Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Technology Cure Blindness? We’ll See!

b2ap3_thumbnail_wireless_retina_implants_400.jpgWireless technology is a staple in the office, but it’s making leaps and bounds in the medical industry, too. With innovations like wireless sensors, pumps, and other Internet of Things devices that can communicate with each other, medical care can be provided in unprecedented ways. But what would you say if we told you that wireless technology can give the blind back their sight?

Well, these patients may not have perfect sight, but they can regain their ability to see to a certain degree. While there are several retinal implants that help victims of degenerative eye diseases, the Argus device by Second Sight is mostly used to help patients suffering from retinitis pigmentosa-- a hereditary condition in which the light-sensitive cells in the retina depreciate. In other words, the disease gradually erodes the vision of the victim until they’re unable to see anything but the brightest of lights. The Argus can give victims of this crippling condition another chance at living a normal life.

The Argus is a small device that is designed to take the place of some functions of the retina, aiding in sight. It sits on the patient’s retina and receives images wirelessly from a camera mounted on a special pair of glasses. The Argus then converts the images received into electromagnetic pulses, which communicate with the brain via the optic nerve much like a normal retina does. Though the images seen by patients aren’t necessarily full-color, perfect visions of the outside world; patients describe seeing rough black and white renditions, which certainly beats seeing nothing but darkness.

Of course, the inside of the human body isn’t a very hospitable environment for technology, even under the best conditions. Considering the body is full of salt, electronics can corrode and deteriorate over time. The main challenge is creating a device that is capable of withstanding the conditions inside the human body, while making it small enough to not be obtrusive to the human eye.

At first, the Argus only had 16 electrodes, which offered a limited amount of vision for the patient. The modern versions of Argus use 60 electrodes, which allow patients to “see” much better. As time goes on, Second Sight hopes that Argus can provide even better vision for its patients, as well as color vision. If there’s any question of whether the Argus is effective, watch this video.

In the future, these types of eye implants could be used to treat many different kinds of blindness, including optic nerve damage, diabetic retinopathies, glaucoma, and more. However, this might not be for quite some time, considering how the technology would have to imitate the function of the optic nerve, which demands a direct connection to the brain.

