Data Storage Technology

In: Computers and Technology

Submitted By graj23
Words 320
Pages 2
Chapter 5 states everything we need to know about the importance of data storage technology. A typical computer system has multiple storage devices filling a variety of needs. Primary storage devices support immediate execution of programs, and secondary storage devices provide long-term storage of programs and data. The characteristics of speed, volatility, access method, portability, cost, and capacity vary between storage devices, forming a memory-storage hierarchy. Primary storage tends to be at the top of the hierarchy, with faster access speeds and higher costs per bit of storage, and secondary storage tends to be in the lower portion of the hierarchy, with slower access speeds and lower costs. Modern computers use memory implemented with semiconductors. Basic types of memory built from semiconductor microchips include random access memory (RAM) and nonvolatile memory (NVM). The primary RAM types are static and dynamic. Static RAM (SRAM) is implemented entirely with transistors; dynamic RAM (DRAM) is implemented with transistors and capacitors. SRAM s more complex circuitry is more expensive but provides faster access times. Neither type of RAM can match current microprocessor clock rates. NVM is usually relegated to specialized roles and secondary storage because of its slower write speeds and limited number of rewrites.
Optical discs store data bits as variations in light reflection. An optical disc drive reads data bits by shining a laser beam onto a small disc location. High and low reflections of the laser are interpreted as 1s and 0s. The cost per bit of optical storage is less than magnetic storage, at the expense of slower access speed. Types of optical discs (and drives) include different forms of CDs and DVDs. CD-ROM, DVD-ROM, and BD are written during manufacture. CD-R,DVD /-R, and BD-R are manufactured blank and can be written to once. CD-RW and…...

Similar Documents

Storage

...“PALM VEIN TECHNOLOGY". Reflection photography: There are two types of vein photography- 1. Reflection Reflection is more useful technique at low ambient temperatures as blood flow decreases at cool temperatures. 2. Transmission At cool temperatures transmission method provides low contrast images. Advantages: 1. Very economical. 2. Highest factor of security. 3. One time registry and usage throughout life. 4. More advantageous than other biometric techniques. Applications: 1. Managements in healthcare. 2. Operator authentication. 3. Owner authentication. 4. Attendance authentication. Pal vein authentication: Palm vein authentication uses the vascular patterns of an individual’s palm as personal identification data. Compared with a finger [1] or the back of a hand, a palm has a broader and more complicated vascular pattern and thus contains a wealth of differentiating features for personal identification. The palm is an ideal part of the body for this technology; it normally does not have hair which can be an obstacle for photographing the blood vessel pattern, and it is less susceptible to a change in skin color, unlike a finger or the back of a hand. [pic][pic][pic][pic] Fig.1. Visible ray image Fig. 2. Infrared ray image Fig. 3. Extracted vein pattern Fig. 4. Palm vein sensor 2. Implementation of contactless palm vein authentication The contactless palm vein authentication technology consists......

Words: 484 - Pages: 2

Cloud Storage

...Cloud Storage Flash Research Paper Cloud computing is one of the biggest buzzwords flying around the technology world lately. Our company is located in New Orleans, LA, and in 2004 when Hurricane Katrina hit we had to completely start over with our data because all backups were destroyed with the building by the water. A solid, growing and ever-cheapening option for backups for us is cloud storage. The main idea of this technology is that it keeps all backups in a completely remote location and allows it to be accessed anywhere that we can get Internet. It is a safe and fairly cheap alternative to storing backups in our own datacenter or off site down the street like we do now. According to our data needs we only need to pay the hosting site to lease the amount of storage that we use, rather than having to spend a lot on dedicated servers because they can use their multiple servers on multiple companies. The main benefit to this technology is the fact that we don’t need to do any of the tedious tasks of maintaining, purchasing, and supporting servers, they are all handled by the hosting company. Cost cutting is the main benefit there as we can focus our IT people on optimizing our company rather than paying them to maintain the backups. Also all of the servers are placed off site. One company that I found that would provide this service for us well is the company Barracuda Networks. They are situated in Campbell, CA, and completely away from our natural-disaster-prone...

