General Disclaimer One Or More of the Following Statements May Affect

Total Page:16

File Type:pdf, Size:1020Kb

General Disclaimer One Or More of the Following Statements May Affect General Disclaimer One or more of the Following Statements may affect this Document This document has been reproduced from the best copy furnished by the organizational source. It is being released in the interest of making available as much information as possible. This document may contain data, which exceeds the sheet parameters. It was furnished in this condition by the organizational source and is the best copy available. This document may contain tone-on-tone or color graphs, charts and/or pictures, which have been reproduced in black and white. This document is paginated as submitted by the original source. Portions of this document are not fully legible due to the historical nature of some of the material. However, it is the best reproduction available from the original submission. Produced by the NASA Center for Aerospace Information (CASI) NASA CR 145a91 ^[vAS.^^CR-1^5t)5'i) Z#^'U^Sa.Er^^^[3N OF F^^sLD .^ H7'7w^-3337 ^I^DUGLD Tk^APPS#aG Gl^ k'IGt^TIhG i^i^^'^S (^^xa5 xnst,^umQnts, Inc.} 8G A fiC t^QS/^#^ &Q7 . CSCT, 09C Unclas ' G3/33 ^82^#3 [NVEST[GATIQN OF F[I=I~D [NDUGED T[^APPLNG DN FLOATING GATI~S By W. Milian Gosney, Frincipal In^estigatar Walter T. Matzen and Gary E. Nelsan '. Prepared under Contract No. NAS1-1361.0 Uy TEXAa INSTRUMENTS INCORPORATED l'. O. Bax 5Al2 Dallas, Texas 75222 ^^Q ^ ^^^ ^ ^ ^. 9j 7 for ^^ ^^^ 197 ^^^, o ^ ^^^^ ^} ^ ^ ^^ ^u^ ^ f r, H^^ gRA^CH g^c ; ^^ s^^^^^^Zt^^^6^'^^^^ National Aeronautics and Space Administration Langley Research Center Ham.pto^^, Virginia 23665 ... W ^_ ,_._ _ _^ ._ _ e -. .. ,- _ ,_ ! _ ! t II11 1^ ^^ ^ 1 i ^ ^^ t f^ 1^ ^^ TABLE OF CONTENTS ^^ }^1t Section Title ^ Page 1 ^ —i ^ I. INTRODUCTION I I II, FIRST EXPEA.iiviENTAL SERIES 3 A. DIFMG^ Development 3 III. SECOND EXPERIMENTAL SERIES : 7 A. DIFMOS Development 7 B. Bootstrapping . 18 IV, THIRD EXPERIMENTAL SERIES . 23 A, Description of Task . , 23 B. Ian Irnplanted Injector Junction . 24 C, Electron Injector Insulator Variations , , , 26 I D. Hole Injector Insulator Variations 27 V. FOURTH EXPERIMENTAL SERIES . 33 _, VI. FIFTH EXPERIMENTAL SERIES : 43 I A. Theoretical Study of Previous Devices . 43 B. Avalanche Injector Analysis 44 1. Consideration of Physical Reality of Avala^iching Holes =j , and Injecting Positive Charges . 49 C. Figure of Merit , . - . 52 ^ >' D. Design Ruie Changes 54 =f E, Device Designs . 55 ^. F. Processing 61 1, G. Testing 61 ^t 1. Data Write, Erase, and Read Speed and Power 65 2, Data Storage Without Applied Power 69 ;:.; 3. Data Degradation Due to Read Cycles 70 4. Device Degradation Due to V4'rite^Erase Cycling 71 VII, CONCLUSION AND SUMMARY . 73 - VIII. References 75 ^t ,. iii . ^ . ,, r..._ ^ , . .... _„ _.._ ' _ 1-- LIST OF ILLUSTRATIONS Figure Title Page ^,i" ^^f ; l J 1. Dual Avalanche Injection Nonvolatile Semiconductor Memory Device Featuring Low-Voltage Hole and Electron Avalanche Injection to a Floating Gate 5 ! } 2. Isometric Drawing of a Cross Section Sltawing Details of the i3 -' ° Hale and EIectron Injection Regions . 6 ^^ ^' ^^ 3. Test Structures 1-4 (Sheet 1 of 3} 8 -- Test Structures 5-$ (Sheet 2 of 3) 9 ^^,^ Test Structures 4-10 (Sheet 3 of 3) 10 '^ ^r 4. Final Floating Gate Voltage as a Function of Avalanche Voltage for p^Jn+ Electron Injectors. Avalanche pulse was 500 uA at 100 ms I2 S. Avalanche Injection Experiments on Structure DIFIS (NASA Structure 4a} 13 ^^ `"' - b. Comparison of 22 and 13 BV CMOS Slices—Fixed Gate Bias Hole ,:.!^ ':. Injection Experiments . 14 ^ " 7. Floating Gate Discharge Experiments, 13 BV CMOS, Pulsed f Negative Avalanche . 16 t '^ : , 8. CMOS Test Bar Bonded for Avalanche Experiments l7 r. ^' " 9, Bonding Dia ^'am for the CMOS 13ootstrap Ca1? acitor Ex I?eriments . 