Premium Essay

Data Storage Technology

In: Computers and Technology

Submitted By graj23
Words 320
Pages 2
Chapter 5 states everything we need to know about the importance of data storage technology. A typical computer system has multiple storage devices filling a variety of needs. Primary storage devices support immediate execution of programs, and secondary storage devices provide long-term storage of programs and data. The characteristics of speed, volatility, access method, portability, cost, and capacity vary between storage devices, forming a memory-storage hierarchy. Primary storage tends to be at the top of the hierarchy, with faster access speeds and higher costs per bit of storage, and secondary storage tends to be in the lower portion of the hierarchy, with slower access speeds and lower costs. Modern computers use memory implemented with semiconductors. Basic types of memory built from semiconductor microchips include random access memory (RAM) and nonvolatile memory (NVM). The primary RAM types are static and dynamic. Static RAM (SRAM) is implemented entirely with transistors; dynamic RAM (DRAM) is implemented with transistors and capacitors. SRAM s more complex circuitry is more expensive but provides faster access times. Neither type of RAM can match current microprocessor clock rates. NVM is usually relegated to specialized roles and secondary storage because of its slower write speeds and limited number of rewrites.
Optical discs store data bits as variations in light reflection. An optical disc drive reads data bits by shining a laser beam onto a small disc location. High and low reflections of the laser are interpreted as 1s and 0s. The cost per bit of optical storage is less than magnetic storage, at the expense of slower access speed. Types of optical discs (and drives) include different forms of CDs and DVDs. CD-ROM, DVD-ROM, and BD are written during manufacture. CD-R,DVD /-R, and BD-R are manufactured blank and can be written to once. CD-RW and

Similar Documents

Free Essay

Online Storage Backup Systems

...Online Storage Backup Systems CIS 512 8 June 2012 Table of contents Executive Summary…………………………………………………..3 Background…………………………………………………………..4 Current State of Technology…………………………………………7 Report of this Research………………………………………………9 Summary…………………………………………………………….11 References…………………………………………………………...12 Executive Summary Everything we do today in our private lives and in the business world has moved online. The amounts of data stored have increased exponentially over the years. The need for reliable data storage has also increased over the years. The media and methods in which we store our data has become as important as any other technology. As technology has advanced, more and more data is being stored and having reliable means of storage has become a challenge that IT professionals will continue to deal with in the future. In this paper, I will outline the different types of backups that have been used over the years. I will talk about how data backup and storage has move to an online arena. Finally I will talk about cloud storage and cloud computing. I will discuss how cloud computing will become the future of how we operate in the online world. Background The need for backing up data has existed for as long as we have been using computers. When we first started using computers, data was stored on floppy disks or tape drives. In the beginning the amounts of data being...

Words: 2743 - Pages: 11

Premium Essay

Strorage Tech Nas

...Network Attached Storage ITMO 557 Research Paper Submitted by: Ashif Anwar CWID: A20318587 Date of Submission: This is a research paper on Network attached storage covering the various areas given in the contents below. Fall 2014 ASHIF ANWAR Illinois Institute of Technology-Chicago 11/30/2014 Contents: 1. Introduction. 2. History. 3. Product demonstration. 4. NAS future perspective. 5. Introduction Network Attached Storage is basically defined as a file level computer data storage server connected to a computer network. It is specialized for file server operation by its hardware, software or configuration of elements to provide data access to wide range of clients (Wikipedia, 2014). In simple words we can say “a network attached storage is a external hard drive which is a computer storage system that access and remains on a computer network via Ethernet and wireless connections. The drive is then accessible to all computers in a network, instead of one just hard wired computer”(Networking, 2014). Figure-1: NAS Storage on a network infrastructure. (slideshare, 2013). NAS is one of the popular approaches which allow homes and business to store and retrieve large amounts of data in an efficient and affordable manner. One can wirelessly backup their computer files such as music, videos and other important documents...

Words: 661 - Pages: 3

Premium Essay

Key Computer Terms Checkpoint

...Information Technology Infrastructure Components and Technologies The following terms are examples of information technology infrastructure components and technologies used in business. Research definitions using the Internet. You will write a definition of each term and provide at least two examples of the component or technology. Provide citations and references for all resources. |Term |Definition |References |Examples | | | | |(At least two) | |Hardware |Physical parts of a computer system |http://www.techterms.com/def|Monitor and mouse | | | |inition/hardware | | |Software |Non-tangible component of computers.|http://en.wikipedia.org/wiki|Microsoft office 2010. | | |Used in part with hardware. |/Software |Microsoft Windows 8.1 | |Data management technology |A general term used to cover a wide |http://www.techterms.com/def|Data design- how the data is| | |range of data applications. Data |inition/data_management |structured ie text format. | | |design, Data storage, and...

