Browse Definitions :
Definition

active cooling

Active cooling is the use of fans to reduce the heat of computer components. Active cooling contrasts with passive cooling, which involves reducing the speed at which a component is running to reduce its heat. 

Typically, a combined approach is used, in which either active or passive cooling is the first option. In power management settings, for example, selecting active cooling means that the system software will increase fan speed to keep the processor at an appropriate operating temperature and will only slow down the speed of the processor if it becomes necessary.  Slowing the processor means that system performance will be slower.

This was last updated in May 2013

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

This is completely wrong. Active coolers use energy to cool: like a peltier or phase-change cooler (what's in your refrigerator).

A radiator with a fan is a passive cooler because it does not remove heat by use of energy (the electricity to run the fans and radiator pump is not what this means).

The easy way to tell is if the cooler can lower temperatures below ambient.

A radiator with a fan will never lower temperatures below ambient because it's passively radiating heat to the environment.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close