RAID in computers is an acronym for Redundant Array of Independent Disks. While its name suggests that RAID is designed specifically for creating a redundant disk array, this isn’t necessarily true as RAID is simply a method of using multiple storage drives together rather than individually, or in a JBOD (Just a Bunch of Disks) configuration. When several drives are used in a RAID configuration, the resulting array will appear as if there’s only a single drive attached in the Operating System.

RAID arrays have several different modes, or levels, which determine how the disks will work together. While some RAID levels will stripe data for better performance, other RAID levels will mirror data for better redundancy. Some of the most common RAID levels include:

  • RAID 0: This RAID level is the most dangerous of the bunch, but will provide the greatest performance and capacity. Unlike other RAID levels, RAID 0 stripes data across multiple drives to increase performance beyond the capabilities of a single drive on its own, but offers no data redundancy in the process. As a result, even the failure of a single drive can cause complete data loss.
  • RAID 1: This RAID level is the safest and most secure however, comes at a cost of performance and capacity. In this RAID 1, data is mirrored across two drives so that if one drive were to fail, the second could take its place until a new drive is installed and the RAID array is re-built.
  • RAID 5: This RAID level attempts to be a middle ground between RAID 0 and RAID 1. Rather than wasting a full drive mirroring a complete copy of the data on another drive, RAID 5 requires a minimum of three drives and uses at least one of the drives as a parity drive for storing parity data. In the event of a drive failure, the parity drive along with another drive is able to re-build the data on the failed drive.
  • RAID 10: This RAID level combines RAID 1 and RAID 0 quite literally by not only striping data across drives, but also mirrors them as well.


Ransomware is a type of malicious software, or malware, designed to infect a computer and hold its data ransom until a sum of money is paid for it to be unlocked. This is typically accomplished by encrypting the victim’s files so that it can’t be decrypted without the key which only the attacker has access to. Payment is then rendered via a cryptocurrency such as Bitcoin so that the transaction cannot be traced by law enforcement.

Generally, ransomware infects a computer by entering a users system through files that users think are legitimate. Once the files are executed, the ransomware is deployed with it. The ransomware can then either stay dormant or can immediately unleash its payload, locking the users out of their files.

Romer-G Switches

Romer-G switches are mechanical keyboard switches used exclusively on Logitech mechanical keyboards. The Romer-G switch was first unveiled in the Logitech G910 Mechanical Gaming Keyboard back in 2014 as a joint development between Logitech and Omron, which manufactures the Romer-G switch. Compared to the Cherry MX switch, the Logitech Romer-G switch features a shorter travel distance, shorter actuation distance and a light guide in the center of the switch. Logitech Romer-G switches also feature dual actuation contact points making it more accurate and mores durable compared to mechanical switches with a single actuation contact point.



Common Logitech Romer-G Mechanical Keyboard Switches

ROMER-G B3K (Omron)

Actuation Force (g): 45

Actuation Distance (mm): 1.5

Full Travel Distance (mm): 3

Lifespan: 70 Million

Other Characteristics: Tactile bump


RPM in computers refers to:

1. RPM, or Revolutions Per Minute, is used primarily as a performance metric in computer components that spin such as the blades of a computer fan or the platters of a traditional hard drive.

Theoretically, the higher the RPM, the faster the performance of the component. For example, when comparing hard drives, the hard drive with a platter rotation speed of at 15,000 RPM is theoretically faster than the hard drive with with the platter rotation speed of 5,400 RPM.

2. .rpm, or Red Hat Package Manager, is a package management system used in Red Hat Linux and other Red Hat based Linux Operating Systems (CentOS, Fedora Core, etc.). Red Hat Package Manager files are denoted by the .rpm extension such as apacheds-2.0.0-M24-x86_64.rpm. These files are utilizes to package files so that they can be easily installed within a system.

.rpm in Red Hat Linux is similar to .deb in Debian or .msi in Windows.