With so many great new technologies coming into existence, it’s only a matter of time before technology can be used to help even more people eliminate their physical handicaps. What are your thoughts on using bionic technology to help those in need? Do you think that someday science will have the power to restore vision completely? Let us know in the comments, and be sure to subscribe to our blog for more great tech news.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Business Continuity IT Support Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Windows Phishing Managed IT Services Upgrade Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Cloud Computing Data Recovery Office Windows 10 Passwords Tech Term Chrome Gadgets Virtualization Saving Money Holiday Social Media Managed IT Services Microsoft Office Automation Managed Service Operating System Cybercrime Artificial Intelligence Computers Facebook Internet of Things Health Hacking Wi-Fi BYOD Mobile Device Management Networking IT Support Managed Service Provider Covid-19 Alert Spam Office 365 Telephone Systems Remote Information Information Technology Recovery Employer-Employee Relationship BDR Social Engineering Mobility Bandwidth Router Law Enforcement Big Data Human Resources Remote Monitoring Password Money Mobile Computing Encryption Application App History Applications Data Breach Private Cloud Remote Computing Managed IT How To Mobile Office Apps Data Storage Patch Management Blockchain Paperless Office Office Tips Training Government VPN Avoiding Downtime Infrastructure Settings Voice over Internet Protocol Two-factor Authentication Data Security Mouse HaaS Flexibility Bring Your Own Device Data Management Work/Life Balance Marketing WiFi IT solutions Entertainment Website Budget Vulnerability Windows 7 Google Drive Wireless Word Gmail Servers Vendor Managed Services Firewall Display Virtual Reality Save Time Apple Employee/Employer Relationship Data Protection Social RMM Cleaning User Error Meetings End of Support Conferencing Physical Security Risk Management USB Education Hacker Scam Safety Telephone System Staff Software as a Service HIPAA Sports Machine Learning The Internet of Things Redundancy Lithium-ion battery Remote Work Keyboard Connectivity Vendor Management Identity Theft Customer Service Unsupported Software YouTube Database Environment Black Market Charger Fax Server Remote Workers Compliance Document Management OneNote Computer Care Processor Augmented Reality SaaS Fraud Solid State Drive Current Events Wireless Technology Downtime Telephony How to Samsung Hard Drive Remote Worker Virus Data storage Cryptocurrency Network Congestion Automobile Unified Threat Management Value eWaste Computer Accessories Computing Electronic Medical Records Spam Blocking Comparison Computing Infrastructure Going Green Hiring/Firing CES Wearable Technology Digital Signage Retail Hard Drives Printer Business Technology Content Management Bluetooth Instant Messaging Battery Robot Excel Shadow IT Access Control Legal Virtual Assistant Biometrics Virtual Desktop Business Intelligence Procurement Internet Exlporer Authentication Net Neutrality Workplace Strategy Audit Worker IT Consultant IT Management PDF Help Desk DDoS Printing Humor SharePoint Botnet Update IT Plan Proactive IT Managed Services Provider Best Practice Google Docs Experience Consultant Monitoring IBM Batteries Administrator Devices Smart Technology Enterprise Content Management Flash Windows 8.1 Scalability Analytics Digitize Business Owner Windows Server 2008 R2 MSP Accountants Antivirus Thought Leadership Credit Cards Best Available Software Tips Customer relationships Windows 8 Supercomputer NarrowBand Microchip Manufacturing Password Management Password Manager IT service WIndows 7 Sync Email Best Practices Search Emails IT Assessment Multi-Factor Security iPhone Twitter Computer Tips Tablet Managed IT Service Search Engine Security Cameras Two Factor Authentication Biometric Security NIST Business Mangement Domains Virtual CIO Netflix OneDrive Trending Root Cause Analysis Peripheral Files Smart Tech Addiction IaaS Amazon Maintenance HBO Digital Security Cameras Knowledge Using Data Chromecast Music Copiers Windows Media Player 5G Recycling User Skype Bloatware PowerPoint Data loss Quick Tip Colocation Uninterrupted Power Supply Wiring Practices Smartwatch Cache Amazon Web Services Outlook Ergonomics Tablets Leadership Troubleshooting Development Monitor OLED Safe Mode Criminal Managing Stress Start Menu Entrepreneur Screen Mirroring PCI DSS Loyalty Virtual Machine GDPR Hosted Computing Employee Wireless Internet Online Shopping Shortcut Frequently Asked Questions 2FA Cameras Fiber Optics Books Messaging Reputation Cabling Streaming Media File Sharing Mobile Cost Management Windows 10s Specifications Social Networking Content Cast Policy Hypervisor Tech Support Camera Inventory Wire Evernote Tip of the week Dark mode Techology webinar Trend Micro Laptop Emergency Public Cloud SMS Customers Employer Employee Relationship Default App Professional Services Travel Millennials Audiobook Procedure Assessment Saving Time Printers Running Cable Google Search Smart Office Wireless Charging Windows Server 2008 dark theme Memory Printer Server Shopping Touchpad AI IT Infrastructure Tools Workforce Politics FinTech Advertising Television Virtual Private Network Bing Cables Social Network Investment Notifications Telecommuting Employees Science Public Computer Employee/Employer Relationships Project Management Nanotechnology Transportation ISP Cortana Regulations Windows 365 Computer Fan Video Conferencing Relocation Rootkit ROI Digital Signature Customer Relationship Management Sales Bitcoin Warranty Shortcuts Distributed Denial of Service Benefits Cryptomining HVAC Google Apps Point of Sale Analyitcs Video Games Workers Personal FENG Supply Chain Management Analysis Programming Worker Commute

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code