Wednesday, September 1, 2010

Apple Macbook

Apple laptops are widely used all over the world thanks to their minimalistic design and high performance. The only drawback is the price but for one who needs a laptop that is hassle free, performs well and looks great while doing it, the Apple Macbook range of laptops is the perfect choice. Apple recently launched a new version of their Macbooks in India, after the success of their Macbook Air series.

This new line of Apple Laptops that have been introduced in the country are called the called Macbook Pro laptops. They comes with a lot of changes both externally and internally including a new cpu that is based on Intel's Penryn-class of CPUs, a new glass touch pad and a led backlit keyboard and screen. Apart from these changes, they have also improved a lot upon the specifications and features that has made it one of the most attractive gadgets in the market these days.

Even though the Laptop Price for the apple products is high they are not overpriced as they perform far better than other laptops and are available at all apple laptop shops in the country.

A few specifications of these Apple Macbook are a 2.0 GHz Intel Core Duo processor, with a 667MHz FSB and ram. It comes with a 100GB SATA hard drive operating at 5400 RPM. Its display is powered by a 256 mb Mobility Radeon X1600 by ATI on a pci express slot. Its video output is a Dual-link DVI and a VGA adapter and it also includes \one FireWire 400 port and two USB 2.0 ports.

The outputs for multimedia available in this laptop are an optical digital and analogue audio I/O, with a built-in microphone and stereo speakers. The optical drive in this laptop is a slot-loading SuperDrive and comes with an Illuminated keyboard, a scrolling TrackPad and for internet connectivity they have a Built-in AirPort Extreme (802.11g) WiFi adapter.

Portable External

A portable external hard drive is indeed essential in this generation where people can no longer seem to live without computers. More than the convenience of communicating, sharing information and other things that you could do through the internet, computers have become the go-to machine when it comes to typing, playing music and making other things.

You can even use a computer for editing videos, photos and audio files. With the many things that you can do with computers, one thing you need to consider is memory. Undeniably, the desktop computer can house more memory as compared to the laptop computer. Portable external hard drive can expand your computer's memory.

Some files and programs you may not want to store them in your computer anymore. You can decide to erase a few of your files, but then you can always get a back up hard drive to address your needs.

You could always doubt how technology is working, but if you are computer savvy, you would be dying every minute that pass without you having a more sophisticated item like the external hard drive. Yes, everyone is simply getting the Esata external hard drive because of its reputation for being the fastest connectivity device as compared to the firewire and the USB 2.0 connectors.

The portable external hard drive is a more convenient way to store your files and keep them on the go. It is going to be really very easy for you to access your files, wherever you are and even if you are using someone else's computer.

Different features have been developed to even make a computer bug's life much easier. There are even one TB external hard drives, which mean that these can store up to 1 terabyte of files. That is hundreds, if not thousands, of folds more than your floppy disk could do.

Aside from that, there is also a 500 gb external hard drive for you to try. Of course the connectivity could also vary from esata to firewire and to USB 2.0 which most computers are built with.

Another thing that you can trust in the portable external hard drive is that they are sold at a price that range from cheap to expensive. It all depends on the brand and capacity of the item.

You could find the best external hard drive in most IT shops and if ever you have problems or doubts, you could look for external hard drives review to help you out. You have to ensure getting your money's worth by carefully buying the best portable external hard drive.

Olive Laptops

Olive laptops are new to the cheap laptops market and their latest entry to the market is the Olive Zipbook. The keyboard and touch pad have more than satisfactory ergonomics. The display has an aspect ratio of 16:9 which eliminates the annoying black lines on top and bottom of movies, the 10.2-inch screen is backlit by a WLED hence it has better viewability, and has a resolution of 1024 x 600. The WiFi in it is N wireless enabled, and couple with it comes Bluetooth and a 10/100 LAN port too.

The Battery that comes in it is a regular 6 cell Lithium ion, and has a simple retention mechanism on the back. This netbook is powered by a Qualcomm QSC6085 chipset and also supports EV-DO. The cpu in it is an Intel Atom N270 processor which runs at 1.6 ghz, and comes with 1-GB DDR2 memory, with a 160-GB HDD for storage and weighs in at only 1.3 kgs. The Laptop come preinstalled with a Windows operating system.