19 '< 10. Schematic Diagram and Physical Structure of the Bootstrap CMOS Test Device 20 11. Measurement of the WriteJErase Window as a Function of the Bootstrap Bias Voltage Using Discrete CMOS Test Structures . 2I _ 12. Avalanche Breakdown in DIFMOS Structures . 2S 13. Circuit for M^:asuring Electron Injection Current 27 . 14, Eiectran Injection Gate Current versus Time far Various Oxide Conditions 28 lS. Circuits for Evaluating "Write" and "Erase" Injectors 30 lb. DIFMOS Memory Cell Design — Dua113its with LeftJRight Select Cb Sized far 90%Coupling . 34 17. DIFMOS Memory Cell Designs — 0.50 C b (left}, 0.25 C h (right) . 34 :" 18, Example of Charge Retention an Floating Gate Array 37 E 19. Degradation of WJE Envelope versusNumber of WJE Cycles 37 ,, 20, Lag Plot of Degradation of WJE Envelope versus Number of WJE Cycles 38 ^^ti^ '^ °^^IG PACE BLAND£ NO^F 1"°is . , -4, I v F_ __ ,.._.. LIST OF ILLUSTRATI4N5 (cas^tinuedj Figure Title Page 21. Comparison of WEE Characteristics of Full, One-Half, and One-Quarter-Sized DIF1viOS Cells 39 22, Goanparison of WEE Characteristics of Fuil-Sized DIFMOS CeIis versus. Pulse Widths . 40 23. Recovery of WfE Window Following Storage at 125°C : : 4I l 24: .Schematic Representation of DIFMOS Nonvolatile Memory Cell 4S 25. Energy Band Diagram for Electron Injection Showing Perturbation of the Barrier Height by the Insulator Field {Schottky lowering} 48 26, Avalanche Injection of Holes and Electrons into SiO^ Fixed Gate Bias : : SO 27. Energy Band Diagram Showing Mechanism of Hot Hole.Injection Whereby ' Empty States are Created Deep in the Valence Band During the Avalanche: Filling these states by electrons from the SiO^ Constitutes hole injection.. .. .. .: , 51 28. Fifth Experimental Series -- STAGG ` 56 29. Fifth Experimental Series — AGGNP S7 30. Fifth Experimental Series — NOCON S9 31. Fifth Experimental Series --- NOCON 60 32. Fifth Experimental Series = CNSGT 62 33. Fifth Experimental Series — AGSGT 63 34. Time Dependence of Floating Gate Voltage During Avalanche of the pin} Electron Injector G6 35. Time Dependence of Floating Gate Voltage During Avalanche of a p^/nom Hole Injector Junction I A = — 500 ^cA at — 14.9 volts 67 36. Time Dependence of Floating Gate Voltage During Writing and l;rasing . 68 37. Temperature Dependence of Charge Storage , . 70 38. Envelope of On/Off Window versus Number of Cycles 71 vi. ^f i LIST OF TABLES Table Title !'age ^:" i I.: Processing Sequence: Ten Structure Designs I 1 II. Structure 10 junction Spacings ^(nm) (p-and n-Channel Devices) . 11 III. Experimental Process ^Iariations . 2^ ^ . IV. Characteristics c (Electron Injectors for Various Oxides . 2G I V. Device Characteristics for Various Hole-Injector Dielectrsc Filrns 31 ^ ` VL: Average Peak Electric Fields in Device Tnsulatnrs During Read (Sense), Write and Erase Cycles . 46 VII. DIFMOS Process Sequence 64 VIII. DIFMOS Process Comparison (Metal-Gate PMOS Pasis) 64 .^ ^^ fl ^^ ^' h. }^. _ .. .. ^.. _ - - 1 4 .. i ^ `... t Uil ;.. I^^:^^^:^^^ING . PAGli i3LAN^ NUT Iri^A^»:^>w^^ SUMMARY In a series of five experimental design iterations, an electrically-alterable read-only 1 memory (EAROM} ar repro^rammabie xead-only memory (R^ROM} technology has been developed which can be fabricated using asingle-level, metal-gate p-channel MOS process with all conventional manufacturing steps. Given the acronym DIFMOS for , Dual Injector, Floating gate MOS, this technology utilizes the floating-gate technique for nonvolatile storage of data. Avalanche injection of hat electrons through gate oxide from a special injector diode in each bit is used to charge the floating gates. From 30% to ^0% of the electron injector avalanche voltage can be attained by the floating gate in about 50 ms far S00 µA avalanche currents. Once charged, the floating gates will stay charged almost