Feeds

Chinese go beyond binary with ternary molecule

Memory sandwich molecule munches three bits

SANS - Survey on application security programs

Scientists in Singapore and Taiwan have developed an organic molecule which can have three electrically-readable states, making a ternary rather than binary device possible.

Binary devices have two electrically readable states, corresponding to a one or zero. Ternary devices have three: zero, one or two. Consequently they could, if built and programmed, store or process more information than binary RAM or NAND.

Ternary Memory schematic

The scientists built a prototype device which functioned as a plastic DRAM cell. It was composed of a new synthesised organic azo compound sandwiched between aluminum and indium tin oxide (ITO) electrodes. Azo compounds may have vivid yellow, orange and red colours, and are used in dyes.

According to a American Chemical Society journal abstract the proto cell was "based on a donor-functionalized polyimide (TP6F-PI), which exhibited the ability to write, read, erase, and refresh the electrical states. The device had an ON/OFF current ratio up to 105, promising minimal misreading error. Both the on and off states were stable under a constant voltage stress of 1 V and survived up to 108 read cycles at 1 V."

The azo compound exhibits a high, medium or low conductivity state depending on the voltage applied to it through the aluminium electrodes and these three states can be read out as 0, 1 or 2. The abstract says: "Two electron pull groups and one electron push group are identified as the species responsible for electron flow."

It's very interesting science, but the entire binary computing infrastructure would have to alter to use it. Don't expect a ternary iPad in your lifetime. Sorry! ®

Combat fraud and increase customer satisfaction

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Apple patent LOCKS drivers out of their OWN PHONES
I'm sorry Dave, I'm afraid I can't let you text that
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.