What is RAID?

What is RAID?

What is RAID?
RAID commonly stands for Redundant Array of Inexpensive Disks. In a RAID two or more separate drives are put together to act like one. The benefits of this are to keep your data safe, to access your data faster, or some combination of the two. A RAID distributes data across volumes (or drives) in several different ways, depending on the level of RAID you choose.

A Short Overview of Spinning Disk and Solid State Drives
Spinning disk, mechanical hard drives, or Hard Disk Disks (HDDs) are typically chosen in situations where needs such as speed and performance fall second to cost. Due to physical limitations and the mechanical nature of many high speed moving parts contained in them, HDDs also have a relatively high failure rate compared to SSDs. RAID is meant to help alleviate both of these issues, depending on the RAID type you use. Typically, a mechanical hard drive has a 2.5% chance of failure each year of its operation. This has been proven by multiple reports and no specific manufacturer or model has a dramatic variation from that 2.5% rate. In short, if you value your data, you are going to need to implement some methodology to help protect it from drive failure.

SSDs are typically chosen in situations where speed and performance take a priority to cost considerations. As they have no moving parts, their ability to both write and read data on them is significantly faster than on a HDD (at least 8-10x faster.) And their failure rate is roughly .5% during each year of is operation, which significantly reduces the risk compared to a spinning HDD.

Because of the dramatic difference between the technologies of HDDs and SSDs, it’s important to state that some RAID implementations that are great for HDDs are not for SSDs, and vice versa.

What are the Different RAID Levels?
There are multiple levels of RAID and each has its own pros and cons regarding the balance of speed and security. RAID levels are denoted by different numerical values (RAID 0, RAID 1, etc.) but these are only for identification and do not signify number of disks, performance or any other metric.
RAID level chart

Volume (logical) vs. Disk/Drive (physical)
When discussing data storage, it is important to understand the difference between logical and physical.
When someone says,
“I have a 160GB hard drive in my computer.” They are referring to the physical disk/drive.

When that same person says,
“There are two drives that show up on my computer.” They are referring to the logical disk/drive, which is referred to as a volume.

When a physical drive is split logically into different volumes, this is called partitioning.

When discussing RAID technology, it is important to be aware of the differences between the logical and physical storage references.

Firmware
Firmware is essentially a small piece of software that resides on a piece of hardware to provide core functionality to the device as well as interface it with software and other pieces of hardware.
Firmware provides a basic set of operating instructions for the hardware device such as a hard drive.

It helps to think of firmware as a very basic OS (operating system) for a specific piece of hardware.

Drivers
Drivers, like firmware, provide a link from hardware to software.
Drivers reside on the host OS (Mac OS X, Windows XP, etc.) and give functionality to the hardware present.

For example, your digital camera may require special drivers to be installed on the OS in order for it to transfer photos.

It helps to think of firmware as a very basic OS (operating system) for a specific piece of hardware.

When Should I Use RAID?
RAID is extremely useful if uptime and availability are important to you or your business. Backups will help insure you from a catastrophic data loss. But, restoring large amounts of data, like when you experience a drive failure, can take many hours to perform. Those backups could be hours or days old, costing you all the data stored or changed since the last backup. RAID allows you to weather the failure of one or more drives without data loss and, in many cases, without any downtime.

RAID is also useful if you are having disk IO issues, where applications are waiting on the disk to perform tasks. Going with RAID will provide you additional throughput by allowing you to read and write data from multiple drives instead of a single drive. Additionally, if you go with hardware RAID, the hardware RAID card will include additional memory to be used as cache, reducing the strain put on the physical hardware and increase overall performance.

Note: We generally do not advise using a hardware RAID card for SSD volumes, as the additional cache isn’t necessary because of the speed of the SSDs themselves.

What Type of RAID Should I Use?
No RAID – Good if you are able to endure several hours of downtime and/or data loss due while you restore your site from backups.
RAID 0 – Good if data is unimportant and can be lost, but performance is critical (such as with cache).
RAID 1 – Good if you are looking to inexpensively gain additional data redundancy and/or read speeds. (This is a good base level for those looking to achieve high uptime and increase the performance of backups.)
RAID 5/6 – Good if you you have Web servers, high read environments, or extremely large storage arrays as a single object. This will perform worse than RAID 1 on writes. If your environment is write-heavy, or you don’t need more space than is allowed on a disk with RAID 1, RAID 1 is likely a more effective option.
RAID 10 – A good all-around solution that provides additional read and write speed as well as additional redundancy.

