Feeds

UK boffins form nanotech taskforce

Says government has failed to act

High performance access to file storage

Nanotechnology will be the next industrial revolution, and if the UK wants a piece of the action, it has to move now to fund research in the subject.

So say academics from the University of Surrey, which has formed a nanotechnology taskforce, to develop a "coherent strategy for funding nanotechnology research".

The university says it was driven to act by the government's failure to do so, a failure it says is contributing to the erosion of the UK's technological leadership.

The researchers behind the taskforce argue that better communication is needed between academia and industry. This will help to identify the areas in which the UK could be a world leader, so that government funding can be focused where it will deliver the best possible results.

Chairman Dr Ian Gibson MP, said: "Nanotechnology will be the next Industrial Revolution, but if the UK wants to be a major part of it, the government needs to demonstrate its commitment to science."

The taskforce's stated goals include encouraging informed public debate about the technology, promoting its benefits, and addressing concerns about safety and ethical issues raised by the research.

Professor Ravi Silva, director of the Advanced Technology Institute at the University of Surrey, commented: "The work of UK scientists and technologists has demonstrated the case for the widespread potential benefits that nanotechnology can offer to society and industry. What is now needed is a co-ordinated effort supported by strategic funding from the government, to turn this potential into real benefits."

Bootnote

Dr Gibson, Labour MP for Norwich North, in among his more sensible comments on the subject, suggests that the 2012 Olympics will be the ideal place to showcase our skills in nanotechnology.

We're not quite sure what he means.

Is he suggesting augmenting our athletes with muscle-building nanobots? Or perhaps referring to the very small medals haul we're likely to secure? If the current downward trend continues, we might well need nano machines to help us find and count the gold atoms Team GB brings home.

Either way, Gibson must surely be given some kind of award for least likely association of two subjects. Well done, sir. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.