This netbook isn't all that flashy as other Laptops in India and sports simple looks, which isn't necessarily a bad thing. It has a matte black finish on its back panel which continues to the inside as well. The internal surfaces including the keyboard and touchpad also have a matte finish.

However the power button and the touch pad aren't black in color.

The keyboard extends from edge to edge and is only 8% smaller than regular keyboards, which makes it resemble a normal keyboard in terms of feel and user experience. The size of the shift and Enter keys are normal too which is very convenient. The only noticeable problem that was noticed was there are no separate PG Up and PG Dn keys, they can be accessible using the Function key however.

The touch pad in it is very likeable, especially because it has a separate marked scroll zone that makes it even easier to navigate pages. Since laptop prices are very competitive these days this Laptop too has been priced very aggressively.

Sunday, August 1, 2010

computer systems

First, the computer's settings
Close the "File and Print Sharing"
File and print sharing should be a very useful feature, but do not need it, is also very good hacking vulnerabilities. Therefore, there is no need to "File and Print Sharing" situation, we can turn it off. Right-click with the mouse "network neighbors", select "Properties", Dell inspiron mini 9 battery then click "File and Print Sharing" button, will pop up the "File and Print Sharing" dialog box in two hook can be removed . Although the "File and Print Sharing" turned off, but it does not ensure safety, but also to modify the registry, it is prohibited to change the "File and Print Sharing."
Open the Registry Editor, select the "HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ NetWork" primary key, primary key in the new DWORD under the key type, key named "NoFileSharingControl", key set to "1" the prohibition of this function to achieve the ban to change the "File and Print Sharing" purpose; key to "0" to allow this feature. In this way, "Network Neighborhood" and "Properties" dialog box "File and Print Sharing" to cease to exist.
Disable the Guest account
There are many invasions were further obtained through this account administrator password or permissions. If you do not want to put your computer to others as toys, that is a good ban. Open the Control Panel, double-click "Users and Passwords", click "Advanced" tab, then click the "Advanced" button, pop-up Local Users and Groups window. Guest account in the top right-click, select Properties, in the "General" page select "Account is disabled." In addition, the Administrator account was renamed to prevent hackers know the administrator account, which will in large part to ensure computer security.

Prohibit the establishment of air link
In the case of default, any user can connect to the server through the air connection, enumerate account and guess your password. Therefore, we must prohibit the establishment of air link. Is to modify the registry: Open the registry "HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Control \ LSA", the DWORD value "RestrictAnonymous" The key to "1" can be.

Second, hide IP address
Hackers often use some network technology to detect host information see our main objective is to get the network host's IP address. IP address in network security is a very important concept, if the attacker knows your IP address is equivalent to ready his attack goal, he could be consulted IP Fadong various attacks such as DoS (Denial of Service) attacks , Floop overflow attacks. Hide IP address of the main method is to use a proxy server. Compared with the direct connection to the Internet using a proxy server to help protect Internet users IP address, thereby protecting the Internet security.
The principle of the proxy server is the client (user access to the Internet computer) and remote server (such as the user wants to access a remote WWW server) set up between a "transit point", when a client machine to the remote server requests for services, the proxy server first intercept the user's request, then the service request to the proxy server a remote server in order to achieve client and the link between the remote server. Obviously, using a proxy server, other users can only detect the proxy server IP address instead of the user's IP address, which the user IP address, Dell kd476 battery a hidden purpose, to protect the user access security. Free proxy server site there are many, you can own use tools such as proxy hunters to find.

Third, close unnecessary ports
Hackers often scan time of the invasion port of your computer, if you install the port monitor program (such as Netwatch), the monitoring program will have a warning prompt. If you encounter such invasion tool available for less than the port closed.

4, replacement of an administrator account
Administrator account has the highest system privileges, once the account is being used, lead to disastrous consequences. One common means of hacking is trying to get Administrator account's password, so we need to re-configure the Administrator account. The first is set for the Administrator account, a strong complex password, and then we rename the Administrator account, create an Administrator account without administrator privileges to deceive the intruder. In this way, intruders can hardly figure out which account has administrator privileges true, to some extent also reduced the risk.

Fifth, stop the invasion of Guest account
Guest account, the so-called guest account, it can access the computer, but limited. Unfortunately, Guest also opened the door for the hacker! Online There are many articles have introduced the use of Guest Users get administrator rights and for this reason, the eradication of Guest account on the system invasion.

