USB Flash Drive - Wikipedia, the Free Encyclopedia

Total Page:16

File Type:pdf, Size:1020Kb

USB Flash Drive - Wikipedia, the Free Encyclopedia USB flash drive - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/USB_flash_drive USB flash drive From Wikipedia, the free encyclopedia A USB flash drive is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. USB flash drives are typically removable and rewritable, and physically much smaller than a floppy disk. Most weigh less than 30 grams (1.1 oz). [1] As of September 2011, drives of up to 256 gigabytes (GB) are available. [2] A one-terabyte (TB) drive was unveiled at the 2013 Consumer Electronics Show and will be available during 2013. [3] Storage capacities as large as 2 TB are planned, with steady SanDisk Cruzer Micro, a brand of [4] improvements in size and price per capacity expected. Some allow USB flash drives up to 100,000 write/erase cycles, depending on the exact type of memory chip used, and a 10-year shelf storage time.[5][6][7] USB flash drives are often used for the same purposes for which floppy disks or CD-ROMs were used, i.e., for storage, back-up and transfer of computer files. They are smaller, faster, have thousands of times more capacity, and are more durable and reliable because they have no moving parts. Until about 2005, most desktop and laptop computers were supplied with floppy disk drives in addition to USB A Kingston card reader which accepts ports, but floppy disk drives have been abandoned due to their age Micro SD memory cards (Transcend and due to USB flash drives' growing popularity. card shown inserted) and acts as a USB USB flash drives use the USB mass storage standard, supported flash drive, resulting in a size of natively by modern operating systems such as Linux, Mac OS X, approximately 2 cm in length, 1 cm in Windows, and other Unix-like systems, as well as many BIOS boot width and 2 mm in thickness ROMs. USB drives with USB 2.0 support can store more data and transfer faster than much larger optical disc drives like CD-RW or DVD-RW drives and can be read by many other systems such as the Xbox 360, PlayStation 3, DVD players and in a number of handheld devices such as smartphones and tablet computers. A flash drive has no moving parts to be driven; therefore, it's not a true drive. The term drive persists because computers read and write flash drive data using the same system commands as for a mechanical disk drive, with the storage appearing to the computer operating system and user interface as just another drive. A flash drive consists of a small printed circuit board carrying the circuit elements and a USB connector, insulated electrically and protected inside a plastic, metal, or rubberized case which can be carried in a pocket or on a key chain, for example. The USB connector may be protected by a removable cap or by retracting into the body of the drive, although it is not likely to be damaged if unprotected. Most flash drives use a standard type-A USB connection allowing connection with a port on a personal computer, but drives for other interfaces also exist. USB flash drives draw power from the computer via the USB connection. Some devices combine the functionality of a digital audio player with USB flash storage; they require a battery only when used to play music. Leader providers are Gartner and Kingston Technology. Contents 1 History 1 de 17 08/04/2013 11:38 p.m. USB flash drive - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/USB_flash_drive 1.1 Creator controversy 1.2 First commercial product 1.3 Second generation 1.4 Third generation 2 Design and implementation 3 Technology 3.1 Essential components 3.2 Additional components 3.3 Size and style of packaging 3.4 File system 3.5 Longevity 4 Fake products 5 File transfer speeds 6 Uses 6.1 Personal data transport 6.2 Secure storage of data, application and software files 6.3 Application carriers 6.4 Computer forensics and law enforcement 6.5 Booting operating systems 6.6 Windows Vista, Windows 7 and Windows 8 ReadyBoost 6.7 Audio players 6.8 Media storage and marketing 6.9 Arcades 6.10 Brand and product promotion 6.11 Backup 6.12 Operating system installation media 6.13 Security systems 7 Advantages and disadvantages 7.1 Disadvantages 8 Comparison with other portable storage 8.1 Tape 8.2 Floppy disk 8.3 Optical media 8.4 Flash memory cards 8.5 External hard disk 8.6 Obsolete devices 8.7 Encryption and Security 9 Security threats 10 Naming 11 Current and future developments 12 See also 13 References 14 External links History Creator controversy