While there has been a recent push for more customizable mobile phones, most carriers offer a fairly limited of variety in the hardware customers can receive. There isn’t much a user can purchase to make their iPhone battery last longer, but the SanDisk iXpand flash drive is coming up strong as a compact solution to make the standard 16GB iPhone a little less standard.
The obvious size discrepancy and the not so obvious set of protocol difference between SD memory and a standard disk drive has made it difficult to utilize SD cards as a primary or even secondary storage space on a standard computer. Fortunately, converters to bridge the gap between these two types of memory have become smaller and faster to finally utilize a set of SD cards as a SATA SSD.
The 10 x Micro SD to SATA converter utilizes a RAID 0 level which increases system performance, read speeds, and write speeds. RAID setups link multiple storage mediums together for better results and hardware RAID does not use the host computer’s CPU to function. Available for $64.00, this converter is an excellent way to take advantage of the speed of Micro SD cards for a desktop.
The U.S. Department of Homeland Security issued a warning on Thursday to remove Apple’s QuickTime for Windows. The warning was in response to two recently uncovered security flaws in the software that will never be patched in the Windows operating system.
The information age heralded by our technology is proving more than capable of eroding the media blockade of regimes such as the Democratic People’s Republic of Korea. Over 250 defectors have studied at a journalist academy founded by one of their own in 2011 and they have gone on to further undermine North Korean efforts to keep its population in the dark. These subversions include going on to work for radio stations broadcasting into North Korea, writing about their homeland for media in South Korea or surrounding nations, and just recently, a defector by the name of Daniel Jeong has begun a project to smuggle 6,000 USB drives loaded with news and other media into the isolated state.
Amazon will no longer allow the sale of USB cords with the potential to fry a consumer’s technology.
In its list of banned items, USB-C cables or adapter products have been added. This of course is not a blanket statement since USB-C is taking the world by storm with companies like Apple even going so far as to release a macbook with only 2 ports total. Any USB Type-C cable or adapter product which is not compliant with standard specifications will not be allowed on Amazon for sale or resale.
The new Type-C power cord is small, multipurpose, universal, and reversible. Capable of suppling power, video output, and an enourmous amount of data per second, USB Type-C is looking to unseat micro-USB cords seen on many standard smartphones. Cheap power cords are nothing new and are still readily available but cheap, poorly made cords have proven to be dangerous to users and to their tech.
The USB-C standards-setting group, the USB Implementers Forum, has been issuing a seal of approval for safe USB-C cords since they first appeared on the market last year. Amazon, up until now, had allowed non-certified cords on its website. Since they are now following suit with many physical stores such as Staples and Best Buy, products and pricing between in-store and online may have much less of a contrast in the future.
While all pre-built desktops and laptops come with a hard drive, it’s not uncommon for users to look for a more mobile way to store their data rather than carrying their entire machine with them to all destinations. External hard drives have been the answer to this lack of mobility ever since the ingenuity of a floppy disk met with the carrying capacity of standard disk or optical memory and while many users have their needs met by existing externals, the paradigm of “bigger, faster, and cheaper” in the tech industry rings true as Seagate unveils the Innov8.
Data security through the internet is one of the most volatile industries in today’s world. Bug exploits, malicious code, and all kinds of data stealing programs being born through the constant fluidity of web content has led to many companies and organizations removing their valuable information from the grid altogether. A new threat on the hardware front however, may prove to be a challenge for even this avenue of data protection.