indefinitely. Measurements of charge decay from the floating gates indicate a log time dependence of the lass of approximately 0.06% per decade of time. Thus, over 90% of the original charge will remain after 100 years at roam temperature. A second injector structure included in each bit permits discharge of the floating gate by avalanche injection of holes through gate oxide. A special bootstrap capacitor must be operated with the hole injector to provide electric fields favorable for Bole injection. Like the charging operation, the discharge operation is accomplished within 50 ms using S00 uA avalanche currents. The size of the bootstrap capacitor and its associated voltage must be sufficient to provide at least a 1 S molt change on the floating gate to assure complete discharge. Thus, the overall design of the DIFMOS bit is dictated by the physical considerations rec}uired for each of the avalanche injector types. The presence of electron and hole traps in the injector oxides causes a slow build-up of charge in the injector oxides as the injectors are operated, resulting in a decreasing efficiency of injection. This means that DIFMOS bits can only be charged and discharged a finite number of times—at present, the limit is about 10 `f cycles. $ut this limitation is sufficiently large to permit application of the DIFMOS technology to electrically alterable, read-mostly memories. Since it is basically a PMOS plus three diffusion technology, and since its cell size is in the 0 to 16 nm2 to 16 nmZ size range, circuits of 1 K to 2K bits should be economically feasible. The ease with which DiFMOS can be used in system designs makes it attractive for many applications such as calculator and microprocessor program storage. Standard processing, electrically erasable by rvw or by bit, fully decodable without substrate isolation, unlimited reading capability; and a variety of possible organizations tend to offset the programming limitations. Additional reductions in cell size and improvements in device performance and circuit density will be realized as the floating gate, avalanche-injected, nonvolatile semiconductor memories continue to evolve. ix ^-;^I'I?flDU^^^IL.I'i'^c^ GF T::^; ; INVESTIGATION OF FIELD INDUCED TRAPPING ON FLOATING GATES W.
Recommended publications
  • (12) United States Patent (10) Patent No.: US 9,460,782 B2 Seol Et Al
    USOO946O782B2 (12) United States Patent (10) Patent No.: US 9,460,782 B2 Seol et al. (45) Date of Patent: Oct. 4, 2016 (54) METHOD OF OPERATING MEMORY (56) References Cited CONTROLLER AND DEVICES INCLUDING MEMORY CONTROLLER U.S. PATENT DOCUMENTS 8,050,086 B2 11/2011 Shalvi et al. (71) Applicant: SAMSUNGELECTRONICS CO., 8,085,605 B2 12/2011 Yang et al. LTD., Suwon-si, Gyeonggi-do (KR) 2005.0089121 A1* 4/2005 Tsai ...................... HO3M13/41 375,341 (72) Inventors: Chang Kyu Seol, Osan-si (KR); Jun 2011 0145487 A1 6/2011 Haratsch et al. Jin Kong, Yongin-si (KR); Hong Rak 2011 (0289.376 A1 1 1/2011 Maccarrone et al. 2012,0005409 A1 1/2012 Yang Son, Anyang-Si (KR) 2012/0066436 A1 3/2012 Yang (73) Assignee: Samsung Electronics Co., Ltd., Suwon-si, Gyeonggi-do (KR) FOREIGN PATENT DOCUMENTS JP 2011504276 A 2, 2011 (*) Notice: Subject to any disclaimer, the term of this KR 2011.0128852. A 11/2011 patent is extended or adjusted under 35 KR 2012O061214 A 6, 2012 U.S.C. 154(b) by 274 days. * cited by examiner (21) Appl. No.: 14/205,496 Primary Examiner — Idriss N Alrobaye (22) Filed: Mar. 12, 2014 Assistant Examiner — Dayton Lewis-Taylor (65) Prior Publication Data (74) Attorney, Agent, or Firm — Volentine & Whitt, US 2014/0281293 A1 Sep. 18, 2014 PLLC (30) Foreign Application Priority Data (57) ABSTRACT Mar. 15, 2013 (KR) ........................ 10-2013-0O28O21 A method of operating a memory controller includes receiv ing a first data sequence and generating a coset representa (51) Int.