USB flash drives were invented by Amir Ban, Dov Moran and Oron Ogdan, all of the Israeli company M-Systems, who filed US patent 6,148,354 in April 1999; [8] however, the patent describes a product that has a cable between the memory unit and the USB connector. IBM Patent Disclosure RPS8-1999-0201 from September 13, 1999 by Shimon Shmueli accurately describes the USB flash drive. [citation needed ] IBM 2 de 17 08/04/2013 11:38 p.m. USB flash drive - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/USB_flash_drive partnered with M-Systems to bring the product to market. Shmueli was later an expert witness for M-Systems and as part of his testimony in the Singapore court presented the IBM disclosure and evidence to the fact that he invented the USB flash drive. M-Systems' product, developed by a team led by Dan Harkabi, and named the DiskOnKey, was announced in September 2000. [9] Competing claims have been made by a Singaporean company Trek Technology and a Chinese company Netac Technology,[10] but based on patents that post-date M-Systems'. Both Trek Technology and Netac Technology have tried to protect their patent claims. Trek won a Singaporean suit, [11] but a court in the United Kingdom revoked one of Trek's UK patents. [12] While Netac Technology has brought lawsuits against PNY Technologies,[13] Lenovo,[14] aigo,[15] Sony,[16][17][18] and Taiwan's Acer and Tai Guen Enterprise Co, [18] most companies that manufacture USB flash drives do so without regard for Trek and Netac's patents. Pua Khein-Seng from Malaysia claims to have incorporated the world's first single chip USB flash controller. He is currently the CEO of Phison Electronics Corp, which is based in Taiwan. [19] First commercial product Trek Technology and IBM began selling the first USB flash drives commercially in 2000. Trek Technology sold a model under the brand name "ThumbDrive", and IBM marketed the first such drives in North America with its product named the "DiskOnKey," which was developed and manufactured by M-Systems.[20] IBM's USB flash drive became available on December 15, 2000, [21] and had a storage capacity of 8 MB, more than five times the capacity of the then-common floppy disks. In 2000, Lexar introduced a Compact Flash (CF) card with a USB connection, and a companion card read/writer and USB cable that eliminated the need for a USB hub. [citation needed ] Second generation Modern flash drives have USB 2.0 connectivity. However, they do not currently use the full 480 Mbit/s (60 MB/s) which the USB 2.0 Hi-Speed specification supports because of technical limitations inherent in NAND flash. The fastest drives currently available use a dual channel controller, alt hough they still fall considerably short of the transfer rate possible from a current generation hard disk, or the maximum high speed USB throughput. File transfer speeds vary considerably. Speeds may be given in Mbyte per second, Mbit per second or optical drive multipliers such as "180X" (180 times 150 KiB per second). Typical fast drives claim to read at up to 30 megabytes/s (MB/s) and write at about half that speed. This is about 20 times faster than USB 1.1 "full speed" devices, which are limited to a maximum speed of 12 Mbit/s (1.5 MB/s). Third generation Like USB 2.0 before it, USB 3.0 offers dramatically improved data transfer rates compared to its predecessor. USB 3.0 was announced in late 2008, but consumer devices were not available until the beginning of 2010. The USB 3.0 interface specifies transfer rates up to 5 Gbit/s (625 MB/s), compared to USB 2.0's 480 Mbit/s (60 MB/s). All USB 3.0 devices are backward compatible with USB 2.0 ports. Computers with USB 3.0 ports are becoming very popular and common. Many newer laptops and desktops have at least one such port. USB 3.0 port expansion cards are available to upgrade older systems, and many newer motherboards feature two or more USB 3.0 jacks. Even though the USB 3.0 interface allows extremely high data transfer speeds, as of 2011 most USB 3.0 flash drives do not utilize the full speed of the USB 3.0 interface due to limitations of their memory controllers (though some four channel memory controllers are now coming to market). Design and implementation 3 de 17 08/04/2013 11:38 p.m. USB flash drive - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/USB_flash_drive On a USB flash drive, one end is fitted with a single Standard-A USB plug. Inside the plastic casing is a small printed circuit board, which has some power circuitry and a small number of surface-mounted integrated circuits (ICs).
