Browse Definitions :
Definition

bionics

Contributor(s): Corinne Bernstein

Bionics is the replication of biological systems by mechanical and electronic systems. Physician and researcher Jack Steele coined the term bionics in 1958 to describe the study of biological organisms to solve engineering problems. 

In recent years, advancements in personal electronics have spurred new developments in bionics. Today, artificial hands are being made with sensors in the fingertips that can monitor and adjust the strength of the hand's grip. In 2018, IBM engineers demonstrated a brain-machine interface that combines deep-learning algorithms with commercial off-the-shelf (COTS) system components to train a robotic arm to operate by thought.

Bionics is often confused with cybernetics, the study of control mechanisms in human and machine systems. While the aim of bionics is to explore new ideas for building mechanical and electronic systems, cybernetics focuses on seeking the explanation for a living organism's behavior.

Bionics is also sometimes confused with bioengineering, which refers to using living things to perform industrial tasks. For example, using bacteria in paper batteries to supply electrical energy would be considered an advancement in bioengineering, not bionics.

This was last updated in August 2018

Continue Reading About bionics

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

What is your opinion on the advancements in bionics and the idea of a "bionic" future?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close