Stories
Slash Boxes
Comments

SoylentNews is people

posted by CoolHand on Thursday June 04 2015, @02:18AM   Printer-friendly
from the nano-nano dept.

Nantero, the company that invented carbon nanotube-based non-volatile memory in 2001 and has been developing it since, has announced that seven chip fabrication plants are now manufacturing its Nano-RAM (NRAM) wafers and test chips in preparation for mass production, which requires the product designs to be completed. The company has announced that aerospace giant Lockheed Martin and Schlumberger Ltd., the world's largest gas and oil exploration and drilling company, will be customers seeking to use its chip technology. The memory, which can withstand 300 °C temperatures for years without losing data, is natively thousands of times faster than NAND flash and has virtually infinite read/write resilience. Nantero plans on licensing its intellectual property to allow others to create gum stick SSDs using DDR4 interfaces. NRAM has the potential to create memory that is vastly more dense that NAND flash, as its transistors can shrink to below 5 nanometers in size, three times more dense than today's densest NAND flash. At the same time, NRAM is up against a robust field of new memory technologies that are expected to challenge NAND flash in speed, endurance and capacity, such as Phase-Change Memory and Ferroelectric RAM (FRAM).

You may want to take a look at Memristors too.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by maxwell demon on Thursday June 04 2015, @09:03AM

    by maxwell demon (1608) on Thursday June 04 2015, @09:03AM (#191963) Journal

    1) Software should always securely erase passwords after they are used.

    Which doesn't help if the computer loses power while the password is still used. Remember, we're talking about a hypothetical NVRAM computer here, not the ordinary computer of today where information just vanishes as soon as the power is gone.

    2) Passwords you should completely avoid keeping it in plain text at any point.

    How many keyboards are able to encrypt passwords as you type them?

    3) Ideally you would want to passwords stored in on processor cache to avoid it showing up in RAM

    How do you get the password into the processor cache?

    --
    The Tao of math: The numbers you can count are not the real numbers.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by Gravis on Thursday June 04 2015, @10:52AM

    by Gravis (4596) on Thursday June 04 2015, @10:52AM (#191996)

    Which doesn't help if the computer loses power while the password is still used. Remember, we're talking about a hypothetical NVRAM computer here, not the ordinary computer of today where information just vanishes as soon as the power is gone.

    even more reason to keep it in cache. however, with this kind of memory retention, it would be prudent to encrypt the RAM by default.

    How many keyboards are able to encrypt passwords as you type them?

    how many keyboards hold multiple keystrokes? that aside, this is about software, physical security is an entirely different problem.

    How do you get the password into the processor cache?

    with current processors, you leverage address translation in your favor so that part of your executable's virtual memory map is directed to cache or use a system service to do it for you.
    if you truly are interested, the first step is to understand CPU cache. http://en.wikipedia.org/wiki/CPU_cache [wikipedia.org]