Recommended publications
  • Sandisk Cruzer Ent.Indd
    Cruzer Enterprise Secure Enterprise-Grade Portable Storage USB Flash drives have transformed from consumer Works in Harmony With Your gadgets into must-have productivity tools used Existing IT Infrastructure by business professionals everywhere. However, most portable storage devices used in the Cruzer Enterprise helps make the introduction of corporate environment are privately owned and secure, personal storage a simple and seamless lack the security and control measures required process. Cruzer Enterprise requires very little effort by organizations. This exposes organizations to to deploy or support, since it requires no installation tremendous risks and liabilities when a device of dedicated drivers and no administrative rights containing sensitive information is lost or stolen. to operate. That means business professionals can Data loss can potentially lead to damaging results, easily and effectively take their data beyond the such as expensive customer notifi cations, a corporate network to personal home computers, compromised company image, and failure to meet customer sites, and hotel business centers regulatory requirements. — ensuring anytime, anywhere access to critical business information. Secure Portable Storage — Strong and Simple Cruzer Enterprise has also been rigorously tested with leading solutions which enforce policies on the Cruzer® Enterprise USB drives are specifi cally usage of removable devices. This allows for Cruzer designed to meet the unique security, compliance, Enterprise to work seamlessly, without having to and manageability needs of enterprise-size compromise endpoint security. businesses. It does not rely upon users to decide which fi les to secure. Instead it requires mandatory access control for all fi les, storing them in an encrypted, password-protected partition.
    [Show full text]
  • Cyberpro December 4, 2008
    Volume 1, Edition 15 CyberPro December 4, 2008 Keeping Cyberspace Professionals Informed Officers The articles and information appearing herein are intended for President educational purposes to promote discussion in the public interest and to Larry K. McKee, Jr. keep subscribers who are involved in the development of Cyber-related concepts and initiatives informed on items of common interest. The Senior Analyst newsletter and the information contained therein are not intended to Jim Ed Crouch provide a competitive advantage for any commercial firm. Any ------------------------------ misuse or unauthorized use of the newsletter and its contents will result CyberPro Research in removal from the distribution list and/or possible administrative, civil, Analyst and/or criminal action. Kathryn Stephens The views, opinions, and/or findings and recommendations contained in this summary are those of the authors and should not be construed as an official position, policy, or decision of the United States Government, CyberPro Archive U.S. Department of Defense, or National Security Cyberspace Institute. To subscribe or unsubscribe to this newsletter click here CyberPro News Subscription. Please contact Larry McKee , ph. (757) 871-3578, regarding CyberPro subscription, sponsorship, and/or advertisement. All rights reserved. CyberPro may not be published, broadcast, rewritten or redistributed without prior NSCI consent. 110 Royal Aberdeen Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace Institute P a g e | 1 Volume
    [Show full text]
  • History of the Japanese DDR Community (PDF)
    Counting Combos A History of the Japanese DDR Community ~ An Insider’s Perspective ~ By: Aaron Chmielowiec October 5, 2013 Revision 109 Copyright © 2011, 2012, 2013 by Aaron Chmielowiec Cover design by Dan Zamarripa (SD) and Matt Hines Book design by Aaron Chmielowiec Published by AIJBot Press All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means including information storage and retrieval systems, without permission in writing from the author. The only exception is by a reviewer, who may quote short excerpts in a review. Dance Dance Revolution, ParaPara Paradise, Martial Beat, Dance 86.4, Jubeat and Dance Evolution AC are property of Konami Corporation. This book is intended for non-commercial educational purposes and may not be redistributed for profit in any form including but not limited to, electronic information service distribution, bulletin board distribution, and magnetic or optical medium distribution. Printed in the United States of America First Edition: May 2011 Second Edition: June 2012 Third Edition: October 2013 2 Chapter Page Introduction ………………………………………... 4 About the Author ………………………………... 6 1998 ……………………………………………………. 9 1999 ……………………………………………………. 14 2000 ……………………………………………………. 22 2001 ……………………………………………………. 35 2002 ……………………………………...…………….. 55 2003-2005 ……………………………....…………… 77 2006 ……………………………………...…………….. 104 2007-2008 …………………………………………… 121 2009 ……………………………………..……………… 147 2010 ……………………………………..……………… 160 2011 ……………………………………..……………… 172 2012 ……………………………………..……………… 186 Epilogue ………………………………………………. 198 Addendum …………………………………………... 201 Glossary ……………………………………………….. 226 Special Thanks ……………………………………... 231 3 Introduction DDR, or “Dance Dance Revolution” as it is known in full, is a long running series of music games by Konami Corporation as part of the Bemani music game series. DDR started in the late 1990s and unlike most other games found in a typical Japanese arcade, it requires a more physical method of input.
