This document discusses memory, big data, and security information and event management (SIEM). It outlines how a SIEM infrastructure can be modeled after the human brain's memory to gather and analyze large amounts of data. Specifically, it proposes that machines should be adaptive, interactive, iterative and stateful, and contextual to effectively learn from data over time and identify security threats, similar to how the human brain functions. The document also mentions directed graphs and the five V's of big data - volume, velocity, variety, veracity, and value.