Software RAID vs Hardware RAID?

Software RAID
Software RAID is not always an included option in all of dedicated servers. This means there is NO cost for software RAID 1, and is highly recommended if you’re using local storage on a system. It is highly recommended that drives in a RAID array be of the same type and size.

Software-based RAID will leverage some of the system’s computing power to manage the RAID configuration. If you’re looking to maximize performance of a system, such with a RAID 5 or 6 configuration, it’s best to use a hardware-based RAID card when you’re using standard HDDs.

Hardware RAID
Hardware-based RAID requires a dedicated controller installed in the server. Steadfast engineers will be happy to provide you with recommendations regarding which hardware RAID care is best for you that is based on what RAID configuration you want to have. A hardware based RAID card does all the management of the RAID array(s), providing logical disks to the system with no overheard on the part of the system itself. Additionally, hardware RAID can provide many different types of RAID configurations simultaneously to the system. This includes providing a RAID 1 array for the boot and application drive and a RAID-5 array for the large storage array.

What Does RAID Not Do?

RAID does not equate to 100% uptime. Nothing can. RAID is another tool on in the toolbox meant to help minimize downtime and availability issues. There is still a risk of a RAID card failure, though that is significantly lower than a mechanical HDD drive failure.
RAID does not replace backups. Nothing can replace a well planned and frequently tested backup implementation!
RAID will not protect you against data corruption, human error, or security issues. While it can protect you against a drive failure, there are innumerable reasons for keeping backups. So do not take RAID as a replacement for backups. If you don’t have backups in place, you’re not ready to consider RAID as an option.
RAID does not necessarily allow you to dynamically increase the size of the array. If you need more disk space, you cannot simply add another drive to the array. You are likely going to have to start from scratch, rebuilding/reformatting the array. Luckily, Steadfast engineers are here to help you architect and execute whatever systems you need to keep your business running.
RAID isn’t always the best option for virtualization and high-availability failover. In those circumstances, you will want to look at SAN solutions, which Steadfast also provides.

Source: Steadfast , macsales , Wikipedia

 ACER Laptop Repair near me

 ASUS Laptop Repair near me

 DELL  Laptop Repair near me

 HP Laptop Repair near me

 Gateway Laptop Reapir near me

 Lenovo Laptop Repair near me

 SONY Laptop Repair near me

 TOSHIBA Laptop Repair near me

 MSI Laptop Repair near me

 Alienware Latpop Repair near me

 Fujitsu Laptop Repair near me

 MacBook Laptop Repair near me

 SAMSUNG Laptop Repair near me

 Republic of Gamers Laptop Repair near me

 Gaming Laptop Repair near me

Our Office

7545 Irvine Center Drive #200
Irvine, CA 92618, USA

Just around the corner from Irvine Spectrum

Contact Us

(949) 478-1502
Email Us

Office Hours

Mon-Fri: 9am – 7pm
Sat: 10am – 2pm
Sun: Closed

What is a VPN?

What is a VPN?

What is a VPN? How can you find the right VPN for your phone, and how much is it gonna cost you, if anything at all?

A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across a VPN may therefore benefit from the functionality, security, and management of the private network. Encryption is a common, although not an inherent, part of a VPN connection.

VPN overview
By Michel Bakni – This file was derived from:✦ Server symbol-blue.svg✦ Network cloud symbol.svg✦ Workstation symbol-Blue.svgDulaney, Emmett (2009) CompTIA Security+ Deluxe Study Guide, Wiley Publishing, Inc., p. 124 ISBN: 9780470372968., CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=84020759
VPN technology was developed to provide access to corporate applications and resources to remote or mobile users, and to branch offices. For security, the private network connection may be established using an encrypted layered tunneling protocol, and users may be required to pass various authentication methods to gain access to the VPN. In other applications, Internet users may secure their connections with a VPN to circumvent geo-blocking and censorship or to connect to proxy servers to protect personal identity and location to stay anonymous on the Internet. Some websites, however, block access to known IP addresses used by VPNs to prevent the circumvention of their geo-restrictions, and many VPN providers have been developing strategies to get around these blockades.
A VPN is created by establishing a virtual point-to-point connection through the use of dedicated circuits or with tunneling protocols over existing networks.[2] A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.
How does a VPN work?
How does a VPN work?
A virtual private network refers to a secure connection through which users can transmit and receive data over a public network. Connecting to the internet with your smartphone, tablet, or PC without a VPN exposes you to specific privacy and security risks. But VPNs offer online security and privacy.

