memory sticks/cards

system irrelevant topics

memory sticks/cards

Postby bonedome » 30 Oct 2009, 12:30

Hello
probably not the best place to ask but here goes, does anyone have a good understanding of how memory sticks/cards work, the reason I ask is I understand there is a finite amount of times you can read/write to/from one which is worrying as all my music is stored on them and I listen to the tracks quite often and don't want to suddenly find I can no longer access anything coz I've kind of worn it out.
Thanks
60Gb ps3 otheros awol. currently playing:bad company and farcry 2 again (seeing how far I can get using permadeath principle)update: regretfully Warren Clyde was involved in a shootout south of Pala and killed when he was hit by a land rover. RIP Warren
User avatar
bonedome
ydl guru
ydl guru
 
Posts: 755
Joined: 07 Aug 2008, 16:03
Location: uk

Re: memory sticks/cards

Postby billb » 30 Oct 2009, 19:08

Some good info is here:

http://en.wikipedia.org/wiki/Flash_memory

And it is only the "writing to" the cards you need to be concerned about -- see the section on "memory wear." So listen all you want! :mrgreen:
PS3 60GB [CECHA01], FW 3.15, YDL 6.2, Samsung T260HD @ 1920x1200
Powermac G4 1.25 GHz x2, 2 GB RAM, YDL 6.2
User avatar
billb
Site Admin
Site Admin
 
Posts: 5522
Joined: 24 May 2007, 20:30
Location: Eastern NC, USA

Re: memory sticks/cards

Postby bonedome » 01 Nov 2009, 00:03

Thanks billb
http://en.wikipedia.org/wiki/Flash_memory, most enlightening, now I know why they're called flash memory sticks and given they're saying between 10,000 and a million write/erase cycles I'm never going to kill any of mine.
I read another article that said a German computer magazine gave up trying to kill one after 2 million cycles
60Gb ps3 otheros awol. currently playing:bad company and farcry 2 again (seeing how far I can get using permadeath principle)update: regretfully Warren Clyde was involved in a shootout south of Pala and killed when he was hit by a land rover. RIP Warren
User avatar
bonedome
ydl guru
ydl guru
 
Posts: 755
Joined: 07 Aug 2008, 16:03
Location: uk

Re: memory sticks/cards

Postby aguilarojo » 23 Nov 2009, 05:03

Besides the convenience of storing digital data, keep in mind that nearly every commonly available USB device available actualizes or emphasizes storage capacity, read/write transmission speeds -- not well designed security. Few USB drives offer more than data encryption or password protection. Yet one of the most important aspects of memory sticks is that they are secure. However not too many people know or understand that the common definition of what many manufacturers consider a secure device is a function of the cost of the product in the sense of how much of the device they can sell -- not how well the device defends the privacy of the individual consumer. Therefore most devices allow the consumer to create passwords and/or allow for data to be encrypted. However nearly every device is capable of being disassembled such that the data on them are extracted even without a password. Unfortunately there are people out there with an inestimable amount of patience who will and can make such an effort. There is no way, of course, to guess, predict or identify beforehand who these people are. Worse, these thieves have been known to reconstruct the stolen device so well that the consumer/owner who originally bought it cannot identify that the data on the device was stolen/copied and the device itself rebuilt.

Note: I read a report discussing this and other procedures data thieves undergo. In this forum and thread, I intend only an introduction to this reality. If someone is interested in the article itself and related references I'll post an article similar to what I found interesting and that I researched awhile ago, within this thread or elsewhere in this Forum after someone here an expresses interest in exploring more details for themselves.

A person could try to employ a statistics game assessment to explore the risk of being the victim of such a theft of private data. Any reasonable estimation would reveal that the chance of such theft happening to any one individual is extremely small, unless one adds factors such as one's business, one's profession, one's location, etc. Regardless of how one proceeds in any analytical process stolen personal digital data usually stored on these devices is a serious threat because strategic personal and business related data can be extracted such that not only is one's identity at risk but also one's business and professional relationships, and plans as the thief analyzes whatever data resided on that stolen device. Let's not be innocent regarding the nature of such a thief or thieves, anyone or any group with such determination will also find the means to market/sell and profit from whatever information is gathered.

Considering this aspect of theft, I'm very sure that everyone is interested in avoiding being or becoming that individual whose ideas, strategies or other data which resided on the stolen device has been passed to the dark universe of cybercrime which markets such digital data. A victim of this kind of theft and violation never discovers the problem until one applies for credit, or employment and discovers that the information collected about oneself is invariably intermixed with whatever tidbits where originally stolen. Of course, by that time, the damage is so vast that undoing it may be impossible no matter how many lawyers one may have on retainer.

If one is like myself, and other's who visit here, namely an experienced IT professional who offers one's skills to various employers with a commitment to protect information regarding their data and systems, then keep in mind that the value of one's reputation remaining pristine, reliable -- together with technical savvy -- is more important today than almost any other time.

I believed it imperative to highlight for the YDL community the ramifications of these realities in which an IT pro finds himself/herself. It is clear that not everyone in the Forum is an IT pro who needs to consider the problems/challenges I'm discussing here. However, even an individual not involved in commercial or open source development should be concerned that private and commercial data float in cyberspace within criminal cybermarkets.

The first step an individual takes to battle threats to privacy and defend against potential liability (when other individual's and/or commercial entities could proceed against an individual because one should have been responsible taking professional precautions against digital theft) -- is prevention.

Instead of listing all the devices which are vulnerable because they can be deconstructed, have their data stolen and rebuilt -- it is easiest to list the one manufacturer which specifically designed and constructed their products to be impervious to the threats I described above. In the interest of full disclosure, I did technical testing of their device and I do utilize it for work I created/developed and useful technical references which requires strong defense. I've also, through my experience, become enabled how to explain and demonstrate technologies within the product for the benefit of others who wish to defend the value of their work. I want to make it clear, that I'm not selling the device, but rather merely presenting a collection of facts to interested persons in this Forum and thread which they may not have been aware of. The manufacturer whose USB devices have earned my utmost admiration is Iron Key.

Note: Different versions of Iron Key's USB devices may or may not be available for shipping outside the U.S. In order to use the full services embedded within every Iron Key, Windows is required; the manufacturer has developed an interface so that users of x86 Linux and Mac OS X can access the data stored on their Iron Key. There is no such interface for those using YDL.

Everything on the Earth has a purpose.
Every disease an herb to cure it.
And every person has a mission.
This is the Indian Theory of Existence.
-- Morning Dove, Salish (1888-1936)
User avatar
aguilarojo
ydl guru
ydl guru
 
Posts: 227
Joined: 06 May 2009, 14:50
Location: New York City


Return to Off Topic

Who is online

Users browsing this forum: No registered users and 2 guests

cron