    [Show full text]
  • Comptia® Advanced Security Practitioner (CASP) CAS-003 Cert Guide
    CompTIA® Advanced Security Practitioner (CASP) CAS-003 Cert Guide Robin Abernathy Troy McMillan 800 East 96th Street Indianapolis, Indiana 46240 USA CompTIA® Advanced Security Practitioner (CASP) CAS-003 Editor-In-Chief Cert Guide Mark Taub Copyright © 2018 by Pearson Education, Inc. Product Line Manager All rights reserved. No part of this book shall be reproduced, stored in Brett Bartow a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from Acquisitions Editor the publisher. No patent liability is assumed with respect to the use of the Michelle Newcomb information contained herein. Although every precaution has been taken in Development Editor the preparation of this book, the publisher and author assume no respon- Ellie Bru sibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Managing Editor ISBN-13: 978-0-7897-5944-3 Sandra Schroeder ISBN-10: 0-7897-5944-6 Project Editor Library of Congress Control Number: 2018932405 Mandie Frank 01 18 Copy Editor Kitty Wilson Trademarks All terms mentioned in this book that are known to be trademarks or ser- Indexer vice marks have been appropriately capitalized. Pearson IT Certifi cation Ken Johnson cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service Proofreader mark. Debbie Williams Windows is a registered trademark of Microsoft Corporation. Technical Editors Chris Crayton Warning and Disclaimer Every effort has been made to make this book as complete and as accurate Publishing Coordinator as possible, but no warranty or fi tness is implied.
    [Show full text]
  • Dance Tournament Press Release 2018
    PRESS RELEASE-----PRESS RELEASE----- PRESS RELEASE-----PRESS RELEASE East Coast Stamina ITG2 Tournament at Harrisburg Mall’s Family Fun Center An “In The Groove 2” (ITG2) Dance Game Tournament will be held at the Family Fun Center located in the Harrisburg Mall on September 28th-30th of 2018. East Coast Stamina 7 is the latest in a series of annual ITG2 tournaments that have become known globally for having among the highest standards of competition across all dance games (including Dance Dance Revolution and Pump It Up). The Family Fun Center’s ITG2 Dance Tournament director, Ian Pyles, reports that participants from as far away as France and Australia managed to qualify and have confirmed their attendance. ITG2 is a dance simulation game produced by Andamiro and Roxor Games, Inc in 2005. The concept of the game is simple: step on the panels when the corresponding arrow on the screen reaches an indicator. Every successful step will raise your combo, while every missed step will lower your life bar. The object of the game is to 'pass' a song with the highest score possible, while ensuring that your life bar never runs empty. It is a simple concept at first, but quickly becomes very challenging and addicting. With each new song and step pattern becoming a new challenge, countless amounts of game play value exist. Players can insert a USB thumb drive into the machine to track their scores and progress on the game, see how many calories they’ve burned, and even load custom step patterns and songs from their drive.
