Premium Essay

Data Storage Technology

In:

Submitted By graj23
Words 320
Pages 2
Chapter 5 states everything we need to know about the importance of data storage technology. A typical computer system has multiple storage devices filling a variety of needs. Primary storage devices support immediate execution of programs, and secondary storage devices provide long-term storage of programs and data. The characteristics of speed, volatility, access method, portability, cost, and capacity vary between storage devices, forming a memory-storage hierarchy. Primary storage tends to be at the top of the hierarchy, with faster access speeds and higher costs per bit of storage, and secondary storage tends to be in the lower portion of the hierarchy, with slower access speeds and lower costs. Modern computers use memory implemented with semiconductors. Basic types of memory built from semiconductor microchips include random access memory (RAM) and nonvolatile memory (NVM). The primary RAM types are static and dynamic. Static RAM (SRAM) is implemented entirely with transistors; dynamic RAM (DRAM) is implemented with transistors and capacitors. SRAM s more complex circuitry is more expensive but provides faster access times. Neither type of RAM can match current microprocessor clock rates. NVM is usually relegated to specialized roles and secondary storage because of its slower write speeds and limited number of rewrites.
Optical discs store data bits as variations in light reflection. An optical disc drive reads data bits by shining a laser beam onto a small disc location. High and low reflections of the laser are interpreted as 1s and 0s. The cost per bit of optical storage is less than magnetic storage, at the expense of slower access speed. Types of optical discs (and drives) include different forms of CDs and DVDs. CD-ROM, DVD-ROM, and BD are written during manufacture. CD-R,DVD /-R, and BD-R are manufactured blank and can be written to once. CD-RW and

Similar Documents

Free Essay

Online Storage Backup Systems

...Online Storage Backup Systems CIS 512 8 June 2012 Table of contents Executive Summary…………………………………………………..3 Background…………………………………………………………..4 Current State of Technology…………………………………………7 Report of this Research………………………………………………9 Summary…………………………………………………………….11 References…………………………………………………………...12 Executive Summary Everything we do today in our private lives and in the business world has moved online. The amounts of data stored have increased exponentially over the years. The need for reliable data storage has also increased over the years. The media and methods in which we store our data has become as important as any other technology. As technology has advanced, more and more data is being stored and having reliable means of storage has become a challenge that IT professionals will continue to deal with in the future. In this paper, I will outline the different types of backups that have been used over the years. I will talk about how data backup and storage has move to an online arena. Finally I will talk about cloud storage and cloud computing. I will discuss how cloud computing will become the future of how we operate in the online world. Background The need for backing up data has existed for as long as we have been using computers. When we first started using computers, data was stored on floppy disks or tape drives. In the beginning the amounts of data being...

Words: 2743 - Pages: 11

Premium Essay

Strorage Tech Nas

...Network Attached Storage ITMO 557 Research Paper Submitted by: Ashif Anwar CWID: A20318587 Date of Submission: This is a research paper on Network attached storage covering the various areas given in the contents below. Fall 2014 ASHIF ANWAR Illinois Institute of Technology-Chicago 11/30/2014 Contents: 1. Introduction. 2. History. 3. Product demonstration. 4. NAS future perspective. 5. Introduction Network Attached Storage is basically defined as a file level computer data storage server connected to a computer network. It is specialized for file server operation by its hardware, software or configuration of elements to provide data access to wide range of clients (Wikipedia, 2014). In simple words we can say “a network attached storage is a external hard drive which is a computer storage system that access and remains on a computer network via Ethernet and wireless connections. The drive is then accessible to all computers in a network, instead of one just hard wired computer”(Networking, 2014). Figure-1: NAS Storage on a network infrastructure. (slideshare, 2013). NAS is one of the popular approaches which allow homes and business to store and retrieve large amounts of data in an efficient and affordable manner. One can wirelessly backup their computer files such as music, videos and other important documents...

Words: 661 - Pages: 3

Premium Essay

Key Computer Terms Checkpoint

...Information Technology Infrastructure Components and Technologies The following terms are examples of information technology infrastructure components and technologies used in business. Research definitions using the Internet. You will write a definition of each term and provide at least two examples of the component or technology. Provide citations and references for all resources. |Term |Definition |References |Examples | | | | |(At least two) | |Hardware |Physical parts of a computer system |http://www.techterms.com/def|Monitor and mouse | | | |inition/hardware | | |Software |Non-tangible component of computers.|http://en.wikipedia.org/wiki|Microsoft office 2010. | | |Used in part with hardware. |/Software |Microsoft Windows 8.1 | |Data management technology |A general term used to cover a wide |http://www.techterms.com/def|Data design- how the data is| | |range of data applications. Data |inition/data_management |structured ie text format. | | |design, Data storage, and...

Words: 491 - Pages: 2

Premium Essay

Nt1330 Unit 4.1 Data Center

...4.1 Data Center Grouping of IT resources such as servers , databases ,networking and communication devices in close with each other rather than having them geographically dispersed. Advantages of Data Center :- 1. It allows for power sharing 2. Higher efficiency in usage shared IT resources 3. Improved accessibility for IT personnel(less management team is required) 4.1.1 Different Types of Infrastructures in a Data Center 1. Building Infrastructure:- “BUILDING SYSTEM” electrical system, fire suppression, lightning, security etc. 2. Data Center Infrastructure:- power, cooling racks, management, physical security, fire suppression etc. 3. IT Infrastructure :-“IT ASSETS” servers, storage, hypervisor etc. 4. Network...

Words: 1265 - Pages: 6

Free Essay

Information Security Policy Essay

...Deduplication Kirth A. Prawl Prof.  Eli Weissman Devry College of New York October 10, 2012 Deduplication technology is a way to streamline backup and storage of data by making sure that redundant records are filtered out prior to backup. In some cases, using deduplication technology can eliminate as much as 95% of the data traditionally backed up. If that figure seems high, consider the case of corporate documents that are distributed to hundreds or even thousands of employees. Each individual may have an identical copy of electronic files such as procedures manuals. When all workstations are backed up without considering duplicate records, the backup itself will contain much wasted space. By managing the data more efficiently and identifying files that are identical, deduplication technology can produce a backup that is scaled down in size, making it more manageable in terms of time and resources as well as in terms of physical media such as disk or tape space. Deduplication technology can be implemented at the network level and consist of only local operations, or it can also be integrated into cloud based technologies that take advantage of economies of scale through the use of remote and managed services. Deduplicate data Eliminating redundant data can significantly shrink storage requirements and improve bandwidth efficiency. Because primary storage has gotten cheaper over time, enterprises typically store many versions of the same information so that new work...

Words: 1234 - Pages: 5

Premium Essay

Information Systems

...|Feedback mechanism| b.|Software|d.|Data| ____ 2. The process of defining relationships among data to create useful information requires ______ a.|an information system.|c.|knowledge| b.|intelligence|d.|intuition| ____ 3. ______ are people who create, use, and disseminate knowledge and are usually professionals in science, engineering, business, and other areas. a.|Systems analysts|c.|Chief Information Officer| b.|Knowledge workers|d.|End user| ____ 4. Data that can be used for a variety of purposes is said to be ______. a.|flexible|c.|relevant| b.|economical|d.|verifiable| ____ 5. The value of information is directly linked to how it helps decision makers achieve their organization’?s _____. a.|profits|c.|cost reduction initiatives| b.|goals|d.|quality improvement measures| ____ 6. ______ is a measure of the extent to which a system achieves its goals. a.|Efficiency|c.|Performance rate| b.|Reliability|d.|Effectiveness| ____ 7. In information systems, _____ is used to make changes to input or processing activities. a.|forecasting|c.|output| b.|feedback|d.|processing| ____ 8. _____ consists of computer equipment used to perform input, processing, and output activities. a.|Information technology|c.|Telecommunications| b.|Technology infrastructure|d.|Hardware| ____ 9. Keyboards, automatic scanning devices, and equipment that can read magnetic ink characters are examples of _____ hardware. a.|storage|c.|output| b.|processing|d.|input| ...

Words: 3708 - Pages: 15

Premium Essay

Bus 230

...30Chapter  7 major topics: -Keyboards- Input device that contains keys you press to enter data and information into a computer or mobile device -Pointing devices         -Mouse- fits under palm of your hand comfortably                     -as you move the mouse, the pointer on the screen moves with it         -Touchpad- small, flat, rectangular pointing device                        - sensitive to pressure and motion                        -move finger on the touchpad in direction you want pointer to go         -Pointing Stick- ball in-between keys on the keyboard that can control the                                                  pointer-- push in the direction you want the pointer to go                                 -pressure sensitive, shaped like eraser on end of a pencil          -Trackball- stationary device on the side of the mouse the size of a Ping-Pong                                         ball -Optical Scanners- Light-sensing input device that converts printed text and images into a form the computer can process                        -Optical Readers- a device that uses a light source to read characters, marks, codes and then converts them into digital data that the computer can process -OCR (Optical Character Recognition) Devices- devices that usually include a small optical scanner for reading characters and sophisticated software to analyze what is read -OMR (Optical Mark Recognition) Devices- devices that read hand-drawn marks, such as...

Words: 3963 - Pages: 16

Free Essay

It Didn't Have the Data

...1.1 Purpose and Scope The information security concern regarding information disposal and media sanitization resides not in the media but in the recorded information. The issue of media disposal and sanitization is driven by the information placed intentionally or unintentionally on the media. Electronic media used on a system should be assumed to contain information commensurate with the security categorization of the system’s confidentiality. If not handled properly, release of these media could lead to an occurrence of unauthorized disclosure of information. Categorization of an information technology (IT) system in accordance with Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems1 , is the critical first step in understanding and managing system information and media. Based on the results of categorization, the system owner should refer to NIST Special Publication (SP) 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations2 , which specifies that “the organization sanitizes information system digital media using approved equipment, techniques, and procedures. The organization tracks, documents, and verifies media sanitization and destruction actions and periodically tests sanitization equipment/procedures to ensure correct performance. The organization sanitizes or destroys information system digital media before its disposal...

Words: 3672 - Pages: 15

Free Essay

Cis517- Project Charter

...gregosmith@myemail.com Project Objectives: Develop an effective solution in providing more cost effective, energy efficient means of producing computer products and meeting the energy needs of the data center in an effort to reduce the energy cost. Find ways to reduce data storage issues by considering cloud computing to reduce costs in additional storage hardware and labor hours required to maintain physical data storage usage. External consultants will be utilized as subject matter experts in green computing contributing ideas in the initial planning and development stage in assisting in providing technological concepts used to facilitate a green computing environment. The company will also consult with members of the Green Grid in providing green technology solutions to datacenters.” As business demands increase, so does the number of data center facilities which house a rising amount of powerful IT equipment. Data center managers around the world are running into resource limits related to power, cooling, and space, making the resource efficiency of data centers an important topic of discussion.”(Unknown, 2011) With the assistance of the Green Grid, We Are Big, Inc hopes to find green computing solutions for data storage, cooling, and finding effective energy cost solutions. Research data on effective green...

Words: 551 - Pages: 3

Premium Essay

It 205 Appendix a

...and Usage of Information Technology Infrastructure Components and Technologies The following terms are examples of information technology infrastructure components and technologies used in business. Research definitions using the Internet. You will write a definition of each term and provide at least two examples of the component or technology. Provide citations and references for all resources. Term | Definition | References | Examples (At least two) | Hardware | Physical parts of a computer system | http://www.techterms.com/definition/hardware | Monitor and mouse | Software | Computer software is a general term used to describe computer programs that perform some task on a computer system | www.tigerdirect.com/.../category_tlc.asp?CatId=26&name=Software | Microsoft office, Adobe products | Data management technology | a general term that covers a broad range of data applications. It may refer to basic data management concepts or to specific technologies. | http://www.techterms.com/definition/data_management | Data design, data storage | Networking | the practice of linking two or more computing devices together for the purpose of sharing data. | http://compnetworking.about.com/cs/basicnetworking/f/whatsnetworking.htm | PAN (personal area network) LAN (local area network) | Telecommunications | the transmission of signals over long distances | http://www.techterms.com/definition/telecommunications | Telephone, radio | Technology services | services that...

Words: 430 - Pages: 2

Free Essay

How Computer Technology Ties Into Information Technology

...How computer technology ties into information technology David Carlson CIS/319 May 1, 2011 Bob Sanders How Computer Technology Ties into Information Technology This paper will show how computer systems are an integral part of information technology. We will look at: the best methods of data input for given situations, in given situations what are the best methods of output, the different types of storage and their optimal use, and how certain components affect computer speed. Accuracy of Data Input is Important Now we will look at five different scenarios and what would be the best way to input data and why. Printed questionnaires or surveys are often part of research studies so the method used to input their data into the system needs to be as accurate as can be. Human data-entry devices (HDED) would not be a very reliable form of data-entry because most research studies put out hundreds if not thousands of surveys and for people to try to input all that data accurately would be almost impossible. Since almost all surveys are multiple choice the best choice for the input method is the optical mark reader. The optical mark reader is a source-data automation input device (SDAID) that scans the survey detecting marks on the answer grid. Telephone surveys are another changing part of society, in the past phone surveys were handles by multitudes of phone operators asking questions and typing the responses into the computer. Times have changed and companies are seeing that...

