Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Technology Cure Blindness? We’ll See!

b2ap3_thumbnail_wireless_retina_implants_400.jpgWireless technology is a staple in the office, but it’s making leaps and bounds in the medical industry, too. With innovations like wireless sensors, pumps, and other Internet of Things devices that can communicate with each other, medical care can be provided in unprecedented ways. But what would you say if we told you that wireless technology can give the blind back their sight?

Well, these patients may not have perfect sight, but they can regain their ability to see to a certain degree. While there are several retinal implants that help victims of degenerative eye diseases, the Argus device by Second Sight is mostly used to help patients suffering from retinitis pigmentosa-- a hereditary condition in which the light-sensitive cells in the retina depreciate. In other words, the disease gradually erodes the vision of the victim until they’re unable to see anything but the brightest of lights. The Argus can give victims of this crippling condition another chance at living a normal life.

The Argus is a small device that is designed to take the place of some functions of the retina, aiding in sight. It sits on the patient’s retina and receives images wirelessly from a camera mounted on a special pair of glasses. The Argus then converts the images received into electromagnetic pulses, which communicate with the brain via the optic nerve much like a normal retina does. Though the images seen by patients aren’t necessarily full-color, perfect visions of the outside world; patients describe seeing rough black and white renditions, which certainly beats seeing nothing but darkness.

Of course, the inside of the human body isn’t a very hospitable environment for technology, even under the best conditions. Considering the body is full of salt, electronics can corrode and deteriorate over time. The main challenge is creating a device that is capable of withstanding the conditions inside the human body, while making it small enough to not be obtrusive to the human eye.

At first, the Argus only had 16 electrodes, which offered a limited amount of vision for the patient. The modern versions of Argus use 60 electrodes, which allow patients to “see” much better. As time goes on, Second Sight hopes that Argus can provide even better vision for its patients, as well as color vision. If there’s any question of whether the Argus is effective, watch this video.

In the future, these types of eye implants could be used to treat many different kinds of blindness, including optic nerve damage, diabetic retinopathies, glaucoma, and more. However, this might not be for quite some time, considering how the technology would have to imitate the function of the optic nerve, which demands a direct connection to the brain.