Establishing a connection through a VPN first encrypts the packets of data to be sent even before the public network sees it. The encrypted data is transmitted to a VPN server, which in turn, forwards the data to the destination. The VPN server offers anonymity because it hides your IP address, with the transmission carrying its address instead. You can surf the internet from one country while your VPN indicates another location.

What Can a VPN Do and What Advantages Does It Provide?

In today’s technologically advanced world, network security is of primary importance. A VPN can secure your online activities from infiltrators and spies. It can even do much more. Here are some benefits of the VPN:

 Security Enhancement

The primary purpose of the VPN is to be able to establish a secure connection free of hackers and spies. It keeps your private information, such as passwords, IP address, and even your financial information from intruders.

Anonymity

With the VPN, you can surf the internet freely while protecting your identity from exposure. Anonymity is vital even as you surf through websites and web apps. There are certain online activities (not fraudulent ones) we usually don’t want to be traced back to us.

Remote Control and Access

You can use a VPN for a secure remote connection. It’s ideal for businesses because remote access enables their employees to work remotely.

IP Change

You can keep your IP hidden as you surf the internet. This also allows you to connect to certain websites where IP addresses from some locations are blocked.

 ACER Laptop Repair near me

 ASUS Laptop Repair near me

 DELL  Laptop Repair near me

 HP Laptop Repair near me

 Gateway Laptop Reapir near me

 Lenovo Laptop Repair near me

 SONY Laptop Repair near me

 TOSHIBA Laptop Repair near me

 MSI Laptop Repair near me

 Alienware Latpop Repair near me

 Fujitsu Laptop Repair near me

 MacBook Laptop Repair near me

 SAMSUNG Laptop Repair near me

 Republic of Gamers Laptop Repair near me

 Gaming Laptop Repair near me

Our Office

7545 Irvine Center Drive #200
Irvine, CA 92618, USA

Just around the corner from Irvine Spectrum

Contact Us

(949) 478-1502
Email Us

Office Hours

Mon-Fri: 9am – 7pm
Sat: 10am – 2pm
Sun: Closed

Why is SSD better for Data Backup?

Why is SSD better for Data Backup?

Why is SSD better for Data Backup?

If you need speedy local storage for lots of files (say, music or movies you carry around, or all those pics and videos you collect on your phone or camera), you may want to consider a portable solid-state drive (SSD) rather than a portable hard drive.
Once prohibitively expensive, SSDs of all stripes have been falling in price over the past few years, and external SSDs have emerged as alternatives to external hard drives, delivering as much as five times the speed and much greater durability. They have no metal platters to spin up, nor any read/write heads that need to travel to a specific point on a platter to find the file you need. And because of their lack of moving parts, portable SSDs are usually more compact, slimmer, and better suited to frequent travel and accidental drops than even the most thoroughly ruggedized hard drives.
best-ssd-external-storage-drive-for-data-backup
Unlike a hard drive, which stores data on spinning platters accessed by a moving magnetic head, a solid-state drive uses a collection of “persistent” flash memory cells to save data. These are similar to the silicon that makes up a computer’s RAM, but they retain your data when electrical power is cut off.
Since hard drives are mechanical devices that use mature technology, you can get relatively huge amounts of storage capacity for the money. But the same tech that makes hard drives a tantalizing value becomes their biggest liability when used on the go. If you drop the drive, you could damage the interior mechanism and make your data inaccessible. By contrast, if you jolt an SSD while you’re reading or writing data, there is no risk that your files will become corrupted and unreadable.
And, again, hard drives are slower because they have to physically access your data. Just how much faster is it to read data from flash cells than from particular points on spinning platters? Typical throughput for consumer hard drives is in the range of 100MBps to 200MBps. (One factor is spin rate—among external drives, 5,400rpm units are more common and more affordable than 7,200rpm.)
best-ssd-external-storage-drive-for-data-backup
External solid-state drives are, essentially, internal SSDs (the same kind that power laptops or live inside desktops) with an outer shell. As a result, external drives use one of two internal “bus types” that, in part, dictate their peak speed: Serial ATA (SATA), or PCI Express (PCIe). The latter is usually associated these days with Non-Volatile Memory Express (NVMe), a protocol that is optimized for the characteristics of SSDs and speeds up data transfers.
SATA-based drives tend to be a little cheaper; they’re also slower, but just fine for most users’ everyday applications. SATA-based SSDs typically top out at around 500MBps for peak read and write speeds, just a bit below the ceiling of the USB 3.0 interface. (Much more about that in a moment.) However, if you’re going to be transferring large files such as videos often, you may well want to spring for a PCIe/NVMe-based external SSD. That also ties in with the port you’ll plug your SSD into.