    [Show full text]
  • Floppy Disk - Wikipedia, the Free Encyclopedia Page 1 of 22
    Line printer - Wikipedia, the free encyclopedia Page 1 of 5 Line printer From Wikipedia, the free encyclopedia The line printer is a form of high speed impact printer in which one line of type is printed at a time. They are mostly associated with the early days of computing, but the technology is still in use. Print speeds of 600 to 1200 lines-per-minute (approximately 10 to 20 pages per minute) were common. Contents 1 Designs 1.1 Drum printer 1.2 Chain (train) printer 1.2.1 Band printer 1.3 Bar printer 1.4 Comb printer 2 Paper (forms) handling IBM 1403 line printer, the classic line printer of 3 Origins the mainframe era. 4 Current applications 5 See also 6 References Designs Four principal designs existed: Drum printers Chain (train) printers Bar printers Comb printers Drum printer In a typical drum printer design, a fixed font character set is engraved onto the periphery of a number of print wheels, the number matching the number of columns (letters in a line) the printer could print. The wheels, joined to form a large drum (cylinder), spin at high speed and paper and an inked ribbon is stepped (moved) past the print position. As the desired character for each column passes the print position, a hammer strikes the paper from the rear and presses the paper against the ribbon and the drum, causing the desired character to be recorded on the continuous paper. Because the drum carrying the letterforms Drum Printer (characters) remains in constant motion, the strike-and-retreat http://en.wikipedia.org/wiki/Line_printer 2010-12-03 Line printer - Wikipedia, the free encyclopedia Page 2 of 5 action of the hammers had to be very fast.
    [Show full text]
  • Security Analysis of USB Drive Student: Bc
    ASSIGNMENT OF MASTER’S THESIS Title: Security analysis of USB drive Student: Bc. David Jagoš Supervisor: Ing. Jiří Buček, Ph.D. Study Programme: Informatics Study Branch: Design and Programming of Embedded Systems Department: Department of Digital Design Validity: Until the end of winter semester 2019/20 Instructions Research existing vulnerabilities of encrypted USB drives. Perform a security analysis of Kingston DataTraveler Vault Privacy encrypted flash drive. Try to find its vulnerabilities in order to extract stored data without knowledge of the password. - Analyze the internal structure of the flash drive. - Analyze the client software supplied with the flash drive. - Analyze and document undocumented APIs. - Perform experiments in order to analyze the dependency of the encryption key on the password. Evaluate the results and discuss potential impact of your findings. References Will be provided by the supervisor. doc. Ing. Hana Kubátová, CSc. doc. RNDr. Ing. Marcel Jiřina, Ph.D. Head of Department Dean Prague February 23, 2018 Master’s thesis Security analysis of USB drive Bc. David Jagoˇs Department of Digital Design Supervisor: Ing. Jiˇr´ıBuˇcek January 10, 2019 Acknowledgements I’d like to thank my supervisor, Ing. Jiˇr´ıBuˇcek,for his counsel and immense patience. Declaration I hereby declare that the presented thesis is my own work and that I have cited all sources of information in accordance with the Guideline for adhering to ethical principles when elaborating an academic final thesis. I acknowledge that my thesis is subject to the rights and obligations stip- ulated by the Act No. 121/2000 Coll., the Copyright Act, as amended, in particular that the Czech Technical University in Prague has the right to con- clude a license agreement on the utilization of this thesis as school work under the provisions of Article 60(1) of the Act.
