Browse Definitions :
Definition

extended memory

Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.

Extended memory was introduced in the Intel 80286 processor, increasing the amount of addressable memory beyond what was introduced in the similarly named expanded memory (EMS). Prior to XMS, expanded memory was used to increase the 640KB upper limit of DOS to 1MB using a gated memory card riser.

Extended memory initially boosted the addressable memory to 16MB. XMS 2.0 extended the capacity to 64GB and XMS 3.0 to up to 4GB. Beyond XMS 3.0, AMD64, the de facto x86-64 standard, expands maximum memory to 256TB.

Programs written to use expanded memory would be redirected by driver emulation to use extended memory’s upper memory area instead. This process involved no special hardware, just increased RAM and support in the processor design.

Extended memory can only be addressed by software running in protected mode as all but the small portion of upper memory are unreadable by programs running in standard real mode.

Fun fact: The 640KB upper limit of DOS is the alleged source of the often-quoted but steadfastly denied Bill Gates statement: “640KB ought to be enough for anyone.”

This was last updated in February 2014
SearchNetworking
  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close