DESKTOP

Data Storage Considerations (Part 2)

9/17/2012 9:01:15 AM

Using a small amount of solid state memory, USB keys can plug into the USB ports present on virtually any desktop, laptop, and even some tablets to act as an additional data storage drive. Transferring files between devices becomes as simple as dragging and dropping, and almost seamlessly fast. Their chunky physical presence means that they're robust in transit, and their large storage capacity means they can accommodate entire projects, not just one or two files.

A USB key with several gigabytes of storage space - more than enough for any school project, certainly - can set you back as little as $8, although anyone feeling extravagant can splash out on vastly larger models for only a few pounds more.

USB keys are, of course, not a good place to store the most up-to-date version of your work. Not only are they easy to lose or accidentally damage, they're also very easy for someone to slip away with. Assuming you don't want someone handing in your work as their own, keeping it on a USB key is a bad way to stop that happening.

Description: USB keys

For that reason, you should be careful to keep regular backups of any work stored on USB Keys. More than a few students have, in the past, fallen foul of a temperamental USB Key. Remember - they're designed for transport and portability, not primary storage.

The primary benefit of USB keys is their portability, although there's a fair argument to make that this is being supplanted by cloud storage. Even so, given that floppy drives (and their spiritual successors, Zip disks) have both been consigned to the dustbin of history, and optical media never quite managed to reach the same level of convenience, you'll need something to carry your files around.

The solid-state USB memory key is easily the front-runner in this category, and an absolute must for transferring schoolwork or even entire university projects from A to B. As an accessory, it's hard to overstate their usefulness, too. If there's a file you want to give to a friend, or take off an existing PC, or even transfer when the Internet is unavailable, a USB key is what lets you do it. Even if you barely use it, you'll be better off knowing that it's there.

Description: USB

As you might expect, USB keys by popular memory manufacturer brands like Kingston and OCZ are likely to cost you the most, though unlike with, say, monitors, these good-quality brands are unlikely to be noticeably better - the casing might be more modest or a little flimsier with a generic manufacturer, but the internal differences between those and the big-name brands will be negligible; you can safely go for the cheaper option.

It is possible to get USB keys which come with their own security encryption, up to and including access-restricting keypads stored on the device. If you're worried that your work might fall into the wrong hands, such hardware locks make a good choice, and are worth considering.

Cloud Storage

One technology that will arguably make everything in this list redundant one day, cloud storage allows users to upload files and documents to the Internet so that they can be accessed from any web-capable device. You get the benefit of industrial-grade backups, and the convenience of not having to remember to take anything out with you - it's all just there, on the Internet, whenever you need it.

Although a similar effect can be achieved by uploading files to an FTP server or emailing them to yourself, cloud storage also allows you to share documents with others and maintain a central storage area between multiple devices. Such features make it a good tool for collaboration, which is especially useful for group projects and co-ordination.

Of course, cloud storage isn't a magic bullet, and there are a lot of factors which explain why it hasn't instantly supplanted all other forms of storage.

For example, security is not particularly good. The fact that the data is stored online doesn't just mean you can get at it whenever you like - it means everyone else has the chance to as well. Should someone steal, bluff, or otherwise guess your password, they'll be able to get at everything stored in the cloud. Similarly, you have no choice but to delegate the responsibility for protecting it - if the service gets hacked, your data will be at risk through no fault of your own, and many people find that uncomfortable.

Description: Cloud Storage

Worse still is what happens if the Internet goes down. You may have local copies of your work on one computer, but if the site or your Internet connection fails when you need the data, there's nothing else you can do to retrieve it. The fact is that no matter how consistent the service, it's a bad idea to rely on access to it in the most critical circumstances. As 02's recent services topple reminds us, you never know when your Internet connection might stop working.

Finally, the limitations of upload speeds on most Internet Service Provides means that regardless of how much space a cloud storage service offers you, your Internet connection only has the capacity to get a certain amount of data into the cloud at any one time, and it's vastly less than what you could transfer to a USB key or external hard drive in the same period of time.

Even so, the cloud is a good place to store long-term backups - if your house goes down in flames, such a disaster could take out both a PC and a backup drive somewhere else in the same house, but the Internet isn't ever going to burn down!