Sellers of portable SSDs don’t always indicate if the drive is SATA- or PCIe-based. However, checking the specs can be a giveaway. If the drive tops out at sequential read and write speeds between 400MBps and 550MBps, it’s very likely SATA-based. Speeds of 800MBps or higher indicate a PCIe-based drive.

Here are three key things to look out for when shopping for an external SSD:

COST PER GIGABYTE. The way to calculate relative value on drives like these is to perform some simple math and figure the cost per gigabyte based on the price of a given drive on the day you’re shopping. Because SSD pricing fluctuates all the time, relative value does, too.

RUGGEDIZATION. The degree of ruggedness does vary from drive to drive, with drives like the ADATA SE800 leading the field at the moment among mainstream-price external SSDs. IP68 certification is a good spec to look for if you’re serious about waterproof and dustproof drives.

CARRY WEIGHT. Most SSDs weigh a negligible couple of ounces. I like the carabiner retention loop of SanDisk’s Extreme family of drives, as many of these drives are small and light enough that losing them is an easy and expensive mistake.

If none of the drives we’ve selected for this roundup sounds appealing to you (or you already own an internal SSD that’s hanging around the house or office), there’s one more option available: SSD enclosures. These are plastic or metal housings into which you can put your own SATA 2.5-inch or M.2 solid-state drive to take with you on the go.

Enclosures come in 2.5-inch form factors (into which you would put a 2.5-inch SATA SSD) or M.2 ones. The stick-style M.2 SSD is much smaller and lighter, but know that M.2 drives themselves come in both SATA and PCIe bus flavors. You need to be sure your enclosure supports the kind of M.2 drive you’re putting in it.

Though there are exceptions, most enclosures are not as durable or rugged as major-maker portable SSDs are. This can be a drawback for those who take their SSDs into dangerous environments (think wildlife photographers or first responders), so be sure that before you go this route, you know what your drive will be exposed to. Your data could be at greater risk for corruption than it would be in an SSD purpose-built to withstand the elements.

Source: pcmag.com

 ACER Laptop Repair near me

 ASUS Laptop Repair near me

 DELL  Laptop Repair near me

 HP Laptop Repair near me

 Gateway Laptop Reapir near me

 Lenovo Laptop Repair near me

 SONY Laptop Repair near me

 TOSHIBA Laptop Repair near me

 MSI Laptop Repair near me

 Alienware Latpop Repair near me

 Fujitsu Laptop Repair near me

 MacBook Laptop Repair near me

 SAMSUNG Laptop Repair near me

 Republic of Gamers Laptop Repair near me

 Gaming Laptop Repair near me

Our Office

7545 Irvine Center Drive #200
Irvine, CA 92618, USA

Just around the corner from Irvine Spectrum

Contact Us

(949) 478-1502
Email Us

Office Hours

Mon-Fri: 9am – 7pm
Sat: 10am – 2pm
Sun: Closed

Managing risk with the NASA Risk Matrix

Managing risk with the NASA Risk Matrix

Managing risk with the NASA Risk Matrix

By Anne-Laure Le Cunff • Reading time: 9 minutes

“It’s not rocket science!” people often say. Well, sometimes, projects can be so complex, making the right decision does feel akin to rocket science. Who better to turn to than one of the biggest space agencies in the world to learn how to manage risk? There are few organizations working on projects as complex as the ones NASA deals with.

NASA is known to have a process for everything. They use a standardized test to measure creativity, have detailed checklists for each project, and have developed what they call the Risk Matrix to identify and manage risk.

Risk Matrix
Uncertainty raises our stress levels, which makes us more prone to mistakes. Instead of trusting our brains, a matrix is a simple and powerful tool which offers scaffolding for decision-making in complex situations. For instance, the Eisenhower matrix of prioritisation helps decide what to work on next based on the importance and urgency of an action item. The NASA Risk Matrix—also called risk scorecard—helps determine the level of risk associated with a particular situation, and decide how to react.