    [Show full text]
  • Storage Devices and Power Supplies Chapter
    Chapter Storage Devices and Power Supplies 2 THE FOLLOWING COMPTIA A+ 220-801 EXAM OBjECTIVES ARE COVERED IN THIS CHAPTER: NÛ 1.5 Install and configure storage devices and use appropriate media. NNOptical drives: CD-ROM, DVD-ROM, Blu-Ray NNCombo drives and burners: CD-RW, DVD-RW, Dual Layer DVD-RW, BD-R, BD-RE NNConnection types NNExternal: USB, Firewire, eSATA, Ethernet NNInternal SATA, IDE and SCSI: IDE configuration and setup (Master, Slave, Cable Select), SCSI IDs (0 – 15) NNHot swappable drives NNHard drives: Magnetic, 5400 rpm, 7200 rpm, 10,000 rpm, 15,000 rpm NNSolid state/flash drives: Compact flash, SD, Micro-SD, Mini-SD, xD, SSD NNRAID types: 0, 1, 5, 10 NNFloppy drive NNTape drive NNMedia capacity: CD, CD-RW, DVD-RW, DVD, Blu-Ray, Tape, Floppy, DL DVD NÛ 1.8 Install an appropriate power supply based on a given scenario. NNConnector types and their voltages: SATA, Molex, 4/8-pin 12v, PCIe 6/8-pin, 20-pin, 24-pin, Floppy NNSpecifications: Wattage, Size, Number of connectors, ATX, Micro-ATX NNDual voltage options As a PC technician, you need to know quite a bit about hard- ware. Given the importance and magnitude of this knowledge, the best way to approach it is in sections. The frst chapter introduced the topic via the primary core components, and this chapter follows up where it left off. Specifcally, this chapter focuses on storage devices and power supplies. Identifying Purposes and Characteristics of Storage Devices What good is a computer without a place to put everything? Storage media hold the data being accessed as well as the fles the system needs to operate and data that needs to be saved.
    [Show full text]
  • Knowing Knoppix/Print Version - Wikibooks, Open Books for an Open World
    Knowing Knoppix/Print version - Wikibooks, open books for an open world Knowing Knoppix/Print version Knowing Knoppix The current, editable version of this book is available in Wikibooks, the open-content textbooks collection, at http://en.wikibooks.org/wiki/Knowing_Knoppix Permission is granted to copy, distribute, and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 3.0 License. Contents 1 Introducing Knoppix 1.1 Introducing Knoppix 1.1.1 What is Knoppix? 1.1.1.1 Linux that runs from CD 1.1.1.2 Can be installed on a Hard Disk or a USB key 1.1.1.3 How it works 1.1.1.4 Safe to run 1.1.1.5 Personal 1.1.1.6 Free 1.1.2 What you can do with Knoppix 1.1.2.1 Learn Linux 1.1.2.2 Rescue and test 1.1.2.3 Use and explore 1.1.2.4 Network 1.1.3 Where Knoppix comes from 1.1.4 Knoppix is Free Software 1.1.5 Limitations 1.1.5.1 No warranty 1.1.5.2 CD means slow 1.1.5.3 Not everything works 1 von 71 Knowing Knoppix/Print version - Wikibooks, open books for an open world 1.1.5.4 RAM intensive 1.1.6 What is included in Knoppix? 1.1.7 What is Linux? 1.1.7.1 A little history 1.1.7.1.1 How GNU grew 1.1.7.1.2 It's a GNU world! 2 Knoppix for the first time 2.1 Knoppix for the first time 2.1.1 Overview 2.1.2 Hardware requirements 2.1.3 Starting Knoppix 2.1.3.1 The first stage 2.1.3.2 The second stage 2.1.4 The first stage 2.1.4.1 Getting to the boot prompt 2.1.4.2 Help at the boot prompt 2.1.4.2.1 Quick help 2.1.5 The second stage 2.1.5.1 Starting Knoppix proper 2.1.5.2 Which keyboard/language? 2.1.5.3 Automatic hardware detection
    [Show full text]
  • Fy10ct-Research-Report-Osc-Otronicon-Final1.Pdf (490.79Kb)
    OTRONICON V.5 @ Orlando Science Center 2010 Cultural Tourism Audience Research Report Prepared for: United Arts of Central Florida, and Orange County Arts & Cultural Affairs Written and Delivered by: Americans for the Arts July 2010 DETAILED RESEARCH FINDINGS Name of Event (Funded Project): Otronicon v.5 Event Dates: January 15, 2010 through January 18, 2010 Name of Presenting Organization: Orlando Science Center Total TDT Funding Awarded: $100,000 Project Description: OTRONICON v.5 builds on the incredible success and momentum created since the inaugural Otronicon in 2006. Otronicon v.5 showcases the convergence of art, science, education, technology and entertainment. Otronicon provides audiences of all ages with hands-on opportunities to explore creative potentialities of electronic games, digital media and simulation. From