Feeds

Back to the nano-mechanical future

Nano-cantilever memory solving flash conundrum

HP ProLiant Gen8: Integrated lifecycle automation

Feats of endurance

"The typical endurance rate of a flash memory is 10–100 thousand cycles. On the other hand, MEMS switches are known to have more than 100 million switching cycles. It can therefore be expected that the CNT memory device presented here can have endurance rates more than 1,000 times better than flash memory devices."

Operationally it is already faster than conventional NAND flash and the power consumption is claimed to be lower than other memory devices. The researchers say: "The actual time required to switch the cantilever on was found to be circa 130 ns with circa 145 ns for switching off. … much faster than the speed of conventional flash memories."

Regarding power consumption they say: "The MEMS switch is electro-statically activated and does not consume any current. Therefore, near-zero power is required for each switching operation."

Their invention seems pretty stable; 500-plus programming and erase cycles were demonstrated without degradation and the set and reset currents were unchanged after more than 11 hours of constant operation.

They also say that multinary, more than binary, programming is feasible, stating:

For this memory device, multi-level programming is realised by a simple change of voltage on the cantilever. Therefore, the controllability is much easier and the density of multi-level bits can be much higher than for flash memories.

The Nature Communications article is well worth reading, and free to read, if you want to know more. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.