Words: 852 - Pages: 4

Premium Essay

Business

.... How could a business use information technology to increase switching cost and lock in its customers and suppliers? Use business example to support your answers. Ans:- Switching cost: Investment in information system technology ,such as those mentioned in the Wal-Mart example ,can make customers or suppliers dependent on the continued use of innovative ,mutually beneficial interenterprise information systems , they become reluctant to pay the cost I time , money , effort ,and inconvenience that it would take to switch to a company’s competitors. Lock in customers and suppliers: Investment in IT can allow a business to lock in customers and suppliers by building valuable new relationships with them. 5. What processor, memory, magnetic disk storage, and video display capabilities would u require for a personal computer that you would use for business purpose? Explain your choices. For the business purpose data and information must be store until needed using a verity of storage. For using processor, memory, magnetic disk storage, and video display capabilities that I would require for a personal computer use for business. These are…… Processor: the main component is the processor. The processor should be arithmetic-logic unit and the control unit. Arithmetic and logic functions required to the business. I like to...

Words: 544 - Pages: 3

Free Essay

Sdfdsfadsf

...Storage Switzerland White Paper Storage Infrastructures for Big Data Workflows Sponsored by: Prepared by: Eric Slack, Sr. Analyst May 2012 Storage Infrastructures for Big Data Workflows Introduction Big Data is a term used to describe data sets which have grown so large that traditional storage infrastructures are ineffective at capturing, managing, accessing and retaining them in an acceptable time frame. The thing that separates Big Data from simply a large archive is the need to process these data sets or to provide file access to multiple users quickly. Some Big Data use cases involve analytics, the computer-based analysis of large amounts of relatively small data objects, for the purpose of pulling business value from that information. Many of these involve files supporting transaction analysis or automated event processing, such as database or web analytics, which won’t be addressed in this white paper. Instead, this paper will deal with another form of Big Data that supports file processing workflows, often sequential in nature, where large files are shared by knowledge workers to create digital products, support research and perform analysis to increase productivity. Also considered will be Big Data supporting large file analytics in which files are shared by large, high performance compute clusters to support complex analysis and drive business decisions. Big Data File Processing Workflows Some of the industries using large file, Big Data sets in these two use cases...

Words: 2944 - Pages: 12

Free Essay

Spanish Period

...LEAH N. ORDONIO BSN EVOLUTIONS OF DEVICES A device is usually a constructed tool, but may refer more specifically to: Technology Machine Tool Gadget Improvised explosive device (IED) Appliance (disambiguation), a device for a particular task A component of personal computer hardware Peripheral, any device attached to a computer that expands its functionality Electronic component Nuclear device Device file, an interface of a device driver Music Device (heavy metal band) Device (Device album) Device (pop rock band) Device (Eon album), 2006 Here’s a complete history of just how storage memory devices for computers have evolved ever since their inception: Paper data storage Believe it or not, paper has been [and still is] a form of electronic data storage as early as 1725 when Basile Bouchon used punched paper rolls to store instructions for textile looms. This technology was later developed into the wildly successful Jacquard loom. Later during the 19th Century, telegrams could be prerecorded on punched tape and rapidly transmitted using Alexander Bain's automatic telegraph in 1846. In the late 1880s Herman Hollerith invented punched cards which were used in the 1890 census and the completed results were finished months ahead of schedule and far under budget. This technology was widely used for tabulating votes and grading standardized tests. Barcodes made it possible for any object that was to be sold or transported to have some computer readable information...

Words: 1135 - Pages: 5

Free Essay

Storage Technologies

...Storage Technologies Nearly every facet of computer technology, like processor speed, memory capacity and I/O capabilities has seen dramatic improvements since its inception. The one technology that has lagged behind is storage. Although data storage has seen considerable improvements from its infancy in 1956, it has not seen major disruptive changes; though, according to the CEO of Pure Storage, Scott Dietzen, in this next decade it’s going to be storage’s turn to face disruptive change (Korbin, 2011). This means that as this decade takes its course, we’ll see major changes in the way we store our data. Pure Storage, a company focused on data storage, has proposed one solution to our need to effectively and efficiently store large amounts of data. We all have heard of flash memory—non-volatile computer storage that can be electrically erased and reprogrammed—and we also know that flash memory is quite expensive compared to traditional storage technologies. The benefit of adopting flash memory for storing data has been unrealized by enterprises, primarily due to the high cost of implementing such infrastructure. Nevertheless, for enterprises undertaking the transition to a virtualized environment, flash memory can be an alluring proposition. Faster, smaller and more efficient than traditional disk technologies, flash makes a convincing case (Korbin, 2011). Scott Dietzens’ Pure Storage company boasts a solution that delivers enterprise-caliber storage at a price point geared...

Words: 871 - Pages: 4