Words: 490 - Pages: 2

Virtual Storage Project

...consolidation, we are hoping to solve the issue that we’ve been having with our storage space. Despite the larger physical space for network and storage area, we still cannot solve the issue we’ve been having. We are running out of storage space, and there’s just not enough physical space to accommodate the data we are generating. To make matters worse, accessing the stored data has been time consuming and a lot of time, system seems to be down when accessing the data. This proposal calls for implementing of network and storage virtualization to accommodate the data and high availability. Introduction According to Storage Networking Industry Association (SNIA), Storage Virtualization is a process of isolating the internal function of the storage system application so that it can be independently manage. Storage Virtualization adds the capability to lower the storage resources level and reduce complexity in the management process (Bunn, Simpson, Peglar, & Nagle). The word “Virtualization” is the virtual version of something instead of the actual physical. In this case the storage is the virtual of the actual physical storage. Virtualization had been utilized in many processes such as the partition of the physical hard drive into the logical section creates the image of the actual physical hard drive. In IT industry, the virtualization that is currently being widely use are Network, Server and Storage virtualization. In Network virtualization is the method that......

Words: 1727 - Pages: 7

Dna Storage

...DNA DATA STORAGE GOOD OR BAD? Thomas Tyrrell Will Combs With the growth of the amount of data that is now being stored, the idea behind storing that data in DNA is a fascinating one. Companies, governments and universities face an enormous challenge storing the ever-growing flood of digitized information, the videos, books, movies and songs sent over the Internet. Some researchers have looked for answers in biology. In recent years, they have found ways to encode trademarks in cells and store pieces of music in the genetic code of micro-organisms. Many movies have explored the human DNA as both an advantage and a disadvantage. Some might say that storing information in our DNA is a bad thing. But in my opinion the advantages are too great to ignore. This will open up an entirely new world for human evolution. Being able to store personal data in your own DNA will increase security levels to an unprecedented level. And with the flow of information these days the need for this security is at an all time high. The first bits of digital information were stored in DNA in 1988. However, it was impractical, both difficult and expensive. Even as recently as 2012, costs and times for reading and writing were only practical for century-scale archives. The latest development makes storing data on a 50-year timescale feasible, and archives for shorter timescales could become cost effective within a decade. A team of researchers headed by Nick Goldman and Ewan Birney at the......

Words: 885 - Pages: 4

Computer Storage

...COMPUTER STORAGE The device, which is used to store data, is called computer storage. We can divide computer storage into following categories. Computer Storage Permanent Secondary Temporary ROM Optical Disk Magnetic Disk Magnetic Tape RAM Cache C.D DVD H.D F.D ZIP Secondary Storage It is not possible to store large amount of data for future use in primary memory of computer because its size is small and it cannot store data on permanent basis. So it is necessary to use some extra media to store large amount of data. That kind of memory is called secondary storage, auxiliary storage, additional storage, external storage or semi-permanent storage. This memory is cheaper that primary memory due to different storage mechanism. Its speed is also slower than RAM. There are two types of secondary memory. Sequential Access Storage: Sequential Access Memory is one in which data is retrieved is in the same sequence in which it is stored. Direct/Random Access Storage: Direct Access Storage is one in which data is retrieved directly/randomly without any sequence. MAGNETIC TAPE Magnetic tape is one of the oldest & popular devices used for storing data permanently. As its name suggest, this device stores information on a magnetic tape that is made of plastic (Mylar) that is the form of magnetic spots. Size The tape ribbon itself is stored in reels of 50 to 2400 feet or small cartridge or cassette. Quality It is similar to the tape used on......

