Seeking Alpha

carawmorris'  Instablog

Send Message
Cara W Morris is the Marketing Manager at NewSoftwares Inc., a Beaverton based data protection and Information Security Company that provides and Secure USB and external storage media blocking software.
My company:
My blog:
Folder Lock
  • SanDisk Ultra Plus Solid State Drive: Fast And Affordable

    Increasingly, it has become quite common for the average computer user to run out of data storage space. Thankfully, solid state drives are always there as a backup device to store one's excess data - or a great medium for archiving important files and folders. Furthermore, there are numerous manufacturers competing in the portable hard-drive market - leading to newer innovations - prompting each manufacturer to invent faster, more convenient methods of transferring data - at more reasonable prices.

    When SanDisk first introduced their latest product -- the Ultra plus SSD at CES, the organization left little to the imagination as to who the target consumer was. If you are still left guessing - we'll cut to the chase - the Ultra plus SSD was meant to replace your existing, underperforming hard-drive, be it on your laptop or desktop. Two attributes about this SSD which impressed the consumers was its light-weight (1.38 ounces) and of course the most important factor - its price - starting at only $75.00 for 64GB version. Other, larger data storage options are also available with storage options ranging from 128GB and 256GB, costing at $110 and $210 respectively. If you are a math geek - or even if you are not - perhaps you are familiar with basic calculation methods, it won't take you much reckoning to figure out the cost per gigabyte. Considering the numbers - which result in significant cost savings - it's no doubt that the SanDisk Ultra Plus Solid State Drive is a steal.

    Measuring in at 2.5 inches, the SSD uses SATA 3.0, 6 gigabytes per second drive interface. However, keeping this in mind, in order to take full advantage of SATA 3.0, you'll need to have a laptop or desktop which supports SATA 3.0. Once your PC meets all the necessary hardware and software requirements, you can expect write speeds 338 Megabytes per second, and read speeds reaching a maximum of 433 megabytes per second - though these speeds were a little short of the promised speeds mentioned on SanDisk's specification sheet - though still quite impressive to say the least. When speeds were compared to its competitor - the Western Digital WD Black 500GB, there was renewed appreciation for SanDisk Ultra Plus SDD - as the WD Black performed at 122Megabytes per second for reading data and 119 megabytes per seconds for writing data.

    Boot times were also quite impressive, on average; the drive took 14 seconds to complete boot-up. Though, boot times did vary. What we figured was that depending on the specification of your machine - a slower PC would obviously result in slower boot times. In terms of data security, there's no built in feature to password protect files and folders on the SanDisk Ultra Plus. Nonetheless, portable data security software engineered to Secure USB drives and HDD drives can fill in the gap of protecting your data - and not to mention - offer you a priceless piece of mind.

    For more information please visit:

    Disclosure: I have no positions in any stocks mentioned, and no plans to initiate any positions within the next 72 hours. I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it. I have no business relationship with any company whose stock is mentioned in this article.

    Apr 29 2:44 AM | Link | Comment!
  • The Difference Between Data Theft And Data Loss

    Back in the old times when digital technology was unheard of, thieves mostly stole physical objects such as jewelry and money - often times they would get caught and end up jail. Today, in the age of digital technology, thieves have the upper hand. Hackers and data thieves are almost always able to get away with stealing personal information - despite states and the federal government enacting strict e-crime laws.

    Every year, the numbers related to data theft are rising, yet few incidents are reported every year. That's because, majority of victims never have the opportunity to discover that their data had been stolen. Contrary to popular belief, data theft and data loss are two separate issues. To briefly describe the attributes of each problem, data loss simply amounts to lost data that cannot be recovered and results in no further consequences. On the other hand, data theft results in more than just lost data, which may or may not be recoverable; although, it always results in negative consequences for the individual whose data is stolen - simply explained, your data could be used to conduct fraud of various types.