Words: 491 - Pages: 2

Premium Essay

Information Systems

...|Feedback mechanism| b.|Software|d.|Data| ____ 2. The process of defining relationships among data to create useful information requires ______ a.|an information system.|c.|knowledge| b.|intelligence|d.|intuition| ____ 3. ______ are people who create, use, and disseminate knowledge and are usually professionals in science, engineering, business, and other areas. a.|Systems analysts|c.|Chief Information Officer| b.|Knowledge workers|d.|End user| ____ 4. Data that can be used for a variety of purposes is said to be ______. a.|flexible|c.|relevant| b.|economical|d.|verifiable| ____ 5. The value of information is directly linked to how it helps decision makers achieve their organization’?s _____. a.|profits|c.|cost reduction initiatives| b.|goals|d.|quality improvement measures| ____ 6. ______ is a measure of the extent to which a system achieves its goals. a.|Efficiency|c.|Performance rate| b.|Reliability|d.|Effectiveness| ____ 7. In information systems, _____ is used to make changes to input or processing activities. a.|forecasting|c.|output| b.|feedback|d.|processing| ____ 8. _____ consists of computer equipment used to perform input, processing, and output activities. a.|Information technology|c.|Telecommunications| b.|Technology infrastructure|d.|Hardware| ____ 9. Keyboards, automatic scanning devices, and equipment that can read magnetic ink characters are examples of _____ hardware. a.|storage|c.|output| b.|processing|d.|input| ...

Words: 3708 - Pages: 15

Premium Essay

Bus 230

...30Chapter  7 major topics: -Keyboards- Input device that contains keys you press to enter data and information into a computer or mobile device -Pointing devices         -Mouse- fits under palm of your hand comfortably                     -as you move the mouse, the pointer on the screen moves with it         -Touchpad- small, flat, rectangular pointing device                        - sensitive to pressure and motion                        -move finger on the touchpad in direction you want pointer to go         -Pointing Stick- ball in-between keys on the keyboard that can control the                                                  pointer-- push in the direction you want the pointer to go                                 -pressure sensitive, shaped like eraser on end of a pencil          -Trackball- stationary device on the side of the mouse the size of a Ping-Pong                                         ball -Optical Scanners- Light-sensing input device that converts printed text and images into a form the computer can process                        -Optical Readers- a device that uses a light source to read characters, marks, codes and then converts them into digital data that the computer can process -OCR (Optical Character Recognition) Devices- devices that usually include a small optical scanner for reading characters and sophisticated software to analyze what is read -OMR (Optical Mark Recognition) Devices- devices that read hand-drawn marks, such as...

Words: 3963 - Pages: 16

Premium Essay

Nt1330 Unit 4.1 Data Center

...4.1 Data Center Grouping of IT resources such as servers , databases ,networking and communication devices in close with each other rather than having them geographically dispersed. Advantages of Data Center :- 1. It allows for power sharing 2. Higher efficiency in usage shared IT resources 3. Improved accessibility for IT personnel(less management team is required) 4.1.1 Different Types of Infrastructures in a Data Center 1. Building Infrastructure:- “BUILDING SYSTEM” electrical system, fire suppression, lightning, security etc. 2. Data Center Infrastructure:- power, cooling racks, management, physical security, fire suppression etc. 3. IT Infrastructure :-“IT ASSETS” servers, storage, hypervisor etc. 4. Network...

Words: 1265 - Pages: 6

Free Essay

It Didn't Have the Data

...1.1 Purpose and Scope The information security concern regarding information disposal and media sanitization resides not in the media but in the recorded information. The issue of media disposal and sanitization is driven by the information placed intentionally or unintentionally on the media. Electronic media used on a system should be assumed to contain information commensurate with the security categorization of the system’s confidentiality. If not handled properly, release of these media could lead to an occurrence of unauthorized disclosure of information. Categorization of an information technology (IT) system in accordance with Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems1 , is the critical first step in understanding and managing system information and media. Based on the results of categorization, the system owner should refer to NIST Special Publication (SP) 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations2 , which specifies that “the organization sanitizes information system digital media using approved equipment, techniques, and procedures. The organization tracks, documents, and verifies media sanitization and destruction actions and periodically tests sanitization equipment/procedures to ensure correct performance. The organization sanitizes or destroys information system digital media before its disposal...

