introducing Biocompatible Ferroelectret Nanogenerators: the Most Advanced T-Shirt You’ll Ever Wear

Introducing Biocompatible Ferroelectret Nanogenerators: the Most Advanced T-Shirt You’ll Ever Wear

How would you like to be able to charge your smartphone by simply walking down the street? Or to be able to turn the tie you’re wearing into a voice-recognition security system? Thanks to a team at Michigan State University, these abilities may not be so out of the question, as they have developed a promising little device that could be used to achieve these goals and many others.

Developed by MSU Associate Professor of Electrical and Computer Engineering Nelson Sepulveda and his team, these devices can generate power as they are bent and folded. The devices are called biocompatible ferroelectret nanogenerators, or FENG for short.

Power is generated by the device’s many layers as energy is introduced via other sources, such as the user’s motion. This could potentially lead to the ability to charge a device by simply moving around with FENG technology.

Furthermore, there are potential security applications to this new tech. Since FENG material is so sensitive, it can be used as a microphone that would make it practically impossible to trick a voice-recognition system. On the other side of the coin, FENG can also be used as a speaker.

It’s also very possible that FENG technology will help lead to the discoveries that allow us to use more efficient devices, for longer. This could potentially allow business to be done for longer in the day, without fear of losing precious charge.

What do you think? Do you see FENG becoming the status quo anytime soon? Let us know in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 22 May 2018

Captcha Image

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Network Security Hackers Malware Software Internet Hosted Solutions Business Management Backup google Productivity Managed IT Services Mobile Devices VoIP Microsoft Disaster Recovery Computer Business Continuity communications Outsourced IT Business IT Support Windows 10 Cybersecurity Email User Tips Productivity IT Services Hardware Innovation Cybercrime Data Backup Efficiency Saving Money Mobile Device Management Windows Small Business Managed IT Mobility Apps Server Ransomware Data Recovery Operating System Law Enforcement Internet of Things browser Data Smartphone Tech Term Save Money Telephone Systems Android Virtualization Phishing Smartphones Cloud Computing Passwords Hosted Solution Quick Tips Data Security BDR Money Communication Information Technology VPN Recovery Password Holiday Microsoft Office BYOD Automation Office 365 Chrome Wireless Best Practice Social Media Vulnerability Risk Management Facebook Unsupported Software Government Budget Data Management Data Breach Update Network Work/Life Balance Gadgets Cost Management Wi-Fi Google Drive Hacking Avoiding Downtime Social Alert Collaboration upgrade Health IT Support Miscellaneous Managed Service Provider Computers Two-factor Authentication App History Cleaning Windows 10 USB Proactive IT Save Time User Error Spam The Internet of Things Identity Theft Managed IT Services Employer-Employee Relationship Flexibility Shortcut Workplace Tips Firewall Wireless Technology Application Antivirus Current Events Social Engineering Audit Streaming Media Data Protection Telephony Personal Information Politics search Office tips Applications Private Cloud Fraud Remote Computing Cortana End of Support Saving Time eWaste Patch Management Office Phone System Computer Care Legal Wireless Charging Excel Humor Users Disaster Encryption Project Management Data Storage Gmail Artificial Intelligence OneNote Big Data Sports IT solutions Tech Support Data Loss Hacker DDoS Marketing Internet Exlporer Solid State Drive SaaS Google Docs Samsung Blockchain Television Content Filtering Battery HaaS iPhone Mobile Security Apple Compliance Devices Mobile Computing Transportation WiFi Redundancy Automobile Robot Value Going Green Commerce Bandwidth Computer Forensics Tablets Root Cause Analysis Document Management remote Experience Yahoo FAQ Hard Drive Laptop Uninterrupted Power Supply NFL Edge Running Cable Augmented Reality Server 2008 Business Intelligence Ali Rowghani Touchscreen Video Games Lifestyle Virus Charger Chromebook Trending Outlook Touchpad Virtual Reality Word Reputation Scam Ciminal Managed IT Service Music Legislation Advertising Proactive Smart Tech iOS Windows Ink Employer Employee Relationship server installation dvd "cannot install required files" Websites Data storage Analytics stock Comparison Evernote Connectivity Regulation Keyboard Computer Fan Instant Messaging Google Maps Administration Computer Accessories MSP Chromecast Worker Commute Data Theft Screen Mirroring tweet Specifications Mobile Device Networking Content Filter Sync Dark Web Managing Stress calculator Software as a Service Colocation intranet Meetings Computing Cast Books Twitter Emails Scalability Sales Hard Drives Workers Monitoring Adobe Hiring/Firing Files Education control Lithium-ion battery Router Vendor Management IT budget Settings Administrator Analysis WSJ How To Retail Updates Management Licensing Benefits Maintenance WannaCry Exchange altivista Relocation Distributed Denial of Service Access App store HBO Webinar Conferencing Unified Threat Management Microsoft Word Financial Technology Mobile Device Security SBS compaq Microsoft Excel Training Identities Entertainment Electronic Medical Records IT solutions Gifts PDF Upgrades Printing Professional Services Wearable Technology Point of Sale hp File Sharing Company Culture IoT HIPAA Text Messaging Consultant Identity IT Management Safety Windows 10s Black Market Google Assistant Travel Smart Technology Spyware Nanotechnology domain Avoid Downtime Storage Language Data Privacy WIndows Server 2008 Hard Disk Drive Shadow IT Credit Cards Worker CrashOverride Thank You Congratulations Cache Monitors Remote Monitoring Emergency

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...