INCITS’ T13 Launches Work on New BIOS Interface

The Technical Committee T13 of the InterNational Committee for Information Technology Standards (INCITS) has announced that it will begin work immediately on a new BIOS Enhanced Disk Drive Services 3 (EDD-3) Standard, which builds on EDD-2 to address emerging storage technologies. The standard will provide a BIOS interface that operating systems can use to access mass storage devices.

“In light of important new storage devices, T13 recognized the need to build on EDD-2,” said Kate McMillan, director of the Secretariat for INCITS. “The proposed EDD-3 standard will serve an extremely large market — all personal computer systems utilizing ATA/ATAPI, SCSI, Fibre Channel, 1394, Infiniband, PCI Express, USB, Serial ATA, and other buses to which disc drives can be attached.”

Important features of the proposed BIOS interface include:

  • Accessing devices where the host has up to 64 bits of address
    space and the device has more than 28 bits of address space
  • Providing data read and write capability
  • Documentation for cylinder-head-sector (CHS) BIOS interfaces
  • Documentation for logical-block address (LBA) BIOS interfaces
  • Support for ATA and ATAPI on several host buses.

“Developers of this standard may identify other interface requirements other than those already covered,” McMillan added. “We encourage any company or individual with a material interest in new storage devices to join T13 and shape the standard.” Details about T13’s meeting schedule are at www.incits.org/tc_home/t13.htm.

Latest Articles

Top 10 Data Recovery Certifications

Data recovery is the process to restore lost or corrupted data due to a disaster, and companies must data recovery experts to recover their...

Top 10 Companies Hiring for Data Recovery Jobs

Data recovery is a vital part of the technology industry today. When data is accidentally deleted, corrupted, lost, or damaged, there is a risk...

Data Recovery Q&A With Kathy Ahuja at Qumulo

Enterprise data is at constant risk of physical destruction, cyber attacks, and theft or unexpected system or hardware failure. To mitigate these risks, enterprises...