ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IBM Drops Bomb on the Industry By Storing Data on an Atom

IBM Drops Bomb on the Industry By Storing Data on an Atom

Data storage has long been a major pain point for technology development, but a rather large (or small) breakthrough has resulted in data being stored on a single atom. The development comes from researchers at IBM, and it could have a potentially nuclear impact on the way that data storage functions.

The research team conducted experiments in regard to high-density storage in an attempt to see just how small they could go. The complex process yielded promising results, as they were able to store data on just a single atom.

Compare this to the current drives, made up of roughly 100,000 atoms, that are used to store a bit of data. Quite the improvement, huh?

An even more impressive feat was achieved in regard to the actual reading of the data. If bits are stored on two atoms, it’s possible that it can be read with only a nanometer in between the host atoms. Whether or not you understand all of the scientific or technical details, it’s clear that this means data could eventually be stored on very, very small mediums moving forward.

However, before you get too excited about these developments, we want to remind you that these are only experiments, not actual movements to make this type of data storage available to the public… yet. The technology used to store this data on an atom is incredibly sensitive, so much to the point where it just won’t work if it’s not in a controlled environment. In order for this type of technology to work, it needs to be stored at a very low temperature. Their sole goal was to find the smallest possible way to store data--not to find the smallest, commercially-viable way to store it.

Of course, this doesn’t necessarily mean that the option isn’t going to be seen at all. While it might be uncommon at best, the research has proven that it is possible, so who knows what researchers might come up with in the future to make this type of storage commonplace.

If you think about it, this trend is pretty much par for the course in terms of data storage. Just a few decades ago, you may have been storing information on a hard disk drive the size of a brick, when now you can hold that much data (and more) on a flash drive or SD card.

What are your thoughts on “atomic data?” Do you think the power of the atom can be harnessed to change computing as we know it? What kind of new and exciting technologies do you think that such a discovery will bring about? Let us know in the comments, and be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 09 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Data Recovery Managed IT Services Communication Productivity Quick Tips Social Media VoIP Users Mobile Device Tech Term Automation Facebook Business Continuity Windows 10 Disaster Recovery Passwords Holiday Covid-19 Managed Service IT Support Browser Apps Windows 10 Cloud Computing Outsourced IT Miscellaneous Data Management Internet of Things Managed Service Provider Remote Work Government Saving Money Operating System Workplace Strategy Artificial Intelligence Managed IT services Networking Gadgets Windows Remote Virtualization Spam Server WiFi Bandwidth Blockchain Encryption Mobile Device Management Business Technology Information App Office Apple History Employee/Employer Relationship Two-factor Authentication Information Technology Office 365 Budget Gmail Health Analytics Access Control Data Security Cybercrime Wi-Fi Conferencing BDR Big Data Hacking Cost Management IT Management Employer-Employee Relationship Vendor Training Document Management Hacker Voice over Internet Protocol Remote Computing Save Money Patch Management Compliance Remote Monitoring Help Desk Best Practice Applications Retail Legal Alert Vulnerabilities Hiring/Firing Data storage Money Outlook Mobile Office Customer Service Password Unified Threat Management Firewall Managed Services Augmented Reality Data loss Word Project Management BYOD IBM Website Computing Vendor Management Hard Drive Search... YouTube Storage Twitter Google Maps Scam Law Enforcement Laptop End of Support Printer Windows 11 VPN Monitoring Healthcare User Update Remote Workers Social Sports Travel SaaS DDoS Virtual Reality Windows 7 Social Engineering Free Resource Cryptocurrency Paperless Office Chrome Antivirus Black Market How To iPhone Cleaning Maintenance Education Cortana Robot Content Filtering Mobile Computing Marketing Websites Router Meetings Running Cable Mobility Data Breach The Internet of Things Holidays Automobile Processor Cooperation How To Wireless Technology Microchip Video Conferencing eWaste Flexibility Virtual Machines Computer Repair Multi-factor Authentication Downtime Tech Terms Hack HIPAA Safety Identity Theft Professional Services Notifications Managed IT Digital Unified Communications Virtual Desktop Saving Time Experience Google Docs Bluetooth Managed Services Provider Taxes Distributed Denial of Service Computers Bitcoin Virtual Private Network Office Tips Memory Private Cloud Telephone Disaster Current Events Physical Security PowerPoint Excel Solutions Administration Politics Settings Lithium-ion battery Machine Learning Presentation Images 101 Integration Specifications Start Menu Display Computer Care IT Consultant Solid State Drive Downloads Processors Virtual Assistant Vulnerability Employees Customer Relationship Management Chromebook Software as a Service Co-Managed IT Drones Avoiding Downtime Entertainment Data Protection Health IT Equifax Windows 8 Supercomputer SSID Google Calendar Media Virus Tactics Development Hard Drive Disposal Employer/Employee Relationships Virtual Machine Advertising Motion Sickness Relocation Username Public Speaking Displays Reviews Work/Life Balance Google Drive Startup Optimization Tech Support Freedom of Information Smart Technology Streaming Media Comparison Navigation 2FA Addiction Keyboard email scam Teamwork Mobile Security Hypervisor Knowledge Data Storage Hard Drives Corporate Profile User Tip Shopping Telephony Legislation intranet Employer Employee Relationship News Medical IT In Internet of Things Television Troubleshooting Evernote Paperless Wireless Hacks Network Management Shortcut Network Congestion Cabling SQL Server Licensing Environment G Suite Reliable Computing PCI DSS Heating/Cooling Writing Tablet Mouse Proxy Server Gig Economy VoIP Emails Humor Social Networking Tracking Fake News Supply Chain Windows XP Business Communications Service Level Agreement Internet Service Provider Computing Infrastructure Azure Device security Managed IT Service Web Server Scalability Management Regulations Compliance Administrator SharePoint Text Messaging Wireless Headphones Memes Proactive IT Digital Payment Microsoft Excel Workplace Business Owner Tech Human Resources Bring Your Own Device Going Green Net Neutrality Worker Business Cards Access Error Financial Data Bookmark Risk Management Time Management IT Music Public Cloud Scams Term Google Apps Staffing Download Piracy IP Address Spyware HTML Audit Telework Botnet Browsers Smartwatch Nanotechnology Communitications File Sharing Microsoft 365 Cables Inbound Marketing Google Play Rental Service Redundancy Upload Procurement Micrsooft Software License Flash Cache Social Network FinTech Data Analysis CES Telephone Systems Unified Threat Management Screen Reader IT Assessment Business Growth Workers Point of Sale Security Cameras Recovery Trends Supply Chain Management Competition Mobile Technology Value Devices Cyber security CCTV Shortcuts Electronic Payment Printing Customer Resource management Organization LiFi Fileless Malware Banking Touchscreen Smart Devices Entrepreneur Google Wallet Tip of the week Computer Malfunction Documents Messenger Emergency Gamification Remote Working Application Deep Learning Company Culture Telephone System AI Vendor Mangement Regulations Trend Micro Business Intelligence Be Proactive Phone System Directions Digital Security Cameras Business Metrics Backup and Disaster Recovery Electronic Health Records Hosted Solution Samsung Transportation Desktop Wasting Time Webcam Securty Books Content Uninterrupted Power Supply Electronic Medical Records Domains Language Business Mangement Accountants eCommerce Society Modem Workplace Strategies Videos Database Surveillance Tablets Managing Costs Visible Light Communication Reading Computer Accessories Monitors

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?