Five things you'll love about Vista's storage

30.10.2006

Vista corrects this current Windows implementation issue by allowing even threads with a low priority to be given a higher priority so it is added to the job queue and serviced by the Windows operating system on a regular basis. This allows administrators to set tasks like disk defragmenter to run in the background at a low priority. In this way they do not impact production applications but also know that Vista will not entirely ignore the task either.

Another I/O prioritization feature is Windows Vista improved ability to recognize and manage streaming data. Media applications often can begin their task while still retrieving data from the disk and can compensate for missing or dropped packets. Vista accommodates these applications by allowing the application to reserve minimum and maximum amounts of bandwidth within Vista's I/O subsystem. This guarantees application has the minimum throughput needed to stream video without glitches but also permits it to pre-fetch additional data when more bandwidth is available without choking other applications running on the system.

Increased storage security

Finally, Vista steps up its support for security of both fixed and removable media with its new BitLocker Drive Encryption feature. This feature's primary objective is to encrypt data on the Windows operating system volume of the hard drive to protect unauthorized users from breaking Windows file and system protection on lost or stolen computers. The data is encrypted based upon either a user-supplied personal identification number (PIN) or an inserted USB flash drive that contains the keying material. All encryption keys are then protected using the Trusted Platform Module (TPM) 1.2, a standard that uses trusted hardware and enabling software for security that is less vulnerable to virtual and physical attack.

In the event the user forgets his PIN or if the USB flash drive is lost, Vista also provides an option for administrators to recover the lost keys. To do this, Russ Humphries, lead program manager for Microsoft, recommends that an administrator assist the user in the setup of the BitLocker functionality using an Active Directory Group Policy Object. Then when the user either enters the key or inserts the USB device, the recovery key can be automatically escrowed into AD.