Secure Your SAP Infrastructure Throughout Every Competitive Moment | Explore Our Basis Services for RISE with SAP

MEMORY

Memory is the internal storage areas within computing systems. The computer memory is any physical device that can temporarily store data such as RAM (random access memory) or ROM (read only memory). Some computers also make use of virtual memory that expands the physical memory via the hard disk. Memory devices operate through integrated circuits and are used by operating systems, software and hardware.

Memory can be classified as temporary or permanent. Temporary memory does not store data when the computer or the hardware device is no longer powered. Computer RAM is an example of temporary memory. This is why if the computer freezes or restarts while you are working, data that has not been saved might be lost. Permanent memory, sometimes abbreviated as NVRAM, is a type of memory that stores the data even in the case of a loss of power. EPROM is another example for permanent memory. Virtual memory is the memory management capability of an operating system that uses hardware and software to temporarily transfer data from the random access memory (RAM) to the hard disk in order to compensate for insufficient physical memory. Virtual address spaces use active memory of the RAM and the inactive memory of the hard disk drives (HDD) to make available addresses that are contiguous that can store both the application and the data.

Memory is usually categorized as cache, primary and secondary:

Cache memory is very high speed and semiconductor based, it can improve the performance of the central processing unit (CPU). It serves as a buffer between the CPU and the primary memory. It is used to store data and application instructions most frequently requested by the CPU. Operating systems transfer data and parts of an application from the disk to the cache where the CPU can access them.

Primary memory (main memory) only stores data and instructions that are currently used by the computer. It has a limited capacity and data is lost when the power supply is switched off. It is usually comprised of a semiconductor device. Data and instructions that need to be processed are stored in the main memory. It has two sub-categories as RAM and ROM.

Secondary memory is known as external memory as well. CPU does not access this memory directly, instead it uses input/output channels for indirect access. The data stored on secondary memory is first transferred to the main memory, upon which it can be accessed by the CPU. CD-ROM, DVD and similar devices are examples of secondary memory.

Dictionary Home Page
SERVICES AND SOLUTIONS

Let's build your IT infrastructure together!

Managed Cloud Services
GlassHouse Cloud Services
GlassHouse Cloud Services
Managed Cloud Services Tailored for Finance Industry Compliance
Managed Services
Professional Services
GlassHouse Cloud Services

Infrastructure as a Service

Maintain and utilize all IT infrastructure resources for your workloads on GlassHouse Cloud in a fully managed way.

Explore
GlassHouse Cloud Services

GPU as a Service - H Series

GPU infrastructure hosted in Turkey, delivered from a highly available and KVKK-compliant cloud platform, purpose-built for your AI and high-performance computing workloads.

Explore
GlassHouse Cloud Services

SAP as a Service

Rapidly expand your business with integrated SAP infrastructure from the cloud. Unlock the full potential of SAP solutions in the cloud!

Explore
GlassHouse Cloud Services

Container as a Service

Providing manufacturer-independent, fully open-source Kubernetes container infrastructure management.

Explore
GlassHouse Cloud Services

Object Storage as a Service

Securely and scalably store your unstructured data. Benefit from dynamic capacity and high availability today!

Explore
GlassHouse Cloud Services

Disaster Recovery as a Service

Restore your data and applications seamlessly without loss using geographically redundant infrastructure for disasters!

Explore
GlassHouse Cloud Services

Backup as a Service

Backup workloads in a secure and high-performance cloud environment to ensure business continuity, data redundancy, and rapid recovery across all scenarios.

Explore
GlassHouse Cloud Services

Monitoring as a Service

Ensure the continuous monitoring and analysis of your infrastructure and application performance data every minute of every day, all year round, from a centralized location with GlassHouse's Monitoring as a Service (MaaS)!

Explore
GlassHouse Cloud Services

Firewall as a Service

Protect your operations from cyber threats by fulfilling your security policy and rule management requirements with a cloud-managed firewall service. Safeguard your business against potential security breaches.

Explore
GlassHouse Cloud Services

Web Application Firewall (WAF) as a Service

Ensure the uptime of your applications by preventing malicious data packets from damaging your application layer!​

Explore
GlassHouse Cloud Services

IPS as a Service

Detect all anomalies in your IT infrastructure instantly and strengthen the immune system of your IT infrastructure.

Explore
GlassHouse Cloud Services

Load Balancer as a Service

Ensure the performance of your web servers against fluctuating network traffic loads with GlassHouse Load Balancer as a Service.​

Explore
GlassHouse Cloud Services

Antivirus as a Service

Maintain the security of all your servers by implementing regular scans and protection against viruses and other threats through a centralized cloud-based control system!

Explore
GlassHouse Cloud Services

Vulnerability Management as a Service

Stay on guard against security vulnerabilities and zero-day attacks! Bid farewell to operational burdens such as version incompatibilities and update management!

Explore
On Premise Solutions
Hardware and Software Solutions
Hardware and Software Solutions
Network and Security Solutions
Professional Services

Blog content that may be of interest to you

What Is Ransomware?
30 March 2026

What Is Ransomware?

Ransomware is a type of malicious software that encrypts critical data and demands a ransom from organizations or users. These attacks, executed through various vectors, can lead to severe data loss and pose critical risks to business continuity and IT security. As a specific subtype of malware, proactive protection against ransomware requires advanced endpoint security, air-gapped backup, and disaster recovery scenarios. All details are in our article.

Read More
What Is Google’s AI Tool Gemini and How Is It Used?
23 March 2026

What Is Google’s AI Tool Gemini and How Is It Used?

With its multimodal architecture capable of processing different data formats such as text, images, audio, and code, Google Gemini delivers productivity across a wide spectrum ranging from corporate reporting to data analytics and operational business processes. With its Ultra, Pro, and Nano models, it offers flexible solutions for both large-scale enterprise projects and daily workflows. Fully integrated with the Google Workspace ecosystem, Gemini is an indispensable supporter of modern business life thanks to seamless data access and advanced analytics capabilities. More details about Gemini are available in this article!

Read More
Differences Between On-Premise SAP Infrastructure and Managed SAP Basis Services
20 March 2026

Differences Between On-Premise SAP Infrastructure and Managed SAP Basis Services

Discover how you can transform the operational burdens created by traditional on-premise SAP infrastructures into a secure, scalable, and uninterrupted architecture with GlassHouse Managed SAP Basis Services. While minimizing your internal operational workload through backup, Cyber Recovery, and Managed SAP Basis services, you can optimize your infrastructure costs and gain flexibility by leveraging outsourcing (Managed Services). Depending on your needs, you can strengthen your business continuity with on-premise, cloud, or hybrid architectures. Start reading now to explore all the details!

Read More
Difference Between Managed Backup and Backup as a Service
18 March 2026

Difference Between Managed Backup and Backup as a Service

Enterprise backup solutions vary according to the operational needs of organizations. Managed Backup and Backup as a Service (BaaS) solutions enable institutions to protect their data securely with high availability; however, they differ critically in terms of architectural structure and operational management responsibilities (SLA). In this guide, we examine the core features, strategic advantages, and usage scenarios of both approaches to help you choose the most suitable solution for your IT infrastructure.

Read More
What is GPU as a Service H Series?
17 March 2026

What is GPU as a Service H Series?

GPU as a Service H Series is a strategic Infrastructure as a Service (IaaS) solution that enables organizations to access high-performance compute power through the cloud without making physical GPU hardware investments (CapEx). It accelerates model training and data processing by offering a flexible and scalable architecture, especially for projects requiring compute-intensive workloads such as artificial intelligence (AI), machine learning (ML), big data analytics, and high-performance computing (HPC). Further details are available in our article.

Read More
Difference Between Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS)
16 March 2026

Difference Between Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS)

Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS) are two different cloud services used for data security and business continuity. While BaaS protects your data by backing it up regularly, DRaaS enables critical systems to be rapidly restored and business continuity to be maintained in line with target recovery times (RTO) in the event of a potential disaster. In this article, you can examine the key differences and features of these two services.

Read More