Browse Definitions :
Definition

rugged IT

Rugged IT is a marketing term for hardware that is designed to operate in extremely harsh environments and conditions. There are three generally accepted levels of ruggedization: semi-rugged, fully-rugged and ultra-rugged. The levels describe a product's ability to survive drops, vibration, dust, immersion and extreme temperatures.

Semi-rugged devices, which are increasingly being called business-rugged by marketers, are usually enhanced versions of commercial off-the-shelf (COTS) hardware. The components are the same, but they are protected better.  For example, a semi-rugged laptop might have a thicker case, a gel-mounted hard disk drive and a spill-resistant keyboard. Fully-rugged devices are designed from the inside-out to work in extreme temperatures, to be impervious to being dropped, to resist shocks and vibrations and to be dustproof and waterproof. A fully-rugged laptop may have a solid state hard drive, which has no moving parts, runs cool and doesn’t need for a fan. (another moving part that adds weight to the device.)  Ultra-rugged devices, which are usually designed to meet precise specifications for military use, are made to handle the harshest environmental conditions. An ultra-rugged laptop can be left out in a sandstorm, frozen in a blizzard or sent on a vibrating rocket into space without any detrimental effects. 

The levels of ruggardization are not standardized, which means that vendors have the freedom to use the labels as they see fit. Most vendors incorporate other values in their self-evaluations to provide potential customers with some assurance that their products deserve the label they have been given. The two most common values cited are from the Ingress Protection (IP) Code, a system for classifying the degrees of sealing protection provided by the enclosures of electrical equipment and MIL STD 810, a series of testing guidelines set by the U.S. Department of Defense for military and commercial equipment. 

Learn more:

Matthew Elliot reviews several rugged laptops and explains more about how marketers promote their rugged products.

The Engineering ToolBox has more information about Ingress Protection Code (IP Code).

Secure Systems and Technologies has an overview of MIL STD 810.

Michael Morisy writes that "Rugged mobile devices must be more than durable in harsh environments."

This was last updated in May 2010

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

http://www.digitaltrends.com
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close