With so many great new technologies coming into existence, it’s only a matter of time before technology can be used to help even more people eliminate their physical handicaps. What are your thoughts on using bionic technology to help those in need? Do you think that someday science will have the power to restore vision completely? Let us know in the comments, and be sure to subscribe to our blog for more great tech news.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Business Management Users Phishing Windows Managed IT Services Upgrade Outsourced IT Data Backup Ransomware Windows 10 Cloud Computing Data Recovery Office Server Save Money Passwords Windows 10 Virtualization Gadgets Social Media Saving Money Holiday Tech Term Chrome Automation Managed Service Microsoft Office Managed IT Services Computers Artificial Intelligence Cybercrime Operating System Facebook Wi-Fi BYOD Health Mobile Device Management Networking IT Support Hacking Internet of Things Information Technology Alert Information Remote Spam Managed Service Provider Office 365 Covid-19 Telephone Systems Recovery Employer-Employee Relationship Bandwidth Router Social Engineering Mobility BDR Mobile Computing Password Application Human Resources Money Encryption Applications Data Breach Remote Monitoring Big Data Law Enforcement App History Managed IT VPN Blockchain Apps Paperless Office Data Storage Patch Management Remote Computing Mobile Office Government Office Tips Private Cloud Training How To Marketing Gmail WiFi IT solutions Bring Your Own Device Entertainment Data Management Settings Website Work/Life Balance Budget Two-factor Authentication Vulnerability Windows 7 Word Mouse HaaS Google Drive Infrastructure Servers Voice over Internet Protocol Avoiding Downtime Data Security Wireless Flexibility Save Time Lithium-ion battery Cleaning Firewall USB Software as a Service Conferencing Telephone System Staff Machine Learning Virtual Reality End of Support Scam Apple Connectivity Remote Work Education Physical Security Social Safety HIPAA Sports User Error Redundancy Vendor Management Vendor Meetings Keyboard Managed Services Display Risk Management Data Protection Hacker Employee/Employer Relationship RMM The Internet of Things SharePoint CES Computing Spam Blocking Electronic Medical Records Data storage Automobile Business Technology Content Management Access Control Customer Service Printer Hiring/Firing Bluetooth Environment Digital Signage Computing Infrastructure Virtual Assistant Authentication Fax Server Going Green SaaS Battery Procurement IT Consultant Business Intelligence Update Net Neutrality Workplace Strategy Shadow IT Audit Legal Worker Humor Network Congestion IT Management Help Desk Google Docs Internet Exlporer eWaste Printing Botnet Identity Theft IT Plan PDF Managed Services Provider Unsupported Software Database Augmented Reality Proactive IT Wearable Technology Retail Fraud Hard Drives Charger Best Practice Remote Workers Instant Messaging Robot Excel Compliance Remote Worker YouTube Black Market Processor OneNote Computer Care Current Events Cryptocurrency Biometrics Virtual Desktop Telephony Virus Hard Drive Samsung Document Management Unified Threat Management Comparison Computer Accessories Solid State Drive Wireless Technology DDoS Downtime How to Value Outlook Smartwatch Leadership Files Troubleshooting File Sharing Ergonomics Inventory Development Customer Relationship Management Start Menu Specifications OLED Cameras Camera Chromecast Distributed Denial of Service Loyalty Wire PCI DSS Evernote Virtual Machine Analyitcs Screen Mirroring Frequently Asked Questions Travel Employee Colocation Books 2FA Uninterrupted Power Supply Fiber Optics Programming Messaging Mobile Millennials Cabling Windows 10s Printers Monitor Smart Office Policy Wireless Charging Hypervisor Cast Tip of the week webinar Emergency Dark mode Antivirus Trend Micro SMS Professional Services Workforce Default App Windows 8 Public Cloud Printer Server Employer Employee Relationship Virtual Private Network Assessment Reputation Procedure Streaming Media IT service Cables Saving Time Windows Server 2008 Google Search Content dark theme Tech Support Shopping Laptop Nanotechnology AI Tools Telecommuting IT Infrastructure Tablet Techology Project Management Television Customers FinTech Domains Cortana Bing Audiobook Digital Signature Social Network Touchpad IaaS Maintenance Investment Warranty Public Computer HVAC Employees Google Apps Employee/Employer Relationships Bloatware Regulations ISP Politics Advertising Transportation Windows 365 Analysis Devices Video Conferencing ROI Tablets Computer Fan Rootkit Administrator Enterprise Content Management Sales Notifications Bitcoin Entrepreneur Shortcuts Personal Cryptomining Consultant Workers Benefits MSP Point of Sale Accountants Thought Leadership Supply Chain Management Shortcut Credit Cards FENG Analytics Microchip IBM Relocation Password Management Monitoring Password Manager Batteries Cost Management Digitize Social Networking Flash Multi-Factor Security Best Available Smart Technology Windows 8.1 Twitter Windows Server 2008 R2 WIndows 7 Video Games Search Engine Worker Commute Supercomputer NIST Customer relationships Business Mangement Software Tips IT Assessment Sync Trending Manufacturing Experience Emails Email Best Practices Running Cable Smart Tech Addiction Amazon Memory Scalability Security Cameras Business Owner Computer Tips Recycling Managed IT Service Practices OneDrive Biometric Security Netflix Two Factor Authentication Wiring Virtual CIO NarrowBand Windows Media Player Cache Peripheral Amazon Web Services User Root Cause Analysis PowerPoint Search Knowledge iPhone Music Safe Mode Digital Security Cameras Criminal Using Data HBO Hosted Computing Copiers Skype 5G Science GDPR Wireless Internet Quick Tip Online Shopping Managing Stress Data loss

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code