Browse Definitions :
Definition

volatile memory

What is volatile memory?

Volatile memory is a type of memory that maintains its data only while the device is powered. If the power is interrupted for any reason, the data is lost. Volatile memory is used extensively in computers -- ranging from servers to laptops -- as well as in other devices, such as printers, LCD displays, routers, cell phones, wearables and medical equipment.

In a computer, volatile memory is typically used for the system's random access memory (RAM), both the main memory and the processor's L1, L2 and L3 cache. It is distinguished from nonvolatile storage --such as solid-state drives (SSDs), hard disk drives (HDDs) or optical disks -- by the fact that nonvolatile devices retain their data even when their power is cut off.

A computer's volatile memory is sometimes referred to as primary storage, as opposed to secondary storage, which is typically made up of nonvolatile storage devices. However, the meanings of primary and secondary storage have evolved over the years, and the terms are now often used when describing tiered storage, although the original usage still persists.

Volatile memory is used for a computer's RAM because it is much faster to read from and write to than today's nonvolatile memory devices. Even the latest storage class memory (SCM) devices such as Intel Optane can't match the performance of the current RAM modules, especially the processor cache. However, the data in RAM stays there only while the computer is running; when the computer is shut off, RAM loses its data.

For this reason, RAM is typically used along with nonvolatile memory, which does not lose its data when the computer's power is turned off or the storage device is disconnected from a power source. Nonvolatile memory also does not need to have its memory content periodically refreshed like some volatile memory. In addition, nonvolatile storage is cheaper and can hold much more data. Even so, today's computers require the fastest memory and cache possible, which means sticking with volatile memory until a better technology comes along.

Most of today's computers use dynamic RAM (DRAM) for the main memory and static RAM (SRAM) for processor cache. DRAM supports greater densities than SRAM, and it is cheaper. However, DRAM also requires more power and does not perform as well as SRAM. One of the biggest challenges with DRAM is that the capacitors used for storing the data tend to leak electrons and lose their charge. This means that DRAM memory devices need to be refreshed periodically to retain their data, which can affect access speeds and increase power usage.

comparing memory types
Volatile memory (like SRAM and DRAM) requires power to maintain data, while non-volatile memory (like NAND Flash and NOR Flash) does not require power to retain data.

Because of the differences between DRAM and SRAM, DRAM is better suited for main memory and SRAM is better suited for processor cache. SRAM requires more space to store the same amount of data as DRAM. The cache is smaller than the main memory, so SRAM's lower density is not as much of an issue, nor is the higher price tag.

The cache also requires the best possible performance, which again makes SRAM a more natural fit. On the other hand, DRAM can store more data in a given space and it is cheaper, so it is more appropriate for the main memory, which needs to hold much more data but doesn't have the same performance requirements as the cache.

See also: NVMe, NVRAM, MRAMcomputer hardware, storage medium

This was last updated in June 2022

Continue Reading About volatile memory

Networking
  • remote infrastructure management

    Remote infrastructure management, or RIM, is a comprehensive approach to handling and overseeing an organization's IT ...

  • port address translation (PAT)

    Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 ...

  • network fabric

    'Network fabric' is a general term used to describe underlying data network infrastructure as a whole.

Security
  • multifactor authentication

    Multifactor authentication (MFA) is an account login process that requires multiple methods of authentication from independent ...

  • cyber insurance

    Cyber insurance, also called cyber liability insurance or cybersecurity insurance, is a contract an entity can purchase to help ...

  • Protected Extensible Authentication Protocol (PEAP)

    Protected Extensible Authentication Protocol (PEAP) is a security protocol commonly used to protect wireless networks.

CIO
  • digital innovation

    Digital innovation is the adoption of modern digital technologies by a business.

  • business goals

    A business goal is an endpoint, accomplishment or target an organization wants to achieve in the short term or long term.

  • vertical SaaS (software as a service)

    Vertical SaaS describes a type of software as a service solution created for a specific industry, such as retail, financial ...

HRSoftware
  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • skill-based learning

    Skill-based learning develops students through hands-on practice and real-world application.

  • gamification

    Gamification is a strategy that integrates entertaining and immersive gaming elements into nongame contexts to enhance engagement...

Customer Experience
  • virtual assistant (AI assistant)

    A virtual assistant, also called an AI assistant or digital assistant, is an application program that understands natural ...

  • Microsoft Dynamics 365

    Dynamics 365 is a cloud-based portfolio of business applications from Microsoft that are designed to help organizations improve ...

  • Salesforce Commerce Cloud

    Salesforce Commerce Cloud is a cloud-based suite of products that enable e-commerce businesses to set up e-commerce sites, drive ...

Close