Smart assistants, self-driving cars and virtual reality – all examples of recent technology that, if it isn’t in your life already, will be arriving there soon. Modern focus is heavily on developing gadgets for our everyday lives that keeps us healthier, safer, and with more time to do the things we love. Why has it suddenly taken off? Well, if we look a little closer, it hasn’t. Technology revolutions have been happening for millennia, with some historic inventions being unsurpassed by even cutting-edge creations.
One of the oldest mechanised methods for measuring time is the water clock, or clepsydra. Used all across the ancient world, time was measured by the volume of water flowing into (inflow) or out of (outflow) a vessel. The flow was usually controlled using a float regulator, and the time could be read by markings on the vessel or an indicator stick.
While most of our clocks nowadays run off electricity, this method of time-keeping was used for thousands of years, and we still use float switches in our everyday life.
An improved version of the float switch in a water clock can be found in toilets all around the world, relying on their cisterns to flush.
The mechanism is satisfyingly simple; when you press the handle, an internal lever raises a piston, allowing water to be siphoned from the cistern into the bowl. As the cistern empties the ballcock (float switch) lowers, pulling the attached end of the float rod. At the opposite end of the float rod, the inlet valve is opened and the cistern fills until the ballcock floats to its original position, closing the valve.
The domestic microwave oven is celebrating over 70 years in our kitchens. The technology relies on a cavity magnetron, which creates electromagnetic waves and was originally intended for use in radar equipment during World War II.
It’s handiness as a cooking implement was discovered completely incidentally, when a researcher noticed that during the course of his work, a chocolate bar in his pocket has melted. He then tested his findings using popcorn (genius), followed by an egg (not so genius). The company he worked for, Raytheon, patented the microwave cooking process, paving the way for many marvellous meals in our diets today.
While perhaps not as visually impressive as say, the Roman Aqueducts, the technology used in pumping water around our kitchens and bathrooms is fairly remarkable. Using a combination of valves, pumps and level switches, most water tanks are self-operating and protect themselves from damage.
This is mostly co-ordinated by a level switch inside the tank, which detects internal water levels and triggers certain actions if the tank is getting full or running empty. One function controls the input valve (closing it to prevent overfill), and the other regulates the pump – aided by a flow switch. It’s this simple, hidden switch that prevents our boilers from bursting or pumps from burning out on a daily basis.
Thermostats are another historic technology in our homes. The earliest recorded use of a thermostat was in 1620, and used mercury to adjust the temperature of a poultry incubator. Over two centuries later, an adaptation used two metals to open or close a circuit, as they contracted and expanded in response to the ambient temperature – a model which is still used in home central heating systems.
Modern thermostats are often digital, and rely on thermistors or semiconductors to monitor a room’s temperature. Despite this, there are still mechanical devices in our ovens, electric showers and kettles.
Despite its name, the Archimedes screw actually predates its namesake, and is believed to date back to around 700 – 680 BC. The design is ingenious in its simplicity, and consists of a helical surface – like the coils of a screw – contained inside a hollow pipe. The pipe is turned at the top by a handle or mill, dragging liquid upwards through the coils.
Historically the screw has been used to drain water from mines and fields (notably in the Netherlands), elevate grain into silos, and safely transport liquid-born creatures between ponds and tanks. If you don’t have much use for these at home, here’s one more for you; this technology also provides us with the magic of chocolate fountains.
So, next time you’re on your sofa dreaming about robot butlers, food printers and paying for everything with a fingerprint, maybe take a minute to sit back and appreciate all the low-tech gadgets you take for granted!
This article was written by Dakota Murphey.
6 Unexpected Security Concerns, and How to Prepare
As powerful as the Internet is right now, it’s impossible to even imagine where it will go over the next years and beyond. But, as fast as security protection continues to improve, hackers seem to improve even more quickly. Everything from new devices to apps…
Your Business Needs These 13 Digital Security Solutions – Here’s How To Get The Most Out Of Each
How would you characterize your organization’s digital security posture? If you’re not sure how to answer this question, or perhaps would prefer not to answer it at all, you’re not alone. Countless decision-makers, from uber-competent CTOs and CISOs to CEOs and COOs who couldn’t code…
Louisiana And Oklahoma Introduce Digital Identification To Prevent Fake ID Use
Digital ID in Louisiana Utilizing digital IDs has been a commonly broached topic for a while now. Although most states are only either deliberating their helpfulness or in the utmost initial stages, Louisiana has moved forward. The primary introduction of this technology was done back…
ScanGuard Review – Here is What You Should Know
Doesn’t it sound good and satisfying to have a goop-performing antivirus that is reliable enough? Yes, it is. For that reason, you need to be extra careful when you are in search of a good antivirus. Put all the necessary factors into consideration so that…
The Emerging Need for Social Media Security
By the time you’ve finished reading this sentence, nearly 700 passwords have been stolen from social media accounts across the world. Social media security breaches have the potential to cause up to $6 trillion in cybercrime damages by 2021, up from $3 billion in costs…
- 3D Printing
- App Dev
- Artificial Intelligence
- Arts and Entertainment
- Big Data
- Blockchain Tech
- Business Technology
- Car Technology
- Cloud Computing
- Cloud Storage
- Computer and Technology
- Conference Calling
- Coupons and Deals
- Cyber Security
- Dark Left 1
- Data Center
- Data Recovery
- Digital Arena
- Digital Marketing
- Edu Tech
- Email Marketing
- Google Glass
- Guides and Tutorials
- Health and Fitness
- Home Improvement
- Home Security
- Internet and Businesses Online
- Internet Marketing
- IT Careers
- Mobile Apps
- Mobile Security
- New Tech
- Online Shopping
- Project Management
- Reference and Education
- Reputation Management
- Sales & Marketing
- Shopping and Product reviews
- Small Business
- Social Media
- Tech Trends
- Technical Support
- Technology in Education
- Tips & Tricks
- Tips And Tricks
- Video Conferencing
- Virtual Reality
- Wearable Technology
- Web Design
- Web Development
- Web Hosting
Stranger No Danger: A Lesson In Building Trust And Rapport With Your Online Customers
“Don’t talk to strangers,” is probably one of the most universal lessons parents teach their kids. No matter where you are in the world, what your economic background is, or the kind of neighborhood you live in, your parents must have warned you of a…
How NetBase Uses Social Media Tools to Your Advantage
It is estimated that 80 percent of people in the United States are on social media. This means that companies are vying for the attention of over 260 million people. Companies are also vying for market share and lead-generation in the social media sphere….
3 Ways to Prepare For Cyber Security Risks That Employees Must Know
In a world where everything is much easier to do via mobile, app, or device, technology is not going to slow down. We’re all guilty of potentially owning more than one device, whether that is our personal phones, work phones, tablets or fitness trackers. All…
Non-Negotiable Elements For Your Business IT Security Plan
In 2019, having a business IT security plan is more important than ever. An IT security plan is the first line of defense you have for protecting your business – and your clients – against cybercriminals. Cybercriminals include hackers, who frequently obtain personal information with…
Businesses Need To Be Proactive When It Comes To Cyber Security
For business of any size, making sure they are not only compliant with security regulations but continually improving and adjusting the measures they have in place is vital. Quite often the factor which determines how a business approaches cyber security is the mindset of the…
How To Become A Cyber Security Analyst
What is Cyber Security? Cyber security is the practice of protecting a system or network from digital attacks. These attacks are generally aimed to retrieve or destroy sensitive information and it is a serious threat to all the organizations. Who is A Cyber Security Analyst…