a festival of short films created by electronic game technology to the latest game formats and technologies, to cutting-edge medical simulators, Otronicon engages, explores and inspires. ALL Local Out-of-Town Incremental EVENT ATTENDANCE ATTENDEES Attendees Attendees Attendees Total Attendance 11,920 8,082 3,838 1,430 Percentage of Total Attendance* 100% 68% 32% 12% Percentage of Out-of-Town Attendees 37% Unique Attendance 9,169 6,217 2,952 1,008 Average Size of Travel Party 3.3 3.1 3.9 4 Average Number of Visits Per Attendee 1.3 1.3 1.3 1.4 Median 1 1 1 1 Maximum (reported) 4 4 4 4 Percentage of Attendees with Multiple Visits 24% 25% 22% 28% Total Number of Audience Surveys Collected 439 351 88 43 * The percentages of local vs. out-of-town attendees were determined using the ZIP codes of Otronicon ticket purchasers, provided to the project researchers by the Orlando Science Center.
    [Show full text]
  • Encryption Made Simple for Lawyers
    Encryption Made Simple for Lawyers By David G. Ries, Esq. and John W. Simek Encryption is a topic that most attorneys don’t want to touch with a 10-foot pole, but it is becoming a more and more important part of security. Encryption is an electronic process to protect data. It has now reached the point where all attorneys should generally understand encryption, have it available for use when appropriate, and make informed decisions about when encryption should be used and when it is acceptable to avoid it. Fortunately, easy to use options are available today for encryption. Most attorneys will need technical assistance to install and set up encryption, but it’s generally easy from there. Encryption uses a formula to transform readable data into unreadable data. The formula is an algorithm (called a cipher), the readable data is called plaintext, and the unreadable data is called ciphertext. Decryption is the reverse process that uses a key to transform the encrypted data back to readable data. As long as the decryption key is protected, the data is unreadable and secure. While the technical details of how encryption works are complex, it is not necessary for attorneys who use encryption to understand them. Encryption can be used to protect data at rest (on desktops, laptops, servers or portable media) and data in motion (over wired or wireless networks and the Internet). Anyone who has access to encrypted data cannot read or use it unless they have access to the decryption key. Attorneys have ethical and legal duties to protect information relating to clients.
    [Show full text]
  • Magneto-Optical Drives, Flash Memory Devices, and Tape Drives Are Useful Supplements to Primary Storage
    13 0789729741 ch12 7/15/03 4:11 PM Page 663 CHAPTER 12 High-Capacity Removable Storage 13 0789729741 ch12 7/15/03 4:11 PM Page 664 664 Chapter 12 High-Capacity Removable Storage The Role of Removable-Media Drives Since the mid-1980s, the primary storage device used by computers has been the hard disk drive. However, for data backup, data transport between computers, and temporary storage, secondary storage devices such as high-capacity removable media drives, floptical drives, magneto-optical drives, flash memory devices, and tape drives are useful supplements to primary storage. Pure optical storage—such as CD-R, CD-RW, DVD-RAM, DVD+RW, DVD-RW, and others—is covered in Chapter 13, “Optical Storage.” These types of drives can also be used as a supplement to hard disk storage as well as for pri- mary storage. The options for purchasing removable devices vary. Some removable-media drives use media as small as a quarter or your index finger, whereas others use larger media up to 5 1/4''. Most popular removable- storage drives today have capacities that range from as little as 16MB to as much as 100GB or more. These drives offer fairly speedy performance and the capability to store anything from a few data files or less frequently used programs to complete hard disk images on a removable disk or tape. The next two sections examine the primary roles of these devices. Extra Storage As operating systems and applications continue to grow in size and features, more and more storage space is needed for these programs as well as for the data they create.
    [Show full text]