    [Show full text]
  • PERSES: Data Layout for Low Impact Failures
    PERSES:DataLayoutforLowImpact Failures Technical Report UCSC-SSRC-12-06 September 2012 A. Wildani E. L. Miller [email protected] [email protected] I. F. Adams D. D. E. Long [email protected] [email protected] Storage Systems Research Center Baskin School of Engineering University of California, Santa Cruz Santa Cruz, CA 95064 http://www.ssrc.ucsc.edu/ PERSES: Data Layout for Low Impact Failures Abstract If a failed disk contains data for multiple working sets or projects, all of those projects could stall until the rebuild Disk failures remain common, and the speed of recon- is completed. If the failure occurs in a working set that struction has not kept up with the increasing size of disks. is not actively being accessed, it could potentially have Thus, as drives become larger, systems are spending an zero productivity cost to the system users: the proverbial increasing amount of time with one or more failed drives, tree fallen in a forest. potentially resulting in lower performance. However, if To leverage this working set locality, we introduce an application does not use data on the failed drives, PERSES,adataallocationmodeldesignedtodecrease the failure has negligible direct impact on that applica- the impact of device failures on the productivity and per- tion and its users. We formalize this observation with ceived availability of a storage system. PERSES is named PERSES,adataallocationschemetoreducetheperfor- for the titan of cleansing destruction in Greek mythology. mance impact of reconstruction after disk failure. We name our system P ERSES because it focuses destruc- PERSES reduces the length of degradation from the tion in a storage system to a small number of users so reference frame of the user by clustering data on disks that others may thrive.
    [Show full text]
  • MVME8100/MVME8105/MVME8110 Installation and Use P/N: 6806800P25O September 2019
    MVME8100/MVME8105/MVME8110 Installation and Use P/N: 6806800P25O September 2019 © 2019 SMART™ Embedded Computing, Inc. All Rights Reserved. Trademarks The stylized "S" and "SMART" is a registered trademark of SMART Modular Technologies, Inc. and “SMART Embedded Computing” and the SMART Embedded Computing logo are trademarks of SMART Modular Technologies, Inc. All other names and logos referred to are trade names, trademarks, or registered trademarks of their respective owners. These materials are provided by SMART Embedded Computing as a service to its customers and may be used for informational purposes only. Disclaimer* SMART Embedded Computing (SMART EC) assumes no responsibility for errors or omissions in these materials. These materials are provided "AS IS" without warranty of any kind, either expressed or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SMART EC further does not warrant the accuracy or completeness of the information, text, graphics, links or other items contained within these materials. SMART EC shall not be liable for any special, indirect, incidental, or consequential damages, including without limitation, lost revenues or lost profits, which may result from the use of these materials. SMART EC may make changes to these materials, or to the products described therein, at any time without notice. SMART EC makes no commitment to update the information contained within these materials. Electronic versions of this material may be read online, downloaded for personal use, or referenced in another document as a URL to a SMART EC website. The text itself may not be published commercially in print or electronic form, edited, translated, or otherwise altered without the permission of SMART EC.