Disable or delete the Guest account is a complete best way, but certain essential 在 use to Guest of account of, in respect require alternative ways to do defense work Le. First, set up to give a strong password Guest, and then set the Guest account in detail the physical access path. For example, if you want to prevent Guest users can access the tool folder, you can right-click the folder, the pop-up menu, select "Security" tab, from which you can access this folder to see all the users. Remove all users other than administrators can. Or permission for the corresponding user to set permissions, for example, only "List Folder Contents" and "read" and so on, so a lot safer.
6, install the necessary security software
We should also be installed on your computer and use the necessary Hacking Software, antivirus software and firewalls are essential. Open them in Internet time, so even if a hacker attack on our security is guaranteed.
7, against Trojans
Trojans are implanted into the computer will steal useful information, so we have to prevent the implantation of Trojan horses, hackers, commonly used methods are:
● In the download file into your first new folder, and then anti-virus software to detect, to play the role of prevention in advance.

● In "Start" → "program" → "Start" or "Start" → "program" → "Startup" option in the operation to see if there is an unknown item, if so, delete. The registry in HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run All to "Run" as the prefix can delete all suspicious programs.

8, do not return messages from strangers
Some hackers may be posing as some of the formal name of the site, and then compile a high-sounding reason to send a letter asking you to enter your Internet user name and password, if you press the "OK", your account number and password into the hacker mailbox. So Do not return messages from strangers, even if he did not say pleasant, attractive fooled again.
9, do the security settings of IE
Applets ActiveX controls and strong features, but there are also being used by the hidden malicious code in Web pages is often use small programs written in these controls, simply open the web page will be run. So to avoid attacks by malicious web page only to run against these malicious code. IE provides several options to this specific setup steps are: "Tools" → "Internet Options" → "Security" → "Custom Level", it is recommended that you disable ActiveX controls and related options.
Some caution is not always wrong! In addition, the security settings in IE, we can set the Internet, Local Intranet, Trusted Sites, Restricted Sites. However, Microsoft is hidden here, "My Computer" security settings, by modifying the registry to the option open, Dell latitude d400 battery can enable us to deal with ActiveX controls and Applets have more choices, and to generate local computer security greater impact.

The following are specific ways: Open the "Start" menu "Run" in the pop-up "Run" dialog box, type Regedit.exe, open the Registry Editor, click in front of "+" sign in turn expand to: HKEY_CURRE -NT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ InternetSettings \ Zones \ 0, in the right window, find the DWORD value of "Flags", the default key is 21 hexadecimal (decimal 33), double-click the "Flags", the pop-up The dialog will change its key value "1" to close the Registry Editor.

Without restarting the computer, re-open IE, once again click on "Tools → Internet Options → Security" tab, you'll see one more "My Computer" icon, where you can set its security level. The level of security it set higher, so to prevent more closely.

Final recommendations to patch their systems, Microsoft is still very useful to those patches.

Network Administration

In any organization that has an IT environment with multiple computers that are connected, there is a need for network administration. In general, the job of a network administrator involves supporting the hardware and software that are associated with the network of the IT environment. However, the functions of network administration differ depending on the requirement of the business. It may include network design and implementation, network security, connectivity to servers, working with routers, or troubleshooting at individual workstation. However, the basic function remains the same. Seattle network administration offers a practical solution to the IT environment of different types of organizations where computer network is the core of the system.

Function of Seattle Network Administration

Network administration is crucial to keep the network functioning of an IT environment at the optimal level. Depending on the complexity of the network the duties of the network administrator can vary tremendously. Apart from maintaining the LAN and WAN of the network, the functions include email administration, backup and maintenance of server, maintenance of user logon and accessibility, etc. some service providers also offer the service of protecting internal users from outside threats such as viruses, spyware and hackers.

Why Organizations Need Network Administration

For a perfect and smooth running of an IT environment, it is essential that the computers connected with each other can communicate with each other as well as communicate with the server and printers of the network. Network administration makes sure that these things work well along with the Internet services. Besides, the maintenance of VPNs, FTP servers and gateways also comes under the service of Seattle network administration.

There is also a significance of hiring network administration. Network administrator decides the law and order of the network which has a greater significance for the company. This provides the users a complete idea about the policies of the company.

