ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Has Performance for Consumer PCs Finally Peaked?

b2ap3_thumbnail_moores_law_2015_400.jpgThe world was vastly different in 1965. The smooth, compact smartphones and laptops of today were nonexistent, and civilization was on the verge of experiencing a revolution of technological growth and advancement. This is all thanks to Moore’s law, which paved the way toward making technology smaller and more easily accessible for both end users and businesses.

moore in blogMoore’s law is a series of observations made by the co-founder of Intel, Gordon Moore, that were published in Electronics Magazine in 1965. The general idea was that technology would grow exponentially as time goes on; specifically, the number of transistors available in a given die area doubles every two years. This essentially means that machines grow twice as powerful ever two years or so, making them significantly faster and more responsive as time goes on.

As anyone who lives in today’s technology-laden society knows, this has proven to be true. Today’s technological advancements wouldn’t have been possible without Moore’s law. While it certainly helped shape the way technology has grown over the past several decades, has technology finally caught up with Moore’s law? Some might argue that technology has far surpassed the expectations of Moore’s law, and that further development is limited due to the physical and economical demands. As reported by ComputerWorld:

Conventional computers could be replaced by quantum computers and systems with brain-like, or neural chips, which function differently than current processors. Silicon could also be replaced by chips made using new materials, such as graphene or carbon nanotubes.

If you think of it in terms of physical limitations, this makes sense. Chips can only get so small, and Intel can only keep up for so long before chips become so small that they become miniscule. Even though Intel has been finding ways to keep up with Moore’s law, pushing forward and coming up with new ways to make technology cheaper will undoubtedly grow more challenging as time goes on and technology grows more complex.

In terms of economics, manufacturers are finding it more difficult to build the advanced factories required to build the processors and chips that are continuously decreasing in size. This is mainly due to the return on investment decreasing as time goes on. Since technology grows more affordable and more compact over time, consumer cost goes down, limiting the profits that are made. This can make it difficult to justify building new factories specifically designed for these chips. Despite this, researchers are determined to keep Moore’s law going as long as possible. If the size of a chip is limited, better materials will surface which allow for more efficient chip design.

