Feeds

NEC outs spintronics content-addressable memory tech

Holds data when power cut, Flash style

High performance access to file storage

NEC has claimed to have come up with the World's first memory cell to use new form of storage that's as quick as Ram yet as non-volatile as Flash.

The memory - co-developed with Japan's Tohoku University - is based on 'spintronics' technology: kit that utilises electrons' rotational characteristics and their resulting ability to influence a current by magnetic force, and vice versa.

Essentially, the NEC memory cell stores a bit by setting the spin direction of the electrons flowing through it.

The spin characteristics are retained when the cell's power is cut, so the data is retained too, as it is with Flash.

Unlike Flash, however, once powered the NEC cell's stored value can be read in 5ns, the company claimed. That's the same as 1600MHz DDR 3.

That said, NEC was keeping mum on how fast - or not - the cell is when it comes to writing the data value.

The cell consumes 9.4mW of power when running.

That said, NEC's memory isn't equivalent to a simple Ram cell. It is a "content-addressable memory" (CAM) unit, so rather than taking an address and sending back the data, the system searches - in one operation - its entire bank for the data passed to it and return the addresses or addresses at which the data can be found.

The upside is speed, the downside is complexity, each storage cell being accompanied by logic that compares the cell's stored value with the input data. Still, by some clever transistor-sharing jiggery-pokery, NEC reckons its new cell is half the size of a standard Ram-based CAM cell.

Handy, that, because CAM chips are big, making them pricey to make and power hungry.

NEC and co. have now to refine the cell and work out how to produce a version that can be manufactured for use in real machines.

Reducing the write-time is central to the technology's commercialisation too.

So don't expect spintronics storage chips in your fast-boot laptop any time soon. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.