Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Basic Economics Is Slowing Down Moore’s Law

b2ap3_thumbnail_transistor_moores_law_400.jpgIn 1965, the technological landscape was much different from what we see now. The idea of having a small computer in your pocket in the form of a smartphone was but a distant dream. Now, it’s commonplace for all but the youngest of children to have a smartphone. How is this possible? Well, it’s all thanks to Moore’s law, which has led the development of new technology for the past 50 years.

Moore’s law is a series of observations made by the co-founder of Intel, Gordon Moore, that were published in Electronics Magazine in 1965. The concept behind Moore’s law is that the number of processors via a given die area would double every two years, effectively doubling the power output of a machine. This, naturally, leads to incredibly powerful technology that’s faster and more responsive than previous models.

As you can see by simply looking out your front door, we live in a technology-laden society. There are cars that drive themselves, and security systems that can receive commands from a homeowner's smartphone. Some argue that technology has finally caught up with Moore’s law, claiming that technology manufacturing can no longer keep up with the rate at which processors are growing. As reported by ComputerWorld:

Conventional computers could be replaced by quantum computers and systems with brain-like, or neural chips, which function differently than current processors. Silicon could also be replaced by chips made using new materials, such as graphene or carbon nanotubes.

When you think about it, this makes sense. The physical limitations of a piece of hardware can be difficult to work around. Chips can only get so small before other materials or resources must be considered. Despite these continuous roadblocks, Intel challenges Moore’s law at every turn, always pushing toward new and improved technology that revolutionizes the world. This, in turn, helps make technology cheaper for both businesses and consumers.

From an economical standpoint, however, it’s growing more difficult to justify building new, specialized factories dedicated toward producing new, smaller chips. This is due to the overall decrease in the return-on-investment that comes from driving consumer costs down. Yet, despite these shortcomings, researchers are dedicated toward finding new materials that make chips smaller and more efficient, in order to keep Moore’s law going strong.

Moore’s law is surrounded by the legacy it has achieved over the past 50 years, continuously urging the human race to expand and move beyond the limitations of technology. Even if Moore’s law is indeed limited in scope, it continues to inspire people to innovate and come up with new solutions.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Information Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Compliance Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Virtualization Data Security Managed Services Apps Two-factor Authentication Mobile Office Vendor App Employer-Employee Relationship Voice over Internet Protocol BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking BDR Conferencing Computing Hacker Physical Security Information Technology Avoiding Downtime Access Control Marketing Office 365 HIPAA Applications Managed IT Services How To Healthcare Operating System Computers Virtual Private Network Risk Management Website Health Analytics Office Tips Augmented Reality Router Retail Storage Password Bring Your Own Device 2FA Big Data Help Desk Going Green Patch Management Managed IT Service Remote Workers Save Money Remote Monitoring Vulnerability Telephone End of Support Customer Service Vendor Management Cybercrime Cooperation Free Resource Display Project Management Windows 7 Printer Paperless Office Microsoft 365 Infrastructure Solutions Firewall Document Management The Internet of Things Scam Windows 11 Data loss Monitoring Social Excel Professional Services Saving Time Virtual Machines Robot Customer Relationship Management Settings Printing Wireless Downloads iPhone Content Filtering Licensing Hacking IT Management Presentation VPN YouTube Meetings Vulnerabilities Entertainment Data Privacy Cryptocurrency Wireless Technology Images 101 Computer Repair Virtual Desktop Telephone System Multi-Factor Authentication Mobility Data storage LiFi Cost Management Word Outlook Machine Learning Money Employees Integration Humor User Tip Modem Mobile Security Safety Maintenance Processor Sports Antivirus Mouse Holidays Data Storage Smart Technology Supply Chain Administration Video Conferencing Managed Services Provider Distributed Denial of Service Workplace IBM Legal IT solutions Gig Economy How To Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Business Growth Notifications Travel Regulations Compliance Identity Evernote Paperless Co-managed IT Techology Google Maps Bookmark Cortana Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care Alt Codes Downtime Unified Threat Management Financial Data History Business Communications Competition Break Fix Scams Unified Threat Management Hosted Solution Browsers Smartwatch Connectivity IT Upload Procurement Azure Hybrid Work Typing Social Network Telework Network Congestion Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Google Drive User Error User CES Knowledge IoT Communitications Trends Supply Chain Management Point of Sale Customer Resource management FinTech 5G Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance IP Address Google Docs Unified Communications Data Analysis Experience Star Wars IT Assessment Running Cable Tech Support Gamification Flexibility Staff Value Business Intelligence Bitcoin Network Management Google Wallet Organization Monitors Social Networking Legislation Shortcuts Ransmoware Recovery Fileless Malware Digital Security Cameras Smart Devices Laptop Websites Content Remote Working Wearable Technology Memory Vendors Hard Drives Windows 8 Domains Drones Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce SharePoint Directions Videos Electronic Medical Records Assessment Electronic Health Records Halloween Wasting Time Threats Refrigeration Public Speaking Lenovo Writing Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Lithium-ion battery Microchip Virtual Reality Internet Exlporer Software as a Service Entrepreneur Scary Stories Private Cloud Username Managing Costs Amazon Hacks Server Management Superfish Identity Theft Fun eCommerce Black Friday SSID Virtual Assistant Outsource IT Deep Learning Twitter Database Surveillance Error IT Technicians Virtual Machine Environment Media Undo Education Proxy Server Reviews Social Engineering Cookies Cyber Monday Medical IT Tactics Development Hotspot Transportation Small Businesses Remote Computing Mirgation Hypervisor Displays Mobile Computing PowerPoint Tablet Shopping Search Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Application Best Practice Alert Buisness File Sharing Management PCI DSS Dark Data Chatbots Navigation Managed IT

Blog Archive