Still, the legacy built upon Moore’s law has allowed the human race to build incredible machines over the past 50 years. Even computers from 15 years ago are now made obsolete by the smartphones we hold in our hands today. Despite the somewhat limited scope of Moore’s law, technology manufacturers are sure to continue improving processes and finding new materials that allow for more efficient, inexpensive new tech.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Mobile Devices Network Data Recovery Managed IT Services Communication Quick Tips Productivity Users Social Media VoIP Mobile Device Tech Term Automation Facebook Business Continuity Windows 10 Disaster Recovery Passwords Holiday Covid-19 Apps IT Support Browser Windows 10 Managed Service Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Managed Service Provider Remote Work Government Saving Money Operating System Gadgets Artificial Intelligence Managed IT services Workplace Strategy Networking Windows Business Technology Spam Blockchain Bandwidth Server Information Encryption Mobile Device Management WiFi Remote App Virtualization Two-factor Authentication Information Technology Office 365 History Budget Gmail Apple Office Employee/Employer Relationship Health Wi-Fi Conferencing Access Control Cybercrime Analytics Data Security Big Data BDR IT Management Document Management Training Voice over Internet Protocol Employer-Employee Relationship Hacker Save Money Compliance Remote Computing Patch Management Vendor Remote Monitoring Help Desk Cost Management Hacking Legal Search... Data storage Best Practice Mobile Office Money Retail Data loss Customer Service Alert Unified Threat Management Managed Services Firewall Hiring/Firing Outlook Augmented Reality Word BYOD Password IBM Computing Website Vendor Management Applications Hard Drive Project Management Vulnerabilities Law Enforcement Healthcare Mobility Marketing End of Support Meetings Printer Running Cable Laptop Google Maps Scam Storage Remote Workers Travel Windows 7 VPN Virtual Reality Social Engineering Social Free Resource Sports SaaS DDoS Cryptocurrency Black Market Windows 11 Update User Cleaning How To iPhone Robot Education Cortana Content Filtering Data Breach Paperless Office Antivirus Chrome Maintenance Router Twitter The Internet of Things Monitoring Mobile Computing YouTube Websites Microchip Video Conferencing IT Consultant Vulnerability Flexibility Virtual Machines Wireless Technology Saving Time Software as a Service Data Protection eWaste Computer Repair Customer Relationship Management Co-Managed IT Bitcoin Professional Services Entertainment Hack Identity Theft Computers Notifications Downtime Safety Telephone Unified Communications Google Docs Virtual Desktop Bluetooth Managed Services Provider Excel Experience Distributed Denial of Service Office Tips Virtual Private Network Tech Terms Private Cloud Memory Managed IT HIPAA Digital Current Events Virtual Assistant Solutions Disaster Politics Taxes Machine Learning Settings Images 101 Integration Lithium-ion battery Display Solid State Drive Processor Physical Security Processors Employees Chromebook Drones Avoiding Downtime PowerPoint Holidays Administration Automobile Start Menu Downloads Presentation Multi-factor Authentication Computer Care Cooperation Specifications How To 2FA Service Level Agreement Uninterrupted Power Supply Computing Infrastructure Webcam Teamwork Phone System Public Speaking Management Business Mangement Data Storage Device security Hypervisor Streaming Media Microsoft Excel Medical IT In Internet of Things Be Proactive Keyboard Shopping Wireless Headphones Tablets Hacks Paperless Going Green Network Congestion Business Cards SQL Server Tech Hard Drives Google Calendar Reliable Computing Error intranet Writing PCI DSS Supercomputer Licensing Humor Wireless Workplace Strategies Bookmark Virus Computer Accessories Shortcut Gig Economy Business Communications Download Environment Internet Service Provider Piracy Motion Sickness Azure Term Heating/Cooling Windows XP Comparison Scalability Google Drive Social Networking Regulations Compliance HTML Managed IT Service Proactive IT Memes Administrator Browsers Text Messaging Nanotechnology Bring Your Own Device Human Resources Upload Corporate Profile Net Neutrality Software License Google Play Knowledge Television Social Network Telephony Financial Data Employer Employee Relationship Music IT Smart Technology Data Analysis Risk Management Screen Reader Cabling Google Apps Trends Tablet Mobile Technology G Suite Security Cameras Mouse Troubleshooting Customer Resource management VoIP Telework Devices Tracking Communitications Tip of the week Microsoft 365 Staffing Botnet Fileless Malware Smartwatch IP Address Rental Service Gamification Micrsooft Procurement Company Culture Web Server SharePoint Telephone System Flash FinTech Regulations Digital Payment CES Backup and Disaster Recovery Worker Business Growth IT Assessment Supply Chain Directions Telephone Systems Content Access Supply Chain Management Desktop Value Cyber security Business Owner Electronic Medical Records Time Management Organization Accountants Public Cloud Database Google Wallet Smart Devices Recovery Workplace Competition Banking Audit Messenger Spyware Deep Learning Remote Working Trend Micro LiFi Health IT Entrepreneur AI Equifax File Sharing Business Metrics Digital Security Cameras Tactics Hosted Solution Electronic Health Records Hard Drive Disposal Transportation Documents Scams Redundancy Application Books Username Cache Business Intelligence Wasting Time Society eCommerce Freedom of Information Modem Inbound Marketing Unified Threat Management Language Startup Workers Videos Addiction Surveillance email scam Securty Cables Navigation Printing Domains Reading Monitors Mobile Security CCTV Visible Light Communication Managing Costs Windows 8 News SSID User Tip Touchscreen Legislation Media Network Management Development Computer Malfunction Employer/Employee Relationships Electronic Payment Point of Sale Evernote Emergency Relocation Vendor Mangement Displays Advertising Virtual Machine Tech Support Optimization Fake News Shortcuts Proxy Server Work/Life Balance Reviews Emails Samsung

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?