    [Show full text]
  • NEC LXFS Brochure
    High Performance Computing NEC LxFS Storage Appliance NEC LxFS-z Storage Appliance NEC LxFS-z Storage Appliance In scientific computing the efficient delivery of data to and from the compute nodes is critical and often chal- lenging to execute. Scientific computing nowadays generates and consumes data in high performance comput- ing or Big Data systems at such speed that turns the storage components into a major bottleneck for scientific computing. Getting maximum performance for applications and data requires a high performance scalable storage solution. Designed specifically for high performance computing, the open source Lustre parallel file system is one of the most powerful and scalable data storage systems currently available. However, the man- aging and monitoring of a complex storage system based on various hardware and software components will add to the burden on storage administrators and researchers. NEC LxFS-z Storage Appliance based on open source Lustre customized by NEC can deliver on the performance and storage capacity needs without adding complexity to the management and monitoring of the system. NEC LxFS-z Storage Appliance is a true software defined storage platform based on open source software. NEC LxFS-z Storage Appliance relies on two pillars: Lustre delivering data to the frontend compute nodes and ZFS being used as filesystem for the backend, all running on reliable NEC hardware. As scientific computing is moving from simulation-driven to data-centric computing data integrity and protec- tion is becoming a major requirement for storage systems. Highest possible data integrity can be achieved by combining the RAID and caching mechanisms of ZFS with the features of Lustre.
    [Show full text]
  • Techniques for Reducing Communication Bottlenecks in Large-Scale Parallel Systems
    1 Approximate Communication: Techniques for Reducing Communication Bottlenecks in Large-Scale Parallel Systems FILIPE BETZEL, KAREN KHATAMIFARD, HARINI SURESH, DAVID J. LILJA, JOHN SARTORI, and ULYA KARPUZCU, University of Minnesota Approximate computing has gained research attention recently as a way to increase energy efficiency and/or performance by exploiting some applications’ intrinsic error resiliency. However, little attention has been given to its potential for tackling the communication bottleneck that remains one of the looming challenges to be tackled for efficient parallelism. This article explores the potential benefits of approximate computing for communication reduction by surveying three promising techniques for approximate communication: com- pression, relaxed synchronization, and value prediction. The techniques are compared based on an evaluation framework composed of communication cost reduction, performance, energy reduction, applicability, over- heads, and output degradation. Comparison results demonstrate that lossy link compression and approximate value prediction show great promise for reducing the communication bottleneck in bandwidth-constrained applications. Meanwhile, relaxed synchronization is found to provide large speedups for select error-tolerant applications, but suffers from limited general applicability and unreliable output degradation guarantees. Finally, this article concludes with several suggestions for future research on approximate communication techniques. CCS Concepts: • Computer systems
    [Show full text]
  • Non-Volatile Flash Memory Characteristics Implementing High-K Blocking Layer
    NON-VOLATILE FLASH MEMORY CHARACTERISTICS IMPLEMENTING HIGH-K BLOCKING LAYER SEUM BIN RAHMAN UNIVERSITI TEKNOLOGI MALAYSIA Replace this page with form PSZ 19:16 (Pind. 1/07), which can be obtained from SPS or your faculty. Replace this page with the Cooperation Declaration form, which can be obtained from SPS or your faculty. This page is OPTIONAL when your research is done in collaboration with other institutions that requires their consent to publish the finding in this document.] NON-VOLATILE FLASH MEMORY CHARACTERISTICS IMPLEMENTING HIGH-K BLOCKING LAYER SEUM BIN RAHMAN A thesis submitted in fulfilment of the requirements for the award of the degree of Master’s In Electrical Engineering Faculty of Electrical Engineering Universiti Teknologi Malaysia JUNE 2018 iii This work is dedicated to my respected parents and UTM authority for having faith on me. iv ACKNOWLEDGEMENT I want to thank DR. NURUL EZAILA BINTI ALIAS for her great guidance of the project. I also thank all my examiners for asking creative questions that helped improving the report. Besides, my gratitude goes to my fellow research group members, specially Muhammad Afiq Nuruddin and Farah Aqilah for their kind and patient support. v ABSTRACT An Erasable Programmable Read Only Memory (EPROM) is a special kind of memory chip, that can retain the memory even when the power is turned off. This type of memory is known as non-volatile memory (NWM) cell. An EPROM, as a non-volatile memory is widely accepted for its excellent reliability and data storage capability for a large scale of time without noticeable data degradation.
