Browse Definitions :
Definition

volatile memory

What is volatile memory?

Volatile memory is a type of memory that maintains its data only while the device is powered. If the power is interrupted for any reason, the data is lost. Volatile memory is used extensively in computers -- ranging from servers to laptops -- as well as in other devices, such as printers, LCD displays, routers, cell phones, wearables and medical equipment.

In a computer, volatile memory is typically used for the system's random access memory (RAM), both the main memory and the processor's L1, L2 and L3 cache. It is distinguished from nonvolatile storage --such as solid-state drives (SSDs), hard disk drives (HDDs) or optical disks -- by the fact that nonvolatile devices retain their data even when their power is cut off.

A computer's volatile memory is sometimes referred to as primary storage, as opposed to secondary storage, which is typically made up of nonvolatile storage devices. However, the meanings of primary and secondary storage have evolved over the years, and the terms are now often used when describing tiered storage, although the original usage still persists.

Volatile memory is used for a computer's RAM because it is much faster to read from and write to than today's nonvolatile memory devices. Even the latest storage class memory (SCM) devices such as Intel Optane can't match the performance of the current RAM modules, especially the processor cache. However, the data in RAM stays there only while the computer is running; when the computer is shut off, RAM loses its data.

For this reason, RAM is typically used along with nonvolatile memory, which does not lose its data when the computer's power is turned off or the storage device is disconnected from a power source. Nonvolatile memory also does not need to have its memory content periodically refreshed like some volatile memory. In addition, nonvolatile storage is cheaper and can hold much more data. Even so, today's computers require the fastest memory and cache possible, which means sticking with volatile memory until a better technology comes along.

Most of today's computers use dynamic RAM (DRAM) for the main memory and static RAM (SRAM) for processor cache. DRAM supports greater densities than SRAM, and it is cheaper. However, DRAM also requires more power and does not perform as well as SRAM. One of the biggest challenges with DRAM is that the capacitors used for storing the data tend to leak electrons and lose their charge. This means that DRAM memory devices need to be refreshed periodically to retain their data, which can affect access speeds and increase power usage.

comparing memory types
Volatile memory (like SRAM and DRAM) requires power to maintain data, while non-volatile memory (like NAND Flash and NOR Flash) does not require power to retain data.

Because of the differences between DRAM and SRAM, DRAM is better suited for main memory and SRAM is better suited for processor cache. SRAM requires more space to store the same amount of data as DRAM. The cache is smaller than the main memory, so SRAM's lower density is not as much of an issue, nor is the higher price tag.

The cache also requires the best possible performance, which again makes SRAM a more natural fit. On the other hand, DRAM can store more data in a given space and it is cheaper, so it is more appropriate for the main memory, which needs to hold much more data but doesn't have the same performance requirements as the cache.

See also: NVMe, NVRAM, MRAMcomputer hardware, storage medium

This was last updated in June 2022

Continue Reading About volatile memory

Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

  • asymmetric cryptography

    Asymmetric cryptography, also known as public key cryptography, is a process that uses a pair of related keys -- one public key ...

  • identity provider

    An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of ...

CIO
  • big data as a service (BDaaS)

    Big data as a service (BDaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • Nvidia Omniverse

    Nvidia Omniverse is a computing platform built to enhance digital design and development by integrating 3D design, spatial ...

HRSoftware
  • human capital management (HCM)

    Human capital management (HCM) is a comprehensive set of practices and tools used for recruiting, managing and developing ...

  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close