background preloader

Secure Digital

Secure Digital
Secure Digital (SD) is a nonvolatile memory card used extensively in portable devices, such as mobile phones, digital cameras, GPS navigation devices, handheld consoles, and tablet computers. The Secure Digital standard was introduced in August 1999 as an evolutionary improvement over MultiMediaCards (MMC). The Secure Digital standard is maintained by the SD Association (SDA). SD technologies have been implemented in more than 400 brands across dozens of product categories and more than 8,000 models.[1] The Secure Digital format includes four card families available in three different form factors. The four families are the original Standard-Capacity (SDSC), the High-Capacity (SDHC), the eXtended-Capacity (SDXC), and the SDIO, which combines input/output functions with data storage.[2][3][4] The three form factors are the original size, the mini size, and the micro size. Overview[edit] SD[edit] SDHC[edit] SDXC[edit] exFAT filesystem[edit] Ultra High Speed bus[edit] SDIO[edit] Speeds[edit]

http://en.wikipedia.org/wiki/Secure_Digital

Related:  Online Privacy ToolszgreigsPeriferiche, PeripheralDatoriem

How to Avoid Identity Theft Identity Theft is one of the worst things that can happen to your personal finances. When someone assumes your identity they can ruin your credit score and destroy your financial reputation for years. Identity theft is a growing crime, but there are some important measures you can take to avoid having your identity stolen. How to Avoid Identity Theft Online Shredding statements is always a good idea Three steps to properly protect your personal data With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor US District Court ruling on fifth amendment password protection rights, it is time you actually encrypt your data properly. Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company's crown jewels at the local coffee shop. More in the Investigator's Toolkit: Instead—as with many successful security designs—you can set up a layered approach to protecting your data with encryption.

Regin, new computer spying bug, discovered by Symantec 23 November 2014Last updated at 13:32 ET Symantec researchers likened the bug to Stuxnet, a computer worm that targeted Iran's nuclear program A leading computer security company says it has discovered one of the most sophisticated pieces of malicious software ever seen. Still trust DuckDuckGo? In my recent blog post PRISM - Where do we go from here? I made the point that using services such as DuckDuckGo on the presumption that they are safe, is a dangerous thing to do and explained why. I have also been explaining to people on Twitter that using DuckDuckGo on the assumption that their searches will be private was a misunderstanding of who DuckDuckGo are and what they do and pointed them to the previously mentioned blog post.

Google tracks you. We don't. An illustrated guide. DuckDuckGo does not collect or share personal information. That is our privacy policy in a nutshell. The rest of this page tries to explain why you should care. Last updated on 04/11/12. Removed ", which gets sent to my personal email." in last paragraph as our feedback is now handled by multiple team members via desk.com. Before that, on 03/11/12. Microsoft unveils Windows 10 system with Start Menu 30 September 2014Last updated at 14:56 ET By Leo Kelion Technology desk editor BBC's Richard Taylor: "Windows 10 features the all-important Start button which people know and like very much" Microsoft has disclosed the first details of Windows 10 - its next operating system (OS). The name is a surprise, bearing in mind it represents a jump from the last version - Windows 8. The software will run on a wide range of devices, from phones and tablets to PCs and Xbox games consoles, with applications sold from a single store. It also marks the return of the Start Menu, which had been removed from Windows 8.

Find Your Own Private Internet With Freenet PC World – by Alex Wawro Anonymous peer-to-peer communication on the Internet isn’t just a handy tool for privacy enthusiasts; it’s critical for preserving free speech in the digital world. Anonymous file-sharing services like BitTorrent are legion, but their utility is limited—you can share only files—and their reputations are unfairly tarnished by people who use them to share media illegally. If you’re looking for a highly anonymous peer-to-peer network with websites, forums, and more, look no farther than the Free Network, one of the best-kept secrets in anonymous communication. Here’s how it works: Freenet is an anonymous peer-to-peer data-sharing network similar to BitTorrent, but with one key difference: All uploaded data is assigned a unique key, sliced up into small, encrypted chunks and scattered across different computers on the network.

Sony tape smashes storage record 5 May 2014Last updated at 08:33 ET Storage tapes like these are used by many firms to keep data for long periods Sony has developed a new storage tape that is able to hold up to 185 terabytes (TB) of data per cartridge. Created with the help of IBM, Sony's technology allows for tapes that can store the equivalent of 3,700 Blu-ray discs. The tape hold 148 gigabits (Gb) per square inch - beating a record set in 2010 more than five times over. 'Uncrackable' codes set for step up 4 September 2013Last updated at 13:09 ET By Melissa Hogenboom Science reporter, BBC News Quantum cryptography is a way to share secret digital keys A system that allows electronic messages to be sent with complete secrecy could be on the verge of expanding beyond niche applications. A team of British scientists has discovered a way to build communications networks with quantum cryptography at a larger scale than ever before. Quantum cryptography has the potential to transform the way sensitive data is protected. Details appear in Nature journal.

How to Use Tags to Organize Evernote The power of Evernote is that there is no right or wrong way to use it. From audio notes to websites, it’s the perfect place to capture and store the content you need to be productive. The question we get from many users is how to organize the material they bring into Evernote. From notebooks to tags, you have the option to decide your own personal classification system. That taxonomy can be as simple or complex as you need, but it’s remarkable how powerful Evernote becomes when you find the right system that works. Yesterday, we discovered a post on Medium that provides a clear example of how one user has successfully structured his Evernote account to help make the most impact in his work with an emphasis on tags.

Peripheral - Wikipedia A peripheral is "an ancillary device used to put information into and get information out of the computer".[1] There are three different types of peripherals: input devices, which interact with or send data from the user to the computer (mice, keyboards, etc.), output devices, which provide output to the user from the computer (monitors, printers, etc.), and input/output devices that perform both functions. Touchscreens are an example that combines different devices into a single hardware component that can be used both as an input and output device. See also[edit]

Related: