Yep, you read that right. According to research published in a recent edition of Nature Neuroscience, it is possible to store information on cells removed from the hippocampus of a rat brain and recover it after several seconds, reliably enough to emulate the short-term memory of a living rat.
The technique is a unique advance in the study of memory and learning in biological organisms, according to the paper's authors. This is partly because the data-storage and recovery were accomplished in the lab, independently of the cells' original owner. Most rat-brain memory experiments, including others published in the same issue of Nature Neuroscience, involve actual living rats.
The in-vitro technique, developed by a pair of researchers from Cleveland's Case Western Reserve University, was a clear demonstration of the mechanism of declarative memory-- the process of catching and storing specific facts such as names, numbers, or events. It does not involve the type of memory used for skills or knowledge learned in bits and pieces over a long time--how to play the piano, for example, or ride a bike.
Of course, while declarative memory is the type that's most applicable to computer functions, researchers are unlikely to pursue rat brains as a data storage tool for IT environments.
The study was designed to trace the pathway of information in and out of a neuron and demonstrate the mechanism for keeping it there as a way to better understand the process, structures, and biochemistry of memory in living brains--primarily those of humans, according to authors at ScienceBlog.
Clearly, rat brain cells are much less relevant to IT than memory built of silicon nanowires or carbon nanotubes. But the study does expand our understanding of how biological systems collect and retain data.
None of these advances are likely to cut the cost or increase the efficiency of big data storage anytime soon. They might offer hope, however, for IT managers facing a storage crisis in the data center and an overpopulation of vermin in the storage room.
Extending core virtualization concepts to storage, networking, I/O, and application delivery is changing the face of the modern data center. In the Pervasive Virtualization report, we discuss all these areas in the context of four main precepts of virtualization. (Free registration required.)
6 Tools to Protect Big DataMost IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.
Big Data Brings Big Security ProblemsWhy should big data be more difficult to secure? In a word, variety. But the business won’t wait to use it to predict customer behavior, find correlations across disparate data sources, predict fraud or financial risk, and more.
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.