Feeds

Behold! Or rather, don't: Bendy see-through DRAM

You like windows, you like bendy things, you like memory

3 Big data security analytics techniques

Boffins at Rice uni in the States have devised bendy transparent memory chips using pure silicon crystals.

James Tour, a polymath chemist at the university working at the Tour Lab - he is also a professor of mechanical engineering and materials science and of computer science, as well as Rice’s T.T. and W.F. Chao Chair in Chemistry, revealed the see-through memory chip an an American Chemical Society meeting in San Diego.

Transparent flexible RAM

Transparent flexible RAM (Rice University)

Tour said: “Generally, you can’t see a bit of memory, because it’s too small [and] silicon itself is not transparent. If the density of the circuits is high enough, you’re going to see it.”

A 2010 discovery showed that "pushing a strong charge through standard silicon oxide, an insulator widely used in electronics, forms channels of pure silicon crystals less than 5 nanometers wide. The initial voltage appears to strip oxygen atoms from the silicon oxide; lesser charges then repeatedly break and reconnect the circuit and turn it into nonvolatile memory. A smaller signal can be used to poll the memory state without altering it."

The Tour Lab has made a 2-terminal prototype device stackable in a 3D config attached to memory The Rice lab has since developed a working two-terminal memory device that can be stacked in a three-dimensional configuration attachable to a flexible substrate, giving us a bendy transparent memory.

We might end up wearing our memory devices. ®

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Brit boffins use TARDIS to re-route data flows through time and space
'Traffic Assignment and Retiming Dynamics with Inherent Stability' algo can save ISPs big bucks
Microsoft's Nadella: SQL Server 2014 means we're all about data
Adds new big data tools in quest for 'ambient intelligence'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.