Browse Definitions :
Definition

serial presence detect (SPD)

When a computer is booted (started), serial presence detect (SPD) is information stored in an electrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells the basic input/output system (BIOS) the module's size, data width, speed, and voltage. 

The BIOS uses this information to configure the memory properly for maximum reliability and performance. If a memory module does not have SPD, the BIOS assumes the memory module's information. With some memory, this does not cause problems. But SDRAM memory has to have SPD or the computer may not boot at all. If it does boot, the assumed information may cause fatal exception errors

Before SPD, memory chips were identified with parallel presence detect (PPD). PPD used a separate pin for each bit of information,which meant that only the speed and density of the memory module could be stored because of the limited space for pins. The EEPROM chip on an SPD memory module only requires two pins so more information can be stored.

This was last updated in July 2015

Continue Reading About serial presence detect (SPD)

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • cyberterrorism

    Cyberterrorism is often defined as any premeditated, politically motivated attack against information systems, programs and data ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close