What are the Benefits of Hiring Seattle Network Administration

Although many companies have their in-house network administrators to maintain their IT network system, outsourcing the job to a Seattle network administration service provider has its own benefits. First of all, you can have a skilled technician to handle the important and crucial function of network services in your organization. Again, hiring the services means you can have an experienced person maintaining your IT network who might have worked with advance technologies that can be of added advantage for your organization. Also, by hiring such services you don't have to worry about looking for a full time employee who can meet your requirements and deliver satisfactory services.

There are different types of network administration services. Some are designed to only the entry-level jobs, while others are to perform the most complicated tasks. But, each type of service has its own importance and the organizations with multiple computers in network require such services for a smoother working environment. Seattle network administration services are crucial to maintain servers and computers in network with a wide range of services such as maintenance of server, router and computer security, connectivity, network design, etc.

Computer Support

Computer related technical problems are very common. But when a problem occurs in a business organization where computers are the important aspect of business, it can cause a lot of trouble to the entire firm. As increasing number of business organizations are introducing IT environment to their businesses, computer support systems are becoming more essential services for the organizations. From smaller requirements like regular maintenance of the computers to various major problem like system crash and virus attacks, every time u need a professional for proper running of computers and smooth functioning of the entire organization. Seattle computer support services are one of the feasible solutions for the organizations that work with computer environment and need support services for their basic and specific needs.

Computer support is a kind of service that deals with various computer related problems. Some of the organizations may not feel the requirement of such services for their companies for they may be conscious of their budget. However, there are many other strong reasons that for which you should consider the need of a support system for your company.

Instant Services:
It's not difficult to understand the urgency of solving the computer related problems when your business is mostly dependent on the IT environment of your organization. If you outsource your computer support services to a Seattle computer support, you will be assured of getting quick response from them as this is their core business. Sometimes, they can provide you remote services by logging in to your network and fixing the software related problems in real time.

Reliable Services:
There are many service providers whose prime business is to provide solutions to computer related problems in bigger and smaller firms. The competition in the industry is so tough that a small mistake can cause a great loss to their business. Hence, the Seattle computer support services vie for providing the best service to their client so that they can have returning customers. With their services you will be assured of getting quick response time.

Expert Services:
You may be confused of the expertise of the technicians provided by the service provider to take care of your IT environment. But, you must remember that the core business of the Seattle computer support service provider is to assure you a better and smooth running IT environment for your business. Hence, they will try to appoint expert and qualified technicians to meet their clients' requirements and retain their clients for long.

Cost-Effective Services:
As smaller firms are more concern about their budgets, hiring Seattle computer support services can be a more affordable solution for their problems related to IT environment of their organizations. It is the best alternative to hiring a full-time technician for the company. These days, numbers of large companies also have realized that third party solution for computer support is a better option.

The Seattle computer support solutions are available in different types of service packages. The services providers offer online services or onsite services depending on the clients' need. However, it is important to carefully select the service provider and service packages for your organization.

Friday, July 2, 2010

Hard Disks

A Hard Disk Drive (HDD) is a device used by modern computers to permanently store information. The Hard Disk Drive is arguable the most essential part of a computer system in that all the information that is permanently stored is contained within its enclosure, including your computer’s Operating System (OS). Thanks to Hard Disk Drives, long gone are the days when you would have had to keep all your programs and documents stored on removable media such as Floppy Disks or CD-ROMs.

Originally invented in the mid 1950’s and made commercially available in 1956 by International Business Machines (IBM). Called RAMAC (Random Access Method of Accounting and Control), the first Hard Disk Drives contained as much as 50 platters which were 24 inches in diameter and were computers in their own right albeit with a single purpose – to store data. The entire unit which housed the hard drive was the approximate size of two large refrigerators placed side by side. In the 50 or so years since their invention, Hard Disk Drives have steadily and aggressively far out paced Moore’s law. Which stipulates that memory in computers will increase by 100% approximately every 18 months. Hard Disk Drives on the other hand have increased capacity in the same period by approximately 130%, an increase of 100% every nine months in many cases. Such capacity increases are being threatened, however. I