Words: 1498 - Pages: 6

Data Storage and Architecture

...Data Storage and Architecture Kaplan University Introduction Commerce is the conducting of business; it could be buying, selling, marketing, or providing services. The newer forms of commerce are electronic commerce (e-commerce) and mobile commerce (m-commerce). The types of e-commerce are business-to-business, business-to-consumer, and consumer-to-consumer. The traditional commerce practice required consumers to buy at a retail location, order from catalogs over the phone, or fill out order forms to mail in. These processes where lengthy and inconvenient to consumers needing products fast or even business needing a rush order could still take weeks. E-commerce emerged eliminating the long processes of ordering and waiting on receipt of order, then processing; to just clicking buttons and shipment within hours or days. E-commerce and M-commerce have many benefits to businesses and consumers but as with any great thing there are challenges. In attempting to implement a multi-stage model for e-commerce with global systems, the key challenges are; cultural, language, time and distance, infrastructure, currency, and state, regional, and national laws. Cultural challenges Culture includes difference in morals and beliefs, language, currency, laws and the way individuals as well as businesses function. Cultural challenges occur when the major understandings and assumptions of the business leaders is different from the consumer or other business, in which business is to be......

Words: 1637 - Pages: 7

Green Technology Data Centre

...Executive Summary The use of green data centers is getting popular. Such centers refer to a repository to store, manage and disseminate data. It has two purposes to meet: increase energy efficiency and reducing the impact on the environment as much as possible (Rick Bauer,2008). The mechanical, lighting, electrical and computer systems must work towards these two goals. Building and operating green data centers requires advanced technologies and strategies. There are various ways to implement the green data centers - reducing buildings’ footprints, utilizing low-emission building materials, ensuring sustainable landscaping, recycling waste, enhancing indoor environment quality and using hybrid vehicles. Going forward, as demand for data centre space increases in an energy-constrained world, the need for the sustainable development of data centers becomes more pressing. 1.0 Introduction of green data Center A green data center is operated with maximum energy efficiency with minimum environmental impact. The computing facility is constructed or built under green computing principle that will reduce significantly the operating expenses for IT infrastructure. Traditional the power required to run the data center non IT equipment such as fans, pumps, UPS system consumed about 60% total annual energy of the data center (Gartner, Inc, American information technology research). However with the implementation of the green data center, the total energy consumption can be......

Words: 2469 - Pages: 10

Cloud Storage

...In today’s day and age, people are on the go and technology is expected to ‘go’ with them. Many different variations accompany the ‘todays day and age’ kind of person. Some people are on the go due to a job that requires them the commute from one office to another, while some people may be self-employed and they can’t be tied down at a desk all day. For others it could simply mean, they are out with friends and along comes there technology with them. You see it every day, all day; most people of this error are never without some kind of technology that can connect them to their friends, office, family, etc. What are these people doing with all this technology? It’s been said many times, that ‘their life is on their phone/tablet/iPad etc. So, what information are these people talking about and why are they carring it around with them like some kind of ‘folder’? For some of these folks, the information could be office projects, meeting notes to discuss at the next meeting, or it can be as personal as photos, contact information, phone numbers, addresses, music or anniversary dates. In a sense, it is a folder; of one’s important documents. But as that information grows with a person, so too must the storage capacity of their devices. As technology continues to advance, we are now embarking on a new error, one where we are using a new storage device called, Cloud Storage. This new service is allowing people to have faster access to their personal information and even be able......

Words: 406 - Pages: 2

Storage Technology

...NATIONAL MANAGEMENT COLLEGE STORAGE TECHNOLOHY Submitted in partial fulfillment of the requirement For Diploma in Hardware Engineering MG AUNG KYAW SOE Roll No. 6 Batch 25 Diploma project report January, 2014 1 ACKNOWLEDGMENT First and foremost, I would like to thank my parents because I had attended “Diploma in Hardware Engineering”. Next, I would like to express my gratitude to Dr. Than Win (Principal of National Management Collage, Yangon) and Daw Khin Toe Yin (Managing Director of Winner Computer Group). Special thanks to Saya U Myo Aung Latt. A very grateful thanks to all my teachers, lectures and also teachers from laboratory for their supervision, advise and patience. Special thanks my hardware teachers Daw Ohnmar Myo, U Thein Moe, U Min Thu and U Win Naing Oo. 2 CONTENT Page CHAPTER – 1 1.1 1.2 INTRODUCTION 6 6 7 9 Computer data storage Storage Type 1.2.1 1.2.2 Primary storage Secondary storage CHAPTER – 2 2.1 2.2 STORAGE TECHNOLOGY 12 The basic components of data storage system Interaction with a storage system and other computer Components 12 13 13 14 15 16 17 18 2.3 2.4 2.5 2.6 2.7 2.8 2.9 Online storage vs. External hard drives Off-line storage Memory hierarchy Memory organization Main memory Secondary memory Type of storage technology CHAPTER 3 3.1 3.2 3.3 3.4 MAGNETIC STORAGE 19 20 21 23 23 24 24 How to work magnetic storage History Design Magnetic recording classes 3.4.1 3.4.2 3.4.3 Analog recording......

