Flash drives are also cost-effective. You can securely store a few dozen gigabytes of data for less than $30, and these devices range in storage capacity, price and overall size - equal to the amount you're willing to invest. Some even have special features like lanyards, locks, belt clips and key fobs to make them easier to carry and keep track of.
Specially manufactured flash drives are available that have a tough rubber or metal casing designed to be waterproof and virtually "unbreakable". These flash drives retain their memory after being submerged in water, and even through a machine wash. Leaving such a flash drive out to dry completely before allowing current to run through it has been known to result in a working drive with no future problems. Channel Five's Gadget Show cooked one of these flash drives with propane, froze it with dry ice, submerged it in various acidic liquids, ran over it with a jeep and fired it against a wall with a mortar. A company specializing in recovering lost data from computer drives managed to recover all the data on the drive.[64] All data on the other removable storage devices tested, using optical or magnetic technologies, were destroyed.
Some value-added resellers are now using a flash drive as part of small-business turnkey solutions (e.g., point-of-sale systems). The drive is used as a backup medium: at the close of business each night, the drive is inserted, and a database backup is saved to the drive. Alternatively, the drive can be left inserted through the business day, and data regularly updated. In either case, the drive is removed at night and taken offsite.
High-security flash drives aren’t exactly a new concept. For as long as companies have been transferring confidential info via USB drives, there’s been a concern of keeping that info confidential. While you might be swayed by flashy gimmicks like fingerprint sensors and password keypads, these end up being too expensive and not overly powerful (with a few exceptions of course). But that’s why our security pick goes to the Kingston Data Traveler Vault.
For computers set up to be bootable from a USB drive, it is possible to use a flash drive containing a bootable portable operating system to access the files of the computer, even if the computer is password protected. The password can then be changed, or it may be possible to crack the password with a password cracking program and gain full control over the computer. Encrypting files provides considerable protection against this type of attack.
Audio tