ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

After the Apocalypse, Data Stored On this Crystal Will Be the Legacy of Human Civilization

b2ap3_thumbnail_data_storage_with_light_400.jpgData systems are always looking to improve the way that data is stored. The efficiency of your data storage systems is a crucial part of managing your data infrastructure, and there’s a constant search for ways to improve the way that it’s done. Scientists are now turning to the field of optoelectronics to develop new ways to store incredible amounts of data, for enormous amounts of time.

Defining Optoelectronics
The easiest way to describe optoelectronics is as a sub-field of photonics, which is the study of electronic devices that can detect and control light. One practical use of this technology is the use of fiber optics that are used to make data transmission more efficient. This medium of data transfer has been studied for the past century, and this devotion has introduced new technology that’s changing the way that data is stored in the digital age.

Cables that utilize fiber-optic technology are used every day to transfer a petabit of data per second. In other words, a cable that’s made up of thousands of fiber-optic wires can potentially transfer up to several terabytes every second. You don’t need us to tell you that this is a ton of data and that fiber-optic technology is a valuable asset. Still, scientists are using this modern-day technology to push toward greater ways to utilize optoelectronics, like storing data. In theory, this technology can be used to store data for an immense amount of time, as long as it’s done in a planned and structured interface.

“Superman Memory Crystal”
Scientists are attempting to use what’s called the Superman Memory Crystal as the aforementioned interface. Forget 3D printing and movie theater experiences; this memory crystal is as impressive as data-storage technology gets:

  • It’s a five-dimensional storage device of nanostructured glass that can store up to 360 terabytes of data.
  • Data can be retained for an extraordinarily long time and withstand temperatures of up to 1,000º C.
  • It’s projected that the memory crystal is capable of storing data at room temperature for as long as 14 billion years.
  • Data is recorded on synthetic material by using lasers that use short, intense pulses of light, and is written on three layers of nanostructured dots that are separated by fine micrometers, or rather, a millionth of a meter.

The technology is incredibly precise, but extremely redundant. As such, it’s expected that some of the most valuable works throughout history are now stored on these glass discs, including the Magna Carta, the King James Bible, Isaac Newton’s Opticks, and the Universal Declaration of Human Rights (UDHR). The UDHR was actually written and presented to UNESCO by the University of Southampton’s Optoelectronics Research Centre (ORC) at the closing ceremonies of their International Year of Light event in Mexico.

Data storage and retrieval has grown so advanced that we can now fit the breadth of human knowledge on small, long-lasting devices, which is great for both recording history and the tech industry as a whole. However, consumers also benefit from these advances, as every improvement to data storage and retention can present interesting new options for your organization.

