Browse Definitions :
Definition

hard error

Contributor(s): Matthew Haughn

A hard error is an issue in RAM that results from a permanent physical flaw in the module caused by a hardware failure or defect.

Hard errors can manifest as a memory module that does not register on start and prevents booting. They can also produce intermittent data corruption, in which case they can require multiple tests and reboots to differentiate them from soft errors.

When troubleshooting suspected hard errors, it is usually advisable to test RAM that is known to function at its default timings, which enables fast confirmation of hardware issues. RAM may be tested a stick at a time to find the faulty module then. If neither sets of RAM function correctly, you should verify that the timings are correct. Timings for RAM may be tried on default SPD  settings, which can be researched by looking up a particular model or manufacturer’s recommendations. You can use a free memory testing programs, such as memtest86+, or the memory test provided with your operating system.  

Sometimes RAM with hardware degradation or just not performing to specification can be made to work at slower settings. If the issue persists, however, it may be that the CPU or motherboard needs replacing or on the other hand, a BIOS/UEFI update may be required to better support the modules.

This was last updated in July 2015

Continue Reading About hard error

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close