n the years since the first Hard Disk Drive very little has changed apart from logical steps in technology such as the increased speed or improved interfaces, the basic technology has changed very little. There have been no technological leaps, as it were, for Hard Disk Drives beyond their increased miniaturisation. Apart from miniaturisation and recording media improvements the Hard Disk Drive as a device is almost identical technologically speaking, to the very first, the RAMAC.Hard Disk Drives use a similar technology as is employed in audio and video cassettes. Such audio and video cassettes use a magnetic ribbon wound around a two wheels to store data. To access a particular portion of the data contained on the magnetic ribbon, the device must wind the tape such that the beginning of the section containing the data is underneath the device that reads the data (the magnetic read/write head). This process is called sequential data retrieval because in the process of accessing the particular data, the device must sequentially read each piece of data until the data it’s looking for is found. This process is very time consuming and contributes to wear.

Hard Disks on the other hand use a circular disk-shaped platter upon which the magnetically sensitive compound is laid. Such platters are similar in concept to a Compact Disk (CD) in that the data they hold can be accessed randomly, that the recordable media is in a circular (disk) shape, and that the data is sectioned off into tracks and sectors. Data on a Hard Disk Drive can be accessed randomly because the recordable medium of Hard Disk Drives uses these separated tracks and sectors. By separating the data in such a way, it can be positioned at random intervals of the disk, depending upon the space requirements.

Anywhere from one to seven recordable platters are contained within a modern Hard Disk Drive’s metallic enclosure. Hard Disk Drive platters are perfectly circular disks made from either an aluminium alloy or a more recently a glass ceramic substrate which is a ceramic disk suspended in a glass outer shell. Onto the surfaces of a disk’s platter is laid a thin layer of a magnetically sensitive coating called the recording medium, in modern drives the mixture is a complex amalgam of different materials such as cobalt chromium platinum boron (CoCrPtB) and other such rare metals.

How does a Hard Disk Drive store data?

All information located on a computer is expressed as a series of ones and zeros (1/0), as binary digits (bits). Taking advantage of the nature of magnetic particles, that they can be polarised to magnetic north or south and that their magnetic poles can be alternated or switched when a sufficient magnetic field of the correct polarity is applied, Hard Disk Drives can store the very same sequence of bits onto a disk by polarising the required magnetic particles on the recording medium such that they represent the data being stored. Hard Disk Drives are sectioned off such that they contain both intersecting tracks and sectors. The purpose of which is to provide a logical data structure, to provide a way to distinguish between areas of data. Within each track there are a number of sectors. It is within these sectors of the Hard Disk which data is stored.

The platter of a Hard Disk Drive is coated with a magnetically sensitive coating comprised primarily of magnetically charged particles or filings which as a whole may be called the recording medium. These particulates can be magnetically aligned such that they represent binary digits, by inducing an electromagnetic field upon them via a devices read/write head. The recording media contains many billions of microscopic particles which when viewed extremely close resemble miniature metal filings. When a Hard Disk Drive records data onto the medium it takes many hundreds (usually anywhere from 500 to 100) of these magnetically sensitive particles to store a single binary digit. The increased reduction of the amount of particles required to record data is highly limited by the precision of the read/write head (the miniature device that reads and records data onto the recording medium) because the magnetic field which is used by the drive’s read/write head to read and/or record (write) data is such that it already tentatively borders nearby data.

Should it be shrunk much further in an attempt to increase precision, the likelihood of data corruption would increase vastly. Research by various parties has been on-going to find a workable solution to recording data onto much fewer or even single particles for some time now. A hard drive may record data onto the Hard Disk Drive by applying a sufficient magnetic field to the section of the recording medium (which is suspended upon the Hard Disks platter) such that the data (a series of ones and/or zeros which correspond to the information being stored) is recorded onto the medium by aligning the specified particles to the desired magnetic pole (north or south). In doing so, any previous data which was present is therefore destroyed.

Perpendicular verses Longitudinal

Ever since the late 1980’s and early 1990’s magnetic media drive manufacturers have been researching the feasibility of switching from longitudinal to perpendicular recording techniques. The advantage is clearly one of capacity: when longitudinal magnetic particles are packed together, they take up much more space than if they were to stand upright, if they stood perpendicular to the platter. More than merely a matter of initial capacity gain, perpendicular recording technology avoids a problem which has been well known in the field for many years: the super-paramagnetic effect (SPE), which affects magnetically charged particles of such small size as that used in Hard Disk Drives. “The super-paramagnetic effect is a phenomenon observed in very fine particles, where the energy required to change the direction of the magnetic moment of a particle is comparable to the ambient thermal energy” (source: Wikipedia.org).Many theories have cropped up over the years as to what density magnetic particles (described by a disks areal density) may achieve before becoming subject to SPE. At present it is suggested that anything from 100Gbit/inch2 to 150Gbit/inch2 is the physical limitation for longitudinal Hard Disk Drives, although perpendicular media solutions have been made as high as 230Gbit/inch2.