In their own words, the NASA Risk Matrix is “a graphical representation of the likelihood and consequence scores of a risk.” The Guidelines for Risk Management document outlines how to use the Risk Matrix for risk management. But first, you need to identify and clearly state a potential risk.

Frederick Wilcox.

“Progress always involves risks. You can’t steal second base and keep your foot on first.”

How to clearly state a risk according to NASA

NASA recommends to keep it factual and to stay away from trying to provide a solution. At this stage, your only goal is to state the risk in an easy-to-understand way, using the following template:
Given that [CONDITION], there is a possibility of [DEPARTURE] adversely impacting [ASSET], thereby leading to [CONSEQUENCE].

Condition.
The current key fact-based situation that is causing you concern, uneasiness, doubt, or anxiety.

Departure.
The undesired potential change from the original plan, which is made more likely as a result of the condition you identified.

Asset.
The project affected by the risk you identified.
Consequence. The potential negative impact the risk can have on the asset.

For instance, let’s say you are creating an ebook, and working with an illustrator to design some graphics to go along the copy. The illustrator gets sick, unable to work for a week, and you need to communicate the risk of a delayed launch to the rest of the team:
“Given that the illustrator is still on sick leave, there is a possibility of a delay in the illustration work adversely impacting the ebook design process, thereby leading to pushing back the ebook launch by at least one week.”
Of course, you don’t need to communicate this formally in all uncertain situations, but making sure all the key information—condition, departure, asset, consequence—are included in your risk statement will make it easier for people you collaborate with to understand the risk you worry about.

In addition to the risk statement, it is also helpful to include the key circumstances around the risk, the contributing factors, and related information such as what, where, when, how, and why. NASA calls all this additional information the context statement. “The context statement should include only facts, not assumptions. Ensure that no new risks are introduced here,” they explain.

What is missing from the risk statement and the context statement is a risk quantification: how likely is the consequence of the risk? For this, we need to turn to the NASA Risk Matrix.

Using the NASA Risk Matrix to quantify risk

There are two main factors impacting any level of risk: how likely the potential departure is to happen (the likelihood) and negative the impact of the departure from the original plan would be (the consequence). The NASA Risk Matrix uses these two factors to quantify the level of risk.
Risk Matrix

On the y axis, you can see the likelihood, which is rated from 1 at the bottom to 5 at the top. On the x axis, we measure the consequence, which is also rated from 1 on the left to 5 on the right. So how do you rate both of these factors exactly?

For the likelihood score, you estimate how certain you are the risk will materialise.

  1. Not likely (under 20% probability of happening)
  2. Not very likely (between 20% and 40% probability)
  3. Likely (between 40% and 60%)
  4. Highly likely (between 60% and 80%)
  5. Near certainty (over 80% probability)

Then, for the consequence score, you use the consequence scorecard:

The NASA Consequence Scorecard
Obviously, if you don’t work at NASA and need to evaluate risk in daily life, many of these criteria will be over the top. Most of the decisions we make at work don’t involve evaluating the impact of a potential risk on human safety—even though many manual workers do need to consider that criterion on a daily basis.

The consequence scorecard is great to understand the principles behind determining a consequence score. Once you are familiar with it, you can decide on a score based on your expertise and your general knowledge of the project.

Okay, let’s go back to our ebook example:

“Given that the illustrator is still on sick leave, there is a possibility of a delay in the illustration work adversely impacting the ebook design process, thereby leading to pushing back the ebook launch by at least one week.”
First, what is the likelihood of the illustration work being delayed? Well, the illustrator is on sick leave at the moment. Except if they miraculously feel better tomorrow, the illustration work being delayed seems near certain. But they may feel better quicker than expected, so let’s say it’s very likely the illustration work will be delayed, which would be a likelihood score of 4.

Second, what is the consequence score? Delaying the launch by a week because of the illustration work seems to fit with “Delay on some tasks minimally impacting overall schedule” in our consequence scorecard. So that would be a consequence score of 3.

Pro tip: If several aspects of the project are likely to be impacted, only keep the highest consequence score. For example if you have a minor impact on cost (2) and a major slip in overall schedule (4), the consequence score would be 4.
Now, let’s go back to our matrix and see what a likelihood score of 4 and a consequence score of 3 give us in terms of overall risk score.
Risk Matrix
It may have not seemed obvious from the initial risk statement, but the illustration work being delayed actually constitutes a high risk situation for your ebook launch. The next step is to mitigate the risk by considering strategies to lower either the likelihood, the consequence, or both.