    [Show full text]
  • Data Degradation
    Data degradation Data degradation is the gradual corruption of computer data due to an accumulation of non-critical failures in a data storage device. The phenomenon is also known as data decay, data rot or bit rot. Contents Visual example In RAM In storage Component and system failures See also References Visual example Below are several digital images illustrating data degradation. All images consist of 326,272 bits. The original photo is displayed on the left. In the next image to the right, a single bit was changed from 0 to 1. In the next two images, two and three bits were flipped. On Linux systems, the binary difference between files can be revealed using 'cmp' command (e.g. 'cmp -b bitrot-original.jpg bitrot-1bit-changed.jpg'). 0 bits flipped 1 bit flipped 2 bits flipped 3 bits flipped In RAM Data degradation in dynamic random-access memory (DRAM) can occur when the electric charge of a bit in DRAM disperses, possibly altering program code or stored data. DRAM may be altered by cosmic rays or other high-energy particles. Such data degradation is known as a soft error.[1] ECC memory can be used to mitigate this type of data degradation. In storage Data degradation results from the gradual decay of storage media over the course of years or longer. Causes vary by medium: Solid-state media, such as EPROMs, flash memory and other solid-state drives, store data using electrical charges, which can slowly leak away due to imperfect insulation. The chip itself is not affected by this, so reprogramming it once per decade or so prevents decay.
    [Show full text]
  • Your Internet Data Is Rotting Paul Royster University of Nebraska-Lincoln, [email protected]
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Faculty Publications, UNL Libraries Libraries at University of Nebraska-Lincoln 5-15-2019 Your internet data is rotting Paul Royster University of Nebraska-Lincoln, [email protected] Follow this and additional works at: https://digitalcommons.unl.edu/libraryscience Part of the Archival Science Commons, Computer and Systems Architecture Commons, Data Storage Systems Commons, Digital Communications and Networking Commons, Scholarly Communication Commons, and the Scholarly Publishing Commons Royster, Paul, "Your internet data is rotting" (2019). Faculty Publications, UNL Libraries. 376. https://digitalcommons.unl.edu/libraryscience/376 This Article is brought to you for free and open access by the Libraries at University of Nebraska-Lincoln at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Faculty Publications, UNL Libraries by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Your internet data is rotting The Conversation May 15, 2019, 6.47am EDT The internet is growing, but old information continues to disappear daily. Paul Royster, Coordinator of Scholarly Communications, University of Nebraska-Lincoln Disclosure statement: Paul Royster does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no rel- evant affiliations beyond their academic appointment. Partners: University of Nebraska-Lincoln provides funding as a member of The Conversation US. Many MySpace users were dismayed to discover earlier this year that the so- cial media platform lost 50 million files uploaded between 2003 and 2015. The failure of MySpace to care for and preserve its users’ content should serve as a reminder that relying on free third-party services can be risky.
    [Show full text]
  • Meeting the Storage Challenge of Exponential Data Growth in Genomics
    SOLUTION BRIEF Meeting the Storage Challenge of Exponential Data Growth in Genomics Highlights The life sciences and healthcare industries are in the midst of a dramatic transformation that will make personalized medicine common-place. Completing the sequencing of the • Budget Constraints. Need affordable high- first human genome in 2003 was a key breakthrough that took more than 10 years and cost density system to implement an enterprise-class over US$3 billion. Since then, the speed at which genomes can be sequenced has more than storage cloud doubled, easily outpacing Moore’s Law. Today’s high-throughput sequencing machines can • Collaboration. Enable research partners across process the human genome in a matter of hours at a cost approaching US$1 thousand. These the country or around the world to share data advancements have allowed researchers to run more sequencing tests in less time, greatly regardless of device platform increasing the pace of scientific discovery. Clinicians, too, have begun leveraging genome • Scalability/Serviceability. Deliver non-disruptive sequencing to more effectively treat patients with medications tailored to the patient’s unique capacity and performance scaling, data repairs genetic makeup. The result has been an explosion in genomic data, and organizations are now and upgrades looking for ways to affordably store and manage this avalanche of data. • Availability Requirements. Ensure easy access Traditional Archival Systems Have Limitations to data regardless of where it is stored, how old it is or even if a data center goes offline Archival systems are often comprised of complex disk and magnetic tape storage subsystems • Complexity Sprawl. Simplify overall deployment organized into performance tiers.