Words: 9711 - Pages: 39

Cloud Storage

...TECH BRIEF Cloudy Weather for Enterprise Storage – an Enterprise Storage Veteran Looks Forward July 2014 by Dave Roberson Executive Summary This whitepaper looks at the root causes of user demands for better, cheaper storage services and IT’s options to meet those demands. In particular, it explains how the shift in value off proprietary hardware and onto open software stacks is happening in storage just as happened over the last decade with server virtualization. Enterprise storage as we have known it for the last four decades is facing significant internal and external pressures. The rapid growth of inexpensive or even free public cloud storage for consumers has created a bring-your-own storage grass-roots revolution demanding IT deliver simple self-service storage at costs far below current chargeback levels. At the same time the capacity requirements for user-generated content from sources like mobile applications is becoming a driving force in storage expansion. While public cloud options exist for enterprises they still have often unacceptable gaps in security and control despite their favorable economics compared to legacy on-premise storage. All of these factors are making it both technically and economically indefensible to just keep expanding your reliance on existing legacy NAS and SANs that suffer from years of vendor lock-in and are burdened by costly proprietary hardware. Something new is needed and the option of pushing data out to public cloud providers......

Words: 4121 - Pages: 17

Technology Hardware, Storage & Peripherals

...Capital IQ INDUSTRY SURVEYS Technology Hardware, Storage & Peripherals April 2015 ANGELO ZINO, CFA Equity Analyst www.spcapitaliq.com 2 April 2015 INDUSTRY SURVEYS Technology Hardware, Storage & Peripherals PERFORMANCE Sector Overview Industry Overview Revenues Expenses Profits & Margins Valuation Capital Markets INDUSTRY PROFILE Trends INQUIRIES & CLIENT SUPPORT 800.523.4534 clientsupport@standardandpoors.com SALES 877.219.1247 wealth@spcapitaliq.com Key Ratios And Statistics CONTACTS How The Industry Operates How To Analyze This Industry Glossary Industry References Comparative Company Analysis MEDIA Michael Privitera 212.438.6679 michael.privitera@spcapitaliq.com S&P CAPITAL IQ 55 Water Street New York, NY 10041 All of the views expressed in these research reports accurately reflect the research analyst’s personal views regarding any and all of the subject securitiesor issuers. No part of the analyst’s compensation was, is, or will be, directly or indirectly, related to the specific recommendations or views expressed in this research report. For important regulatory information, go to www.standardandpoors.com and click on Regulatory Affairs and Disclaimers. Copyright © 2015 Standard & Poor’s Financial Services LLC, a part of McGraw-Hill Financial. All rights reserved. 3 April 2015 INDUSTRY SURVEYS Technology Hardware, Storage & Peripherals TOPICS......

Words: 29719 - Pages: 119

Cis 246 Week 4 Ilab 4 Exploring Data Storage and Printers

...CIS 246 Week 4 iLab 4 Exploring Data Storage and Printers Purchase here http://devrycourse.com/cis-246-week-4-ilab-4-exploring-data-storage-and-printers Product Description iLab 4 of 7: Exploring Data Storage and Printers Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See the Syllabus section “Due Dates for Assignments & Exams” for due date information.) Connect to the iLab here. iLAB OVERVIEW Scenario and Summary • Before beginning work, connect to your virtual lab platform (Skillsoft / Element K). • You will explore data storage and set up a printer. Additional Resource You may find this resource helpful as you prepare to complete the lab. • Printer and Data Storage Management iLAB STEPS TASK 1: Explore Data Storage STEP 1: Explore Properties of Drive C: Back to Top Action 1. Log on to the server with a password of Password! (remember to end the password with an exclamation point). 2. In Server Manager expand Storage. 3. Click Disk Management. 4. Right-click drive C: and click Properties. Insert a screenshot into your lab report showing the properties for drive C: (#1). 1. Click Cancel. STEP 2: Use chkdsk Back to Top Action 1. At the command prompt, type “chkdsk” and press Enter. 2. When done, scroll up so the chkdsk command can be seen and you can see the warning that follows the line: “WARNING! F paramet not specified.” Insert a screenshot into your lab report showing the warning......