    Moving on, your data could be stolen in several ways. However, it is widely alleged that data thievery usually occurs from the following three sources: Employees or co-workers, hackers who may be targeting you and external contractors who temporarily work at your organization. Keep in mind that data theft resulting from the latter category is the least reported - possibly because contingent staffs don't stick around long enough to get caught stealing corporate data. Nonetheless, internal employees can just be as sneaky at stealing company data as external contractors. Thus, it's imperative that data security within an organization should be viewed from two separate perspectives, one from an internal networking point of view and the other from an external networking point of view.

    Consequently, in order to better protect your organization's data, one needs to understand how data theft works. Therefore, let us first discuss how internal data pilfering occurs. Unsecured networks and access to confidential data to unauthorized employees and contingent staff is a recipe for data theft. Networks within an organization should be setup in a foolproof method, so that any possibilities of data theft should completely be eliminated. Data leaks can occur through USB ports, CD/DVD drives, email access, right to use sites that enable you to upload data, and through enabled file sharing through Wifi access. On the other hand, external threats coming from hackers can be prevented through investing in enterprise level antivirus software and securing sensitive data through data encryption software developed to lock folders containing such data.

    For more information please visit:

    Disclosure: I have no positions in any stocks mentioned, and no plans to initiate any positions within the next 72 hours. I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it. I have no business relationship with any company whose stock is mentioned in this article.

    Apr 03 5:38 AM | Link | Comment!
  • Why It Makes Sense To Password-Protect Your USB Flash Drive

    Portable drives such as USB flash drives have allowed people to enjoy a wide array of flexibility in terms of transporting data from one medium to another. These devices are capable of storing several gigabytes of data within a small device. With the introduction of portable hard-drives and flash drives, organizations also enjoyed a greater boost in workplace productivity. Before these devices were introduced, users had to make use of CDs and DVDs by burning data on them, which not only had space limitations, but was also time consuming. Before that, floppy disks were the standard means of transferring data between mediums. Consequently, it's not hard to see how the growing demand for data has given birth to portable storage devices. In the near future, it's predicted that our data needs will be in the range of terabytes; consequently, a few manufacturers have already developed a flash drive which can store one terabyte of data. However, as with all things in the world, there are pros and cons behind every entity. Thus, a flash drive's portability is its biggest advantage as well as its disadvantage. That's because data stored on such devices can be easily accessed by anyone if one ends losing their device.

    Dejectedly, people almost always tend to disregard the safety of their identities by saving sensitive data on their devices. Documents such as resumes, tax-returns and e-statements are the perfect means for an identity thief to quickly utilize such information in order to effortlessly steal your identity. There's no doubt that in today's world, data is good as gold. Therefore, it's no wonder why e-crime has risen to levels which have prompted several federal and state law enactments -- in order to curb and enforce this type of crime. Sadly, people are still ignorant of their personal data's actual worth. Once stolen, e-crooks can virtually rob you of your financial assets as well as steal your identity.

    Nonetheless, manufacturers of portable drives have realized that data theft through portable drives is a real problem facing millions of users worldwide. As a result, newer portable drives are already integrating their devices with encryption software, in order to deter unauthorized access of personal data. However, these devices can be three to four times more costly to purchase than a traditional flash drive, and most people don't have the budget to purchase a device with such capability. Thankfully, third-party data protection software has already been developed to password protect USB drives for devices that do not have built in data security features. What's more, such software is considered more reliable and impossible to crack compared to data security software integrated by the manufacturers of a particular device. Third-party data fortification software usually downloads off the internet and can be installed directed onto any flash drive or portable hard-drive. Such software usually has a small footprint and requires only a few kilobytes of space, yet provides unbreakable password-protection on virtually all portable mediums, including Sony memory sticks, compact flash cards, and other similar devices.

    For more information please visit:

    Disclosure: I have no positions in any stocks mentioned, and no plans to initiate any positions within the next 72 hours. I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it. I have no business relationship with any company whose stock is mentioned in this article.

    Mar 25 2:22 AM | Link | Comment!
Full index of posts »
Latest Followers

Latest Comments

Instablogs are Seeking Alpha's free blogging platform customized for finance, with instant set up and exposure to millions of readers interested in the financial markets. Publish your own instablog in minutes.