Browse Definitions :
Definition

volatile memory

What is volatile memory?

Volatile memory is a type of memory that maintains its data only while the device is powered. If the power is interrupted for any reason, the data is lost. Volatile memory is used extensively in computers -- ranging from servers to laptops -- as well as in other devices, such as printers, LCD displays, routers, cell phones, wearables and medical equipment.

In a computer, volatile memory is typically used for the system's random access memory (RAM), both the main memory and the processor's L1, L2 and L3 cache. It is distinguished from nonvolatile storage --such as solid-state drives (SSDs), hard disk drives (HDDs) or optical disks -- by the fact that nonvolatile devices retain their data even when their power is cut off.

A computer's volatile memory is sometimes referred to as primary storage, as opposed to secondary storage, which is typically made up of nonvolatile storage devices. However, the meanings of primary and secondary storage have evolved over the years, and the terms are now often used when describing tiered storage, although the original usage still persists.

Volatile memory is used for a computer's RAM because it is much faster to read from and write to than today's nonvolatile memory devices. Even the latest storage class memory (SCM) devices such as Intel Optane can't match the performance of the current RAM modules, especially the processor cache. However, the data in RAM stays there only while the computer is running; when the computer is shut off, RAM loses its data.

For this reason, RAM is typically used along with nonvolatile memory, which does not lose its data when the computer's power is turned off or the storage device is disconnected from a power source. Nonvolatile memory also does not need to have its memory content periodically refreshed like some volatile memory. In addition, nonvolatile storage is cheaper and can hold much more data. Even so, today's computers require the fastest memory and cache possible, which means sticking with volatile memory until a better technology comes along.

Most of today's computers use dynamic RAM (DRAM) for the main memory and static RAM (SRAM) for processor cache. DRAM supports greater densities than SRAM, and it is cheaper. However, DRAM also requires more power and does not perform as well as SRAM. One of the biggest challenges with DRAM is that the capacitors used for storing the data tend to leak electrons and lose their charge. This means that DRAM memory devices need to be refreshed periodically to retain their data, which can affect access speeds and increase power usage.

comparing memory types
Volatile memory (like SRAM and DRAM) requires power to maintain data, while non-volatile memory (like NAND Flash and NOR Flash) does not require power to retain data.

Because of the differences between DRAM and SRAM, DRAM is better suited for main memory and SRAM is better suited for processor cache. SRAM requires more space to store the same amount of data as DRAM. The cache is smaller than the main memory, so SRAM's lower density is not as much of an issue, nor is the higher price tag.

The cache also requires the best possible performance, which again makes SRAM a more natural fit. On the other hand, DRAM can store more data in a given space and it is cheaper, so it is more appropriate for the main memory, which needs to hold much more data but doesn't have the same performance requirements as the cache.

See also: NVMe, NVRAM, MRAMcomputer hardware, storage medium

This was last updated in June 2022

Continue Reading About volatile memory

Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close