In the layering of the magnetic particulates atop a magnetic suspension layer and orienting the particles perpendicular to the platter, the recording medium can pack many more magnetically sensitive particles together in the same space than previously possible whilst keeping SPE at bay. Perpendicular recording technology does not however preclude SPE from limiting capacity in the future, more than anything perpendicular recording technology can been described as a way to give manufacturers breathing room to develop more permanent technological solutions such as holographic lithography or a multilayered recording medium. Traditional recording media manufacture consists of the spreading of recording material over a disk platter via a centrifugal force induced by spinning the platter whilst the recording material is placed atop its surface. The centrifugal force would spread the recording material across the surface, evenly spreading it in all directions. Perpendicular recording media manufacture on the other hand requires a much different technique.

The exact manufacturing process of perpendicular recording media is unsurprisingly a closely guarded secret, especially considering its recent arrival on the marketplace. From patents filed at the United States Patent and Trademark Office (USPTO), it can be taken that the predominant technique involves the laminating of magnetic and non-magnetically charged metals such as chromium, cobalt, platinum and alloys of similar; sandwiching unique layers to affect the desired result – a recording medium such that the magnetic particles are aligned perpendicular to the platter. In US patent number 6387483, filed by the NEC Corporation of Tokyo; it describes the technique as follows:The perpendicular magnetic recording medium of the embodiment is formed by laminating a Cr film, a soft magnetic under layer film, and a perpendicular magnetizing film on a substrate in this order. (Source: USPTO no. 6387483)

In longitudinal media manufacture too, laminating multiple supportive metals is achieved; in perpendicular media however, the difference is the magnetizing film as described above. Whereas traditional lamination ordinarily serves only to prevent wear and noise (both electro-mechanical and audible noise), in perpendicular media manufacture it would appear that at least some of the lamination process is used to magnetize the magnetic media particles to a perpendicular orientation. Precisely how the reorientation of magnetic media particulate is accomplished is not easy to determine, most probably because the technology is so new that such details are sketchy at best and obscure or guarded at worst. This fact is not at all surprising concerning a new technology such as perpendicular magnetic media development.

The future of storage technology

Perpendicular magnetic media technology as discussed earlier is merely a temporary solution, to find more permanent solutions we must look to much more advanced technologies. One such technology is patterned magnetic media. The process of patterned magnetic media aims to make singular magnetic particulates the object of recording bits, you will remember that current technologies requires approximately 500 to 1000 magnetic particles to store a single bit. The object of patterned media is to cut this dramatically down to a single particle per bit. Advantages of such a technology are such as reduced statistical noise associated with granular media and more increased areal density (as much as 64Gbit/inch2).

Patterned magnetic media aims to prevent the SPE barrier, or at least further decrement its effect through the use of so-called mesas and valleys. The technique uses the creation of barriers between magnetic particles, thereby avoiding the SPE complication which affects closely packed particles. Holographic Storage (a.k.a. Holographic Lithography) too is a technology that aims to increase storage capacity which is also under heavy research, and claims to be a much more permanent solution. Unlike Patterned Magnetic Media, Holographic Storage is a revolutionary step away from magnetic media and previous optoelectronic technologies.

Hard Disk Drives will always be subject to inertia and centrifugal force induced by the moving parts of the drives mechanical components (platter, read/write head), Holographic Storage has no such issues; the holographic process uses lasers in replacement of the read/write head of a Hard Disk Drive and the media itself requires no momentum (unlike the platters in Hard Disk Drives).

Such holographic storage is far from realisation, in fact it is postulated by some that it may be as much as ten years before the technology can be made into a workable solution. In direct symmetry to early memory research, research on Holographic Storage technologies seems to have banded into two camps: one of super fast data retrieval and extraordinarily high capacity storage; no doubt there will be extremely profitable markets for both.