Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Technology Cure Blindness? We’ll See!

b2ap3_thumbnail_wireless_retina_implants_400.jpgWireless technology is a staple in the office, but it’s making leaps and bounds in the medical industry, too. With innovations like wireless sensors, pumps, and other Internet of Things devices that can communicate with each other, medical care can be provided in unprecedented ways. But what would you say if we told you that wireless technology can give the blind back their sight?

Well, these patients may not have perfect sight, but they can regain their ability to see to a certain degree. While there are several retinal implants that help victims of degenerative eye diseases, the Argus device by Second Sight is mostly used to help patients suffering from retinitis pigmentosa-- a hereditary condition in which the light-sensitive cells in the retina depreciate. In other words, the disease gradually erodes the vision of the victim until they’re unable to see anything but the brightest of lights. The Argus can give victims of this crippling condition another chance at living a normal life.

The Argus is a small device that is designed to take the place of some functions of the retina, aiding in sight. It sits on the patient’s retina and receives images wirelessly from a camera mounted on a special pair of glasses. The Argus then converts the images received into electromagnetic pulses, which communicate with the brain via the optic nerve much like a normal retina does. Though the images seen by patients aren’t necessarily full-color, perfect visions of the outside world; patients describe seeing rough black and white renditions, which certainly beats seeing nothing but darkness.

Of course, the inside of the human body isn’t a very hospitable environment for technology, even under the best conditions. Considering the body is full of salt, electronics can corrode and deteriorate over time. The main challenge is creating a device that is capable of withstanding the conditions inside the human body, while making it small enough to not be obtrusive to the human eye.

At first, the Argus only had 16 electrodes, which offered a limited amount of vision for the patient. The modern versions of Argus use 60 electrodes, which allow patients to “see” much better. As time goes on, Second Sight hopes that Argus can provide even better vision for its patients, as well as color vision. If there’s any question of whether the Argus is effective, watch this video.

In the future, these types of eye implants could be used to treat many different kinds of blindness, including optic nerve damage, diabetic retinopathies, glaucoma, and more. However, this might not be for quite some time, considering how the technology would have to imitate the function of the optic nerve, which demands a direct connection to the brain.

With so many great new technologies coming into existence, it’s only a matter of time before technology can be used to help even more people eliminate their physical handicaps. What are your thoughts on using bionic technology to help those in need? Do you think that someday science will have the power to restore vision completely? Let us know in the comments, and be sure to subscribe to our blog for more great tech news.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Upgrade Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Social Media Saving Money Holiday Gadgets Chrome Virtualization Tech Term Automation Managed IT Services Microsoft Office Managed Service Computers Facebook Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Health Networking IT Support Internet of Things Hacking Wi-Fi Covid-19 Information Technology Managed Service Provider Spam Alert Remote Information Office 365 Telephone Systems Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Mobility Mobile Computing Encryption Applications Data Breach Application Human Resources Law Enforcement Big Data Remote Monitoring Password Money App History Training VPN Government Remote Computing Blockchain Private Cloud Paperless Office Mobile Office How To Managed IT Apps Office Tips Data Storage Patch Management WiFi Vulnerability IT solutions Windows 7 Word Entertainment Website Gmail Budget Google Drive Settings Servers Two-factor Authentication Avoiding Downtime Data Security Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Voice over Internet Protocol Flexibility Marketing Wireless End of Support The Internet of Things Education Physical Security Lithium-ion battery Scam Safety Data Protection Employee/Employer Relationship USB HIPAA Sports Redundancy RMM Firewall Keyboard Vendor Management Virtual Reality Apple Social Staff Software as a Service Telephone System User Error Save Time Machine Learning Meetings Connectivity Remote Work Cleaning Vendor Risk Management Hacker Managed Services Conferencing Display DDoS Shadow IT Fraud Processor Legal Business Intelligence SharePoint Remote Worker Printer Bluetooth Audit Internet Exlporer Worker Hard Drive IT Management Cryptocurrency Botnet Customer Service PDF Environment IT Plan Computing Comparison IT Consultant Fax Server Proactive IT CES Unsupported Software Best Practice SaaS Humor YouTube Charger Black Market Content Management Business Technology Access Control Compliance Digital Signage OneNote Computer Care Current Events Network Congestion Virtual Assistant eWaste Document Management Telephony Authentication Solid State Drive Wireless Technology Samsung Downtime Procurement How to Workplace Strategy Net Neutrality Value Data storage Update Help Desk Wearable Technology Automobile Spam Blocking Printing Electronic Medical Records Retail Hard Drives Virus Instant Messaging Google Docs Robot Computing Infrastructure Excel Hiring/Firing Identity Theft Managed Services Provider Unified Threat Management Going Green Computer Accessories Biometrics Virtual Desktop Database Remote Workers Battery Augmented Reality Audiobook Tools Search Engine Email Best Practices Twitter IT Assessment Science Manufacturing NIST Touchpad Television Business Mangement Computer Tips Smart Tech Managed IT Service Trending Security Cameras Distributed Denial of Service Politics Virtual CIO Customer Relationship Management Advertising Addiction OneDrive Amazon Biometric Security Analyitcs Public Computer Recycling Peripheral Regulations Wiring Digital Security Cameras Printer Server Programming Practices Using Data Notifications Transportation Computer Fan Cache Copiers Rootkit Amazon Web Services 5G Quick Tip Criminal Safe Mode Antivirus GDPR Ergonomics Relocation Workers Hosted Computing Benefits Smartwatch OLED FENG Wireless Internet Development Windows 8 Online Shopping PCI DSS IBM Virtual Machine IT service Video Games File Sharing Worker Commute Flash Camera 2FA Inventory Fiber Optics Smart Technology Specifications Employee Cabling Experience Wire Messaging Tablet Evernote Policy Supercomputer Hypervisor Travel Domains Scalability Software Tips Business Owner Sync Printers Dark mode Emails Trend Micro Millennials Default App IaaS Maintenance Smart Office SMS NarrowBand Wireless Charging Procedure Bloatware Saving Time Consultant Search Virtual Private Network dark theme Analytics iPhone Netflix Shopping Two Factor Authentication Workforce Google Search IT Infrastructure Root Cause Analysis AI Tablets Cables FinTech Entrepreneur Knowledge Music Bing Best Available HBO WIndows 7 Skype Project Management Files Nanotechnology Social Network Telecommuting Investment Shortcut Data loss Chromecast Cortana Employees Cost Management Leadership Digital Signature Employee/Employer Relationships Troubleshooting Outlook Start Menu Warranty Windows 365 Social Networking Colocation Uninterrupted Power Supply ISP ROI Screen Mirroring HVAC Video Conferencing Loyalty Google Apps Sales Monitor Analysis Bitcoin Books Shortcuts Frequently Asked Questions User Running Cable Mobile Administrator Point of Sale PowerPoint Windows 10s Devices Personal Windows Media Player Cryptomining Cast Enterprise Content Management Supply Chain Management Memory Monitoring Reputation webinar Accountants Batteries Streaming Media Emergency Tip of the week MSP Managing Stress Content Professional Services Microchip Windows 8.1 Public Cloud Thought Leadership Digitize Tech Support Employer Employee Relationship Credit Cards Windows Server 2008 R2 Techology Password Management Laptop Assessment Password Manager Customer relationships Cameras Customers Multi-Factor Security Windows Server 2008

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code