Words: 3672 - Pages: 15

Free Essay

Information Security Policy Essay

...Deduplication Kirth A. Prawl Prof.  Eli Weissman Devry College of New York October 10, 2012 Deduplication technology is a way to streamline backup and storage of data by making sure that redundant records are filtered out prior to backup. In some cases, using deduplication technology can eliminate as much as 95% of the data traditionally backed up. If that figure seems high, consider the case of corporate documents that are distributed to hundreds or even thousands of employees. Each individual may have an identical copy of electronic files such as procedures manuals. When all workstations are backed up without considering duplicate records, the backup itself will contain much wasted space. By managing the data more efficiently and identifying files that are identical, deduplication technology can produce a backup that is scaled down in size, making it more manageable in terms of time and resources as well as in terms of physical media such as disk or tape space. Deduplication technology can be implemented at the network level and consist of only local operations, or it can also be integrated into cloud based technologies that take advantage of economies of scale through the use of remote and managed services. Deduplicate data Eliminating redundant data can significantly shrink storage requirements and improve bandwidth efficiency. Because primary storage has gotten cheaper over time, enterprises typically store many versions of the same information so that new work...

Words: 1234 - Pages: 5

Free Essay

Cis517- Project Charter

...gregosmith@myemail.com Project Objectives: Develop an effective solution in providing more cost effective, energy efficient means of producing computer products and meeting the energy needs of the data center in an effort to reduce the energy cost. Find ways to reduce data storage issues by considering cloud computing to reduce costs in additional storage hardware and labor hours required to maintain physical data storage usage. External consultants will be utilized as subject matter experts in green computing contributing ideas in the initial planning and development stage in assisting in providing technological concepts used to facilitate a green computing environment. The company will also consult with members of the Green Grid in providing green technology solutions to datacenters.” As business demands increase, so does the number of data center facilities which house a rising amount of powerful IT equipment. Data center managers around the world are running into resource limits related to power, cooling, and space, making the resource efficiency of data centers an important topic of discussion.”(Unknown, 2011) With the assistance of the Green Grid, We Are Big, Inc hopes to find green computing solutions for data storage, cooling, and finding effective energy cost solutions. Research data on effective green...

Words: 551 - Pages: 3

Free Essay

How Computer Technology Ties Into Information Technology

...How computer technology ties into information technology David Carlson CIS/319 May 1, 2011 Bob Sanders How Computer Technology Ties into Information Technology This paper will show how computer systems are an integral part of information technology. We will look at: the best methods of data input for given situations, in given situations what are the best methods of output, the different types of storage and their optimal use, and how certain components affect computer speed. Accuracy of Data Input is Important Now we will look at five different scenarios and what would be the best way to input data and why. Printed questionnaires or surveys are often part of research studies so the method used to input their data into the system needs to be as accurate as can be. Human data-entry devices (HDED) would not be a very reliable form of data-entry because most research studies put out hundreds if not thousands of surveys and for people to try to input all that data accurately would be almost impossible. Since almost all surveys are multiple choice the best choice for the input method is the optical mark reader. The optical mark reader is a source-data automation input device (SDAID) that scans the survey detecting marks on the answer grid. Telephone surveys are another changing part of society, in the past phone surveys were handles by multitudes of phone operators asking questions and typing the responses into the computer. Times have changed and companies are seeing that...

Words: 852 - Pages: 4

Free Essay

Storage Technologies

...Storage Technologies Nearly every facet of computer technology, like processor speed, memory capacity and I/O capabilities has seen dramatic improvements since its inception. The one technology that has lagged behind is storage. Although data storage has seen considerable improvements from its infancy in 1956, it has not seen major disruptive changes; though, according to the CEO of Pure Storage, Scott Dietzen, in this next decade it’s going to be storage’s turn to face disruptive change (Korbin, 2011). This means that as this decade takes its course, we’ll see major changes in the way we store our data. Pure Storage, a company focused on data storage, has proposed one solution to our need to effectively and efficiently store large amounts of data. We all have heard of flash memory—non-volatile computer storage that can be electrically erased and reprogrammed—and we also know that flash memory is quite expensive compared to traditional storage technologies. The benefit of adopting flash memory for storing data has been unrealized by enterprises, primarily due to the high cost of implementing such infrastructure. Nevertheless, for enterprises undertaking the transition to a virtualized environment, flash memory can be an alluring proposition. Faster, smaller and more efficient than traditional disk technologies, flash makes a convincing case (Korbin, 2011). Scott Dietzens’ Pure Storage company boasts a solution that delivers enterprise-caliber storage at a price point geared...