To learn more about data storage and how these changes will reflect on your business model, give us a call at 866-326-7214. One of our IT professionals can help to ensure that your data’s future is as bright as possible.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Mobile Devices Network Data Recovery Managed IT Services Communication Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Business Continuity Windows 10 Facebook Disaster Recovery Covid-19 Passwords Holiday Apps IT Support Browser Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Artificial Intelligence Managed IT services Workplace Strategy Networking Windows Gadgets Mobile Device Management Spam Business Technology Blockchain Bandwidth Server Remote Encryption Information WiFi App Virtualization Office 365 History Apple Information Technology Employee/Employer Relationship Gmail Budget Office Two-factor Authentication Health Conferencing Analytics Cybercrime Access Control Data Security Wi-Fi Big Data BDR Employer-Employee Relationship IT Management Cost Management Hacker Training Remote Computing Document Management Compliance Patch Management Save Money Vendor Help Desk Remote Monitoring Hacking Voice over Internet Protocol Computing Search... Vendor Management Best Practice Hard Drive Managed Services Retail Money Data loss Alert Customer Service Unified Threat Management Hiring/Firing Legal Firewall Outlook Data storage Augmented Reality Password Word IBM Website Applications Project Management Vulnerabilities BYOD Mobile Office Mobility Meetings Laptop Windows 7 Free Resource Storage Google Maps How To Scam Twitter Law Enforcement Social Sports SaaS End of Support DDoS VPN User Printer Update iPhone Education Cortana Content Filtering Chrome Data Breach Travel Paperless Office Virtual Reality Antivirus Social Engineering Cryptocurrency Router Windows 11 Maintenance Black Market Mobile Computing Cleaning The Internet of Things YouTube Robot Monitoring Marketing Healthcare Remote Workers Running Cable Websites Co-Managed IT Solid State Drive Managed Services Provider Wireless Technology Vulnerability Saving Time Entertainment eWaste Software as a Service Virtual Private Network Data Protection Computers Bitcoin Drones Chromebook Downtime Current Events Safety Telephone Automobile Solutions Virtual Desktop Excel How To Experience Images 101 Microchip Integration Flexibility Display HIPAA Tech Terms Managed IT Digital Employees Virtual Assistant Hack Identity Theft Disaster Avoiding Downtime Notifications Unified Communications Taxes Holidays Google Docs Lithium-ion battery Bluetooth Distributed Denial of Service Cooperation Processor Office Tips Video Conferencing Private Cloud Memory Processors PowerPoint Administration Physical Security Virtual Machines Computer Repair Presentation Specifications Professional Services Politics IT Consultant Multi-factor Authentication Machine Learning Settings Start Menu Downloads Computer Care Customer Relationship Management Uninterrupted Power Supply Wireless Headphones Financial Data Webcam Microsoft Excel Keyboard Tech Hosted Solution Hard Drives Business Mangement Going Green Computer Accessories Risk Management Business Cards IT Business Metrics Scams Books Error intranet Google Apps Tablets Telework Language Wireless Bookmark Society Shortcut Google Calendar Term Heating/Cooling Download Environment Smartwatch Supercomputer Piracy Communitications Microsoft 365 Cables Reading Windows XP Monitors Virus Visible Light Communication Social Networking HTML Procurement Nanotechnology FinTech Motion Sickness Browsers Windows 8 Comparison Google Play Google Drive Upload CES Software License IT Assessment Point of Sale Relocation Value Displays Social Network Advertising Supply Chain Management Corporate Profile Screen Reader Organization Cyber security Work/Life Balance Shortcuts Knowledge Data Analysis Tech Support Troubleshooting Television Security Cameras Telephony Trends Employer Employee Relationship Mobile Technology Smart Devices Remote Working Customer Resource management Cabling Devices Tablet AI G Suite Tip of the week In Internet of Things Trend Micro Staffing Be Proactive Fileless Malware Transportation Mouse Network Congestion IP Address VoIP Gamification Digital Security Cameras Tracking Company Culture Electronic Health Records Hacks Reliable Computing Wasting Time Writing Telephone System Regulations Business Owner Backup and Disaster Recovery Web Server eCommerce Modem Workplace Strategies Directions SharePoint Content Videos Digital Payment Desktop Surveillance Scalability Managing Costs Electronic Medical Records Worker Accountants Competition Access Database Administrator Text Messaging Recovery SSID Proactive IT Employer/Employee Relationships Time Management Media Public Cloud Development Bring Your Own Device LiFi Virtual Machine Health IT Entrepreneur Equifax Application Inbound Marketing Spyware Tactics Reviews Hard Drive Disposal Optimization Documents Smart Technology Audit Music Teamwork Username Business Intelligence 2FA File Sharing Data Storage Freedom of Information Hypervisor Redundancy Startup Cache Addiction Shopping email scam Botnet Securty Medical IT Navigation Rental Service SQL Server Micrsooft Domains Electronic Payment Unified Threat Management Paperless Workers Mobile Security PCI DSS News Licensing Flash User Tip Legislation Business Growth Network Management Gig Economy CCTV Humor Telephone Systems Supply Chain Printing Evernote Azure Touchscreen Phone System Business Communications Internet Service Provider Regulations Compliance Computer Malfunction Fake News Managed IT Service Emergency Proxy Server Emails Google Wallet Public Speaking Vendor Mangement Service Level Agreement Computing Infrastructure Memes Banking Workplace Messenger Streaming Media Deep Learning Management Human Resources Samsung Device security Net Neutrality

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?