    [Show full text]
  • Silent Corruption: Bit Rot and Its Impact on Digital Archives
    Ashley Aberg MLIS Candidate ‘21 Silent Corruption: Bit Rot and Its Impact on Simmons University Digital Archives WHAT IS BIT ROT? THREE MITIGATION OPTIONS Preservica services are the highest cost option, but provide the most personal service in creating unique systems. Since 2018 they have offered their “low cost option,” a cloud system that can be implemented for only $3,000 a year.¹ That service, however, may be inadequate for some institutions. ReFS (Resilient File System) is a Microsoft owned self healing file system. ReFS was developed for use with Windows 10 and can handle both large file sizes and large numbers of files.² This system is easy to use and intuitive to regular Windows users, with many guides available online to help get the most out of ReFS. This is a cost effective option for 0 bits flipped 1 bit flipped 2 bits flipped “Bitrot in JPEG files” Jim Salter, Data Degradation, CC BY-SA 4.0 institutions already using Windows. Bit rot is the slow loss of digital data What does it mean to be a self healing file ZFS is a fully open source self healing file system, and thus, is a good over time. This occurs spontaneously system? It means the system in place is set option for institutions not using Windows. However, implementing this as digital files sit on a hard drive and to back up on a regular basis and check system requires a certain level of complex digital literacy that may not some bits are flipped or dropped, those backups against previous versions exist in-house at a given institution.³ Guides are available on the internet, compromising the readability of the that are known to be whole.
    [Show full text]
  • ERM- Glossary
    Electronic Records Management Guidelines GLOSSARY Application: A piece of software that performs Backup: A copy of all or portions of software or a function; a computer program. data files on a system kept on storage media, Architecture: The design and specifications of such as tape or disk, or on a separate system so hardware, software, or a combination of that the files can be restored if the original data thereof, especially how those components are deleted or damaged. In information interact. An enterprise-wide architecture is a technology, archive is commonly used as a logically consistent set of principles that guide synonym for backup. the design and development of an Backward-compatible: The ability of a organization’s information systems and software program or piece of hardware to read technology infrastructure. files in previous versions of the software or Archive: To transfer records from the hardware. individual or office of creation to a repository Bit rot: Also known as data degradation, it is authorized to appraise, preserve, and provide the gradual corruption of computer data due to access to those records. Computing — Data an accumulation of non-critical failures in a stored offline and retained for recordkeeping data storage device. Overtime, the bits and purposes; also — A backup that supports bytes (the 1s and 0s) of computer data will restoration of the entire system after a disaster. reverse until the data is no longer Archives: The division within an organization readable. This is another reason digital files responsible for maintaining the organization’s must be migrated and converted at least every records of enduring value; can also refer to 10 years.
    [Show full text]
  • Experienced Miras Anomalies and Mission Impact
    FOS team, 14/02/13 EXPERIENCED MIRAS ANOMALIES AND MISSION IMPACT This note describes briefly the anomalies experienced so far by MIRAS In Flight, and aims to describe the impact they may have both over the data production (i.e. data gaps) and on the possible degradation of the data itself. It is intended for the Data Users to understand references to anomalies in the weekly reports. For further information on the anomalies, please consult the MoM of the Anomaly Review Boards regularly held. CMN UNLOCK WITH WRONG RELOCKING. 2 CMN UNLOCK WITH PROPER RELOCKING 3 FALSE TEMPERATURE ACQUISITIONS BY CMN-6 (B1) 4 MASS MEMORY PARTITION LATCHUP 5 AUTONOMOUS CCU RESETS 6 PLATFORM MANOEUVRES 7 MASS MEMORY DATA GAPS 8 MASS MEMORY DOUBLE BIT ERRORS 9 1 FOS team, 14/02/13 CMN Unlock with wrong relocking. Description This anomaly was impacting shortly after launch the A2 CMN of the redundant Arm, known before launch to be a lazy one. It consisted in the CMN local oscillator moving away from the common frequency, and not regaining after the event a common frequency to the rest of the instrument CMN’s. It has not been seen since January 2010, once the arm was moved to the nominal branch. Geolocation The anomaly tends to occur at high or low latitudes, or over the South Atlantic Anomaly. Likelihood Before arm swap to nominal, on the 11th of January 2010, the event happened 5 times in 40 days, thus making it quite likely. It has not been seen again in any other CMN.
    [Show full text]