Tag: storage

Ask a question

Join Now or Sign In to ask a question.
LolaBelle
2 weeks ago

Obviously the form factor is different, but I have a USB adaptor that I use with a 32GB SD card, so that both it and a 32GB Flash drive are not only...

Tags: flash drive, sd card, usb |
4 Answers |
LolaBelle
3 weeks ago

I have an SD card that stopped being recognized. I tried it on 2 different laptops to make sure it wasn’t a problem with the card reader...

4 Answers |
owen
3 weeks ago

NASA is reformatting the memory of the Mars rover Opportunity in a bid to improve stability and performance. How does a reformat accomplish this with flash...

1 Answer |
mandril
3 weeks ago

Why is there always a discrepancy between the stated size of a HDD and the size I see when I go into My Computer on Windows and check the size there?...

1 Answer |
TheCount
5 weeks ago

Is there a way I can save files from my Nexus 7 tablet direct to a USB flash drive?

catamount
5 weeks ago

I need to format an SD card to FAT32, and was wondering if I can do that with my Chromebook. It has an option to “format device” but it doesn’t allow you to...

2 Answers |
rcook12
5 weeks ago

What is SED encryption? I saw it in a hard drive description, but I’ve never heard of it before.

2 Answers |
MGaluzzi
5 weeks ago

I understand that SATA III could be faster with a SSD, but is a 7200rpm HDD fast enough for the increased transfer rate of SATA III to offer any advantage...

Tags: HDD, SATA II, SATA III, SSD |
2 Answers |
grady9
6 weeks ago
No description for the question.
2 Answers |
April Higgins Behrnes
6 weeks ago

I purchased this laptop from a pawn shop and it has a file in it that I can't find, that is taking up all my space...What can I do??

2 Answers |
Twitter is investing US$10 million in a lab at the Massachusetts Institute of Technology to build platforms for online collaboration by people on civic and political issues.
The cybersecurity profession and its role in keeping the Internet safe is lost among young adults, who are therefore less likely to pursue a career in the field, a survey shows.
Don't think for an instant that once POS malware is defeated the first time, it's gone for good. These attacks have a habit of resurrecting themselves, with a lot of help from criminal hackers.
Researchers have discovered hackers trying to exploit the Shellshock Bash vulnerability to compromise network attached storage devices in universities in the U.S., Japan and Korea.
As an increasing number of IT organizations become interested in enabling bring-your-own-PC programs for their employees, an old idea may be gaining fresh adherents: desktop virtualization.
AppliedMicro has announced a new family of 64-bit ARM chips that could disrupt the stodgy but sizeable market for components used in network routers, printers and other "embedded" equipment.
Apple TV got a software update last week that didn't exactly blow our hair back. Here are five suggestions for Apple to make the next Apple TV update a real upgrade.
McAfee issues its annual list of the most dangerous people to search for online -- as in, you might get a virus if you do.
Without a carbon tax or anything that penalizes fossil fuel consumption, the federal government has little ability to influence how much energy a data center uses. But it's trying.
The Thread Group has invited more companies to join its effort at harmonizing the "Internet of things" in consumers' homes, but it still faces a tangled industry with competing and overlapping technologies.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

White Papers & Webcasts

See more White Papers | Webcasts

randomness