Words: 871 - Pages: 4

Premium Essay

Business

.... How could a business use information technology to increase switching cost and lock in its customers and suppliers? Use business example to support your answers. Ans:- Switching cost: Investment in information system technology ,such as those mentioned in the Wal-Mart example ,can make customers or suppliers dependent on the continued use of innovative ,mutually beneficial interenterprise information systems , they become reluctant to pay the cost I time , money , effort ,and inconvenience that it would take to switch to a company’s competitors. Lock in customers and suppliers: Investment in IT can allow a business to lock in customers and suppliers by building valuable new relationships with them. 5. What processor, memory, magnetic disk storage, and video display capabilities would u require for a personal computer that you would use for business purpose? Explain your choices. For the business purpose data and information must be store until needed using a verity of storage. For using processor, memory, magnetic disk storage, and video display capabilities that I would require for a personal computer use for business. These are…… Processor: the main component is the processor. The processor should be arithmetic-logic unit and the control unit. Arithmetic and logic functions required to the business. I like to...

Words: 544 - Pages: 3

Premium Essay

It 205 Appendix a

...and Usage of Information Technology Infrastructure Components and Technologies The following terms are examples of information technology infrastructure components and technologies used in business. Research definitions using the Internet. You will write a definition of each term and provide at least two examples of the component or technology. Provide citations and references for all resources. Term | Definition | References | Examples (At least two) | Hardware | Physical parts of a computer system | http://www.techterms.com/definition/hardware | Monitor and mouse | Software | Computer software is a general term used to describe computer programs that perform some task on a computer system | www.tigerdirect.com/.../category_tlc.asp?CatId=26&name=Software | Microsoft office, Adobe products | Data management technology | a general term that covers a broad range of data applications. It may refer to basic data management concepts or to specific technologies. | http://www.techterms.com/definition/data_management | Data design, data storage | Networking | the practice of linking two or more computing devices together for the purpose of sharing data. | http://compnetworking.about.com/cs/basicnetworking/f/whatsnetworking.htm | PAN (personal area network) LAN (local area network) | Telecommunications | the transmission of signals over long distances | http://www.techterms.com/definition/telecommunications | Telephone, radio | Technology services | services that...

Words: 430 - Pages: 2

Free Essay

Sdfdsfadsf

...Storage Switzerland White Paper Storage Infrastructures for Big Data Workflows Sponsored by: Prepared by: Eric Slack, Sr. Analyst May 2012 Storage Infrastructures for Big Data Workflows Introduction Big Data is a term used to describe data sets which have grown so large that traditional storage infrastructures are ineffective at capturing, managing, accessing and retaining them in an acceptable time frame. The thing that separates Big Data from simply a large archive is the need to process these data sets or to provide file access to multiple users quickly. Some Big Data use cases involve analytics, the computer-based analysis of large amounts of relatively small data objects, for the purpose of pulling business value from that information. Many of these involve files supporting transaction analysis or automated event processing, such as database or web analytics, which won’t be addressed in this white paper. Instead, this paper will deal with another form of Big Data that supports file processing workflows, often sequential in nature, where large files are shared by knowledge workers to create digital products, support research and perform analysis to increase productivity. Also considered will be Big Data supporting large file analytics in which files are shared by large, high performance compute clusters to support complex analysis and drive business decisions. Big Data File Processing Workflows Some of the industries using large file, Big Data sets in these two use cases...

Words: 2944 - Pages: 12

Premium Essay

How Speed of a Computer Is Affected by Different Storage Devices

...By Different Storage Devices Traci Benge CIS/201 May 7, 2012 Charles Jacks Abstract Today’s computers have different ways to store data. Some examples of these ways are devices as the hard disk (aka magnetic disk), floppy disk, RAM, CD ROM, tape, and the flash (aka jump drive, USB memory stick, and thumb drive). Storage devices come in two different sources; primary or secondary. Each of these devices causes the computer to process data at different speeds. This paper will show how each of these devices store data and how they affect the speed of the computer. How Speed of a Computer Is Affected By Different Storage Devices The hard disk of a computer is a secondary type of storage. It can be either an external or internal source of storage for a computer. It is primarily to store a mass amount of data. The data remains stored on the hard disk indefinitely until permanently deleted. The hard disk stores the operating systems and application instructions. Without the hard disk the computer would not know how to open any of its operating systems or any of the other applications for the user. In this RAM (Random Access Memory) works with the hard disk. RAM is part of the primary storage; it contains a software program with small amounts of data for processing. When the computer boots up, it loads the whole program from the hard disk through RAM. Its storage capabilities get larger the farther away it is from the CPU. Saved data gets written...

Words: 1119 - Pages: 5