Noted cloud services include Dropbox, Google Drive, iCIoud and Windows Live SkyDrive. Each have varying feature sets and they're all provided free at the most basic level, so don't delay in trying one out!

Description: Dropbox, Google Drive, iCIoud and Windows Live SkyDrive

 

Other  
  •  Asus Ultrabook N56VM - In More Ways Than One
  •  Asus ZenBook Prime UX21A - Small, Light And Extremely Sleek
  •  Microsoft Windows Server 2003 : Maintaining the Operating System - Administering Software Licenses
  •  Monitoring Microsoft Windows Server 2003 : Using the WMI Event Logging Provider
  •  Windows 7 : Add the Built-in Administrator Account to the Login Screen, Stop Entering Password on Lockout, Using Credential Manager
  •  Windows 7 : Sharing and Securing with User Accounts - Creating a Password Reset Disk, Running Programs as Administrator
  •  A Cost Effective Printer?
  •  Get More Out Of Windows 7 (Part 4)
  •  Get More Out Of Windows 7 (Part 3)
  •  Get More Out Of Windows 7 (Part 2)
  •  Get More Out Of Windows 7 (Part 1)
  •  MSI R7970 Lightning - A Powerful Card with Some Great New Ideas
  •  Transcend's aXe RAM Does The Trick
  •  Information Station For Data Storage and Transfer Devices
  •  Konica Minolta Magicolor 3730DN
  •  Windows Server 2003 : Building an Active Directory Structure (part 4) - Managing Users and Groups - Using LDAP to create users, Delegation
  •  Windows Server 2003 : Building an Active Directory Structure (part 3) - Managing Users and Groups - Creating users and groups
  •  Windows Server 2003 : Building an Active Directory Structure (part 2)
  •  Windows Server 2003 : Building an Active Directory Structure (part 1) - The First Domain
  •  Windows Server 2003 : Active Directory Objects and Concepts
  •  
    Top 10
    Windows Vista : Installing and Running Applications - Launching Applications
    Windows Vista : Installing and Running Applications - Applications and the Registry, Understanding Application Compatibility
    Windows Vista : Installing and Running Applications - Practicing Safe Setups
    Windows Server 2003 : Domain Name System - Command-Line Utilities
    Microsoft .NET : Design Principles and Patterns - From Principles to Patterns (part 2)
    Microsoft .NET : Design Principles and Patterns - From Principles to Patterns (part 1)
    Brother MFC-J4510DW - An Innovative All-In-One A3 Printer
    Computer Planet I7 Extreme Gaming PC
    All We Need To Know About Green Computing (Part 4)
    All We Need To Know About Green Computing (Part 3)
    Most View
    The End Of The Beginning Or The Beginning Of The End? (Part 3)
    The Future Revealed (Part 1)
    Instagram Substitutes On Android (Part 2) - Cinemagram, Clik, Steam Mobile & TeamViewer
    Ipad : Using iTap VNC
    Windows Vista : Performing Local PC Administration (part 1) - Working with workstation administration tools
    Next – Gen Broadband – Optimizing Your Current Broadband Connection (Part 4)
    Designing a Windows Server 2008 R2 Active Directory : Understanding the Federated Forests Design Model
    ASROCK FM2A75 Pro4-M - Limited Performance
    Programming the iPhone : Standard Control Types (part 1) - Buttons
    Linux - The Operating System With A Pure Heart (Part 2)
    Password Hacks (Part 2) - Criminal activity
    Personalizing Windows 7 (part 3) - Choosing and Configuring Your Screensaver
    The best of the web (Part 3) - 3LiveShop, Proust, Grooveshark, OnLive, Open Yale Courses, Instapaper & 8 tracks
    Exchange Server 2010 : Operating Without Traditional Point-in-Time Backups
    Windows Vista : Maintaining Windows Mail
    DirectX 10 : The 2D Resurgence - Sprite Animation
    Programming Windows Services with Microsoft Visual Basic 2008 : Extending the WMI Implementation
    How to buy: SSDs for 2012
    Toshiba, Asus launch new laptops
    Buyer’s Guide - Keyboard and mice (Part 4) - GIGABYTE Aire M1, Gyration Air Mouse Elite, IOGEAR Phaser GME422RW6