Mitigating risk based on a specific NASA risk score

We have our risk score. What to do with it? Here is what NASA recommends to do in each situation:

Lowest risk. This is the dark green area in the matrix. If your risk scores fall in this area, put the risks on a watch list and re-assess them regularly. “There is no specific requirement to generate a mitigation plan. The only requirement is to identify and track the risk drivers to ensure the risk remains tolerable,” says NASA.

Low risk. Perform extra research to better understand the risk. Write a risk mitigation plan which captures the actions to be taken to reduce the likelihood of the risk happening. Share it with your team so everyone is aware of the plan should the risk happen.

Medium risk. In addition to writing and sharing the risk mitigation plan, perform continuous risk assessments, and assign adequate resources.

High risk. Risks that have a high score need to be communicated to the NASA Independent Verification and Validation department. For you, it means high risk situations need to be escalated internally. Don’t keep these just to yourself or your immediate team. Let all relevant stakeholders know about the risk.

Highest risk. At this level of risk, you and your team may consider considerably changing the original plan. This decision may involve significant costs—in terms of schedule, performance, budget—that may be extremely difficult or even impossible to avoid. Knowing that you are dealing with the highest risk level will help in making hard but necessary choices.

It’s important to note that a mitigation plan can be to not mitigate the risk. For instance, in the case of our ebook, a mitigation strategy could be to hire another illustrator to do the job and launch on time. However, if hiring a new designer significantly impacts the overall production cost of the ebook, and results in much lower margins, it may be a smart decision to just delay the launch.

Again, you will probably not need to follow such a formal process every time you evaluate a risk, but the NASA Risk Matrix is a good mental model to use when facing uncertainty. Study it, make it yours, and use its general principles in complex situations.

Source: NESS LABS

 ACER Laptop Repair near me

 ASUS Laptop Repair near me

 DELL  Laptop Repair near me

 HP Laptop Repair near me

 Gateway Laptop Reapir near me

 Lenovo Laptop Repair near me

 SONY Laptop Repair near me

 TOSHIBA Laptop Repair near me

 MSI Laptop Repair near me

 Alienware Latpop Repair near me

 Fujitsu Laptop Repair near me

 MacBook Laptop Repair near me

 SAMSUNG Laptop Repair near me

 Republic of Gamers Laptop Repair near me

 Gaming Laptop Repair near me

Our Office

7545 Irvine Center Drive #200
Irvine, CA 92618, USA

Just around the corner from Irvine Spectrum

Contact Us

(949) 478-1502
Email Us

Office Hours

Mon-Fri: 9am – 7pm
Sat: 10am – 2pm
Sun: Closed

Who invented the hard drive?

Who invented the hard drive?

Who invented the hard drive?

Like many innovations in 20th-century computing, hard drives were invented at IBM as a way to give computers a rapidly accessible “random-access” memory. The trouble with other computer memory devices, like punched cards and reels of magnetic tape, is that they can only be accessed serially (in order, from beginning to end), so if the bit of data you want to retrieve is somewhere in the middle of your tape, you have to read or scan through the entire thing, fairly slowly, to find the thing you want. Everything is much faster with a hard drive, which can move its read-write head very quickly from one part of the disk to another; any part of the disk can be accessed as easily as any other part. The first hard drive was developed by IBM’s Reynold B. Johnson and announced on September 4, 1956 as the IBM 350 Disk Storage Unit.

IBM engineers also pioneered floppy disks, which were removable magnetic disks packed in robust plastic cases (originally 20cm or 8in in diameter and wrapped in flexible plastic sleeves; later 133mm or 5.25in in diameter and packed in tough plastic cases). Developed by IBM’s Warren Dalziel in 1967 and first sold in 1971, they became hugely popular in microcomputers (the forerunners of PCs) in the late 1970s and early 1980s, but are now obsolete. With a storage capacity of only 1.44MB, they’ve been completely superseded by USB flash “drives” that offer hundreds or thousands of times more memory in a tiny plastic stick a fraction the size.

Artwork: The original hard drive. IBM engineers developed this groundbreaking magnetic memory (which, in IBM-speak, was called the DASD, pronounced “das-dee”), through a process of continuous improvement from the early 1950s onward and were awarded their final patent on the design in 1970. You can see that the basic read-write mechanism is exactly the same as in today’s drives: there are multiple platters (light blue) made up of individual sectors (dark blue) that can be written to or read from by multiple read-write heads (red) mounted on the ends of sliding actuators (orange). The platters are spun by a pulley and motor (green), while the actuators are driven by gears and a motor (yellow). The main difference between this drive and a modern one is the amazing amount of intricate machinery this one contained (which you can read all about in the original patent). From US Patent 3,503,060: Direct access magnetic disc storage device by William Goddard and John Lynott, IBM Corporation, March 24, 1970, courtesy of US Patent and Trademark Office, with colors added for clarity.

ibm-dasd-hard-drive-patent

 ACER Laptop Repair near me

 ASUS Laptop Repair near me

 DELL  Laptop Repair near me

 HP Laptop Repair near me

 Gateway Laptop Reapir near me

 Lenovo Laptop Repair near me

 SONY Laptop Repair near me

 TOSHIBA Laptop Repair near me

 MSI Laptop Repair near me

 Alienware Latpop Repair near me

 Fujitsu Laptop Repair near me

 MacBook Laptop Repair near me

 SAMSUNG Laptop Repair near me

 Republic of Gamers Laptop Repair near me

 Gaming Laptop Repair near me

Our Office

7545 Irvine Center Drive #200
Irvine, CA 92618, USA

Just around the corner from Irvine Spectrum

Contact Us

(949) 478-1502
Email Us

Office Hours

Mon-Fri: 8:30 am - 5 pm
Sat & Sun: Closed

What Is Thunderbolt 3?

What Is Thunderbolt 3?

What Is Thunderbolt 3?
Thunderbolt 3 ports look exactly the same as USB-C ports, and indeed, the connector is physically the same from a plug-in perspective. In many cases, they can do everything that a USB-C port can, except much faster. Indeed, Thunderbolt 3 is a superset of USB-C; you can plug a USB-C-only device into a Thunderbolt 3 port on a computer, and it’ll work just fine.

Thunderbolt 3 lets you transfer data at up to 40Gbps. That’s twice as fast as the 20Gbps maximum throughput speed of the fastest USB-C ports, and four times as fast as the original Thunderbolt interface.

What Is Thunderbolt 3?
Not only can a Thunderbolt 3 port help you transfer data to and from a compliant external hard drive more quickly than a plain USB-C port, but it can also unlock additional capabilities for connecting external monitors and expansion docks. A USB-C port with support for Thunderbolt 3 means that a single cable is all you need to push power and transfer a large amount of information (such as video data for two or more 60Hz 4K external monitors) to and from a computer.
Some companies have been quick to take advantage of these capabilities. Apple was among the earliest adopters of Thunderbolt 3 for computers, and now these ports are available on all late-model Mac desktops and laptops. Video-output capabilities depend on the system, but some iMacs can now support dual 6K Apple Pro Display XDR external monitors connected via Thunderbolt 3 cables.
More and more Windows PCs and peripherals are now coming with Thunderbolt 3 support, as well. You’ll find Thunderbolt 3 ports on many late-model premium ultraportable laptops, as well as a growing selection of external hard drives and expansion docks.

As noted above, Thunderbolt 3 ports on PCs are backward-compatible with USB-C devices. So, if you’ve got some peripherals that support Thunderbolt 3 and some that support only USB-C, they should both be able to work just fine on a Thunderbolt 3 port, albeit (in the case of the USB-C peripherals) limited by the slower speeds and capabilities of the USB-only device.

Source: PCMag

 ACER Laptop Repair near me

 ASUS Laptop Repair near me

 DELL  Laptop Repair near me

 HP Laptop Repair near me

 Gateway Laptop Reapir near me

 Lenovo Laptop Repair near me

 SONY Laptop Repair near me

 TOSHIBA Laptop Repair near me

 MSI Laptop Repair near me

 Alienware Latpop Repair near me

 Fujitsu Laptop Repair near me

 MacBook Laptop Repair near me

 SAMSUNG Laptop Repair near me

 Republic of Gamers Laptop Repair near me

 Gaming Laptop Repair near me

Our Office

7545 Irvine Center Drive #200
Irvine, CA 92618, USA

Just around the corner from Irvine Spectrum

Contact Us

(949) 478-1502
Email Us

Office Hours

Mon-Fri: 8:30 am - 5 pm
Sat & Sun: Closed