Words: 4313 - Pages: 18

Mass Storage System

...MASS-STORAGE SYSTEM ROMERO, MHICA ANGEL M . OUTLINE Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space Management RAID Structure Stable-Storage Implementation OBJECTIVES Describe the physical structure of secondary and tertiary storage devices and the resulting effects on the uses of the devices Explain the performance characteristics of mass-storage devices Discuss operating-system services provided for mass storage Magnetic Tapes Magnetic Disks Solid State Disks » Magnetic tape ˃ Was early secondary-storage medium ˃ Relatively permanent and holds large quantities of data ˃ Access time slow ˃ Random access ~1000 times slower than disk ˃ Mainly used for backup, storage of infrequently-used data, transfer medium between systems ˃ Kept in spool and wound or rewound past read-write head ˃ Once data under head, transfer rates comparable to disk ˃ 20-200GB typical storage ˃ Common technologies are 4mm, 8mm, 19mm, LTO-2 and SDLT » Magnetic disks provide bulk of secondary storage of modern computers ˃ Drives rotate at 60 to 200 times per second ˃ Transfer rate is rate at which data flow between drive and computer ˃ Positioning time (random-access time) is time to move disk arm to desired cylinder (seek time) and time for desired sector to rotate under the disk head (rotational latency) ˃ Head crash results from disk head making contact with the disk......

Words: 365 - Pages: 2

Storage Technologies

...Storage Technologies Nearly every facet of computer technology, like processor speed, memory capacity and I/O capabilities has seen dramatic improvements since its inception. The one technology that has lagged behind is storage. Although data storage has seen considerable improvements from its infancy in 1956, it has not seen major disruptive changes; though, according to the CEO of Pure Storage, Scott Dietzen, in this next decade it’s going to be storage’s turn to face disruptive change (Korbin, 2011). This means that as this decade takes its course, we’ll see major changes in the way we store our data. Pure Storage, a company focused on data storage, has proposed one solution to our need to effectively and efficiently store large amounts of data. We all have heard of flash memory—non-volatile computer storage that can be electrically erased and reprogrammed—and we also know that flash memory is quite expensive compared to traditional storage technologies. The benefit of adopting flash memory for storing data has been unrealized by enterprises, primarily due to the high cost of implementing such infrastructure. Nevertheless, for enterprises undertaking the transition to a virtualized environment, flash memory can be an alluring proposition. Faster, smaller and more efficient than traditional disk technologies, flash makes a convincing case (Korbin, 2011). Scott Dietzens’ Pure Storage company boasts a solution that delivers enterprise-caliber storage at a price point......

Words: 871 - Pages: 4

Online Storage Backup Systems

...Online Storage Backup Systems CIS 512 8 June 2012 Table of contents Executive Summary…………………………………………………..3 Background…………………………………………………………..4 Current State of Technology…………………………………………7 Report of this Research………………………………………………9 Summary…………………………………………………………….11 References…………………………………………………………...12 Executive Summary Everything we do today in our private lives and in the business world has moved online. The amounts of data stored have increased exponentially over the years. The need for reliable data storage has also increased over the years. The media and methods in which we store our data has become as important as any other technology. As technology has advanced, more and more data is being stored and having reliable means of storage has become a challenge that IT professionals will continue to deal with in the future. In this paper, I will outline the different types of backups that have been used over the years. I will talk about how data backup and storage has move to an online arena. Finally I will talk about cloud storage and cloud computing. I will discuss how cloud computing will become the future of how we operate in the online world. Background The need for backing up data has existed for as long as we have been using computers. When we first started using computers, data was stored on floppy disks or tape drives. In the beginning the amounts of......

Words: 2743 - Pages: 11