Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Web Components: Working With Shadow DOM

      July 28, 2025

      Google’s new Opal tool allows users to create mini AI apps with no coding required

      July 28, 2025

      Designing Better UX For Left-Handed People

      July 25, 2025

      This week in AI dev tools: Gemini 2.5 Flash-Lite, GitLab Duo Agent Platform beta, and more (July 25, 2025)

      July 25, 2025

      Microsoft wants you to chat with its browser now – but can you trust this Copilot?

      July 28, 2025

      I tested the Dell XPS’ successor – here are the biggest upgrades (and what’s the same)

      July 28, 2025

      I’m a Linux pro – here are my top 5 command line backup tools for desktops and servers

      July 28, 2025

      Should you buy a refurbished iPad? I tried one from Back Market and here’s my verdict

      July 28, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      elegantweb/sanitizer

      July 28, 2025
      Recent

      elegantweb/sanitizer

      July 28, 2025

      Streamlined String Encryption with Laravel’s Fluent Methods

      July 28, 2025

      Resume PHP

      July 28, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Gamers bypass UK age verification with Death Stranding — no real face or VPN required

      July 28, 2025
      Recent

      Gamers bypass UK age verification with Death Stranding — no real face or VPN required

      July 28, 2025

      New Xbox games launching this week, from July 28 through August 3 — Grounded 2 arrives on Xbox Game Pass

      July 28, 2025

      TikTok’s owner forked Microsoft’s Visual Studio Code and concerns have been raised — reports suggest it’s resource heavy and never stops ‘phoning home’

      July 28, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»News & Updates»HoloMem awarded Innovate UK Smart Grant to validate holographic data storage

    HoloMem awarded Innovate UK Smart Grant to validate holographic data storage

    June 10, 2025

    HoloMem, a cold storage data deeptech, has been awarded a £550,000 Smart Grant by Innovate UK for its HoloDrive project, in partnership with TechRe, the data centre consultants. 

    Global data creation is increasing exponentially, but the technological capacity to store it is not keeping pace. Magnetic tape, now a 70-year-old technology, remains the industry standard, despite being sensitive to environmental conditions and increasingly outdated.

    The latest LTO version, expected this year, stores just 36TB per cartridge. It requires tightly controlled environments and suffers from data degradation over time, limiting readability.

    In contrast, HoloDrive offers a next-generation solution – up to 200TB per cartridge, zero energy use for storage, no need for climate control, and infinite readability. It uses low-energy, low-cost laser diodes and recyclable HX200 photopolymer materials, delivering a high-speed, high-density storage option that reduces power consumption by 90 per cent and annual costs by around 99 per cent.

    Charlie Gale, co-founder and CEO of HoloMem, said:

    Current data storage technology is simply not sufficient to meet the needs of current and future global data creation; a category shift is needed. Our holographic cold data storage technology will cause huge reductions in energy usage, while allowing data to be stored at ultra-high density, with infinite readability. Our HoloDrive solution has been designed to integrate with legacy systems with minimal hardware or software disruption, and this grant from Innovate UK will help us finalise and fully validate this game-changing technology.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleUPERFECT Unify B5 Portable Monitor 1080P Display Review
    Next Article GNU/Linux cresce a spese di Windows: tra nuove opportunità e vecchi ostacoli

    Related Posts

    News & Updates

    Microsoft wants you to chat with its browser now – but can you trust this Copilot?

    July 28, 2025
    News & Updates

    I tested the Dell XPS’ successor – here are the biggest upgrades (and what’s the same)

    July 28, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-49148 – ClipShare Server DLL Load Hijacking Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-46326 – Snowflake-Connector-Net TOCTOU Race Condition Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    UX Benchmarking vs. UX Success Metrics

    Web Development
    Whisp is a PHP SSH Server

    Whisp is a PHP SSH Server

    Development

    Highlights

    CVE-2025-5990 – Crafty Controller Stored XSS Vulnerability

    June 15, 2025

    CVE ID : CVE-2025-5990

    Published : June 15, 2025, 6:15 p.m. | 7 hours, 7 minutes ago

    Description : An input neutralization vulnerability in the Server Name form and API Key form components of Crafty Controller allows a remote, authenticated attacker to perform stored XSS via malicious form input.

    Severity: 7.6 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Set up a custom plugin on Amazon Q Business and authenticate with Amazon Cognito to interact with backend systems

    May 17, 2025

    AutoMix on iOS 26 is going viral. Here’s how to try the hottest iPhone feature yourself

    June 18, 2025

    Palo Alto Networks PAN-OS Vulnerability Let Attacker Run Arbitrary Commands as Root User

    June 12, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.