News
4/1/2008
02:06 AM
Terry Sweeney
Terry Sweeney
Commentary
50%
50%

A Little Small-Mindedness

Who says old molecules can't be taught new tricks? Japanese researchers have concocted a new molecule that reverses cirrhosis damage -- at least in lab rats. So as you contemplate the wisdom of that next beer, let us marvel at other small-scale breakthroughs in storage.

Who says old molecules can't be taught new tricks? Japanese researchers have concocted a new molecule that reverses cirrhosis damage -- at least in lab rats. So as you contemplate the wisdom of that next beer, let us marvel at other small-scale breakthroughs in storage.LSI, working with its recently acquired Tarari unit, unveiled Monday a new chip that's a fraction the size of comparable chips with 2-Gbps throughput. Better yet, it's expected to cost about one-tenth as much as other products used for content inspection devices in security and threat management suites.

In other news, solid-state drive maker Super Talent expects to ship a 265-GB SSD in April, which, while not exactly tiny, is amazingly dense. Unlike the new LSI chips, don't look for any great price breaks where SSD is concerned.

They even awarded a Nobel last year for the discoveries behind this miniaturization trend. Now, Fujitsu, IBM, and Seagate -- and likely others -- are pursuing terabyte drives with unheard of RPMs in even smaller form factors than iPods and digital cameras.

But after considering all these different breakthroughs in small-scaled technology, I have to wonder how long it will take before nanotechnology and micron-level granularity make their way into the vanguard of enterprise storage. They can create molecular-sized vaccines, so why couldn't molecules be made to line up on platters (or some more appropriate storage medium) with so many bytes associated with them?

I'd like to see the economics of physical storage get re-written in my lifetime. That kind of big breakthrough wouldn't be any small wonder.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3971
Published: 2014-12-25
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.

CVE-2014-7193
Published: 2014-12-25
The Crumb plugin before 3.0.0 for Node.js does not properly restrict token access in situations where a hapi route handler has CORS enabled, which allows remote attackers to obtain sensitive information, and potentially obtain the ability to spoof requests to non-CORS routes, via a crafted web site ...

CVE-2004-2771
Published: 2014-12-24
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.

CVE-2014-3569
Published: 2014-12-24
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshak...

CVE-2014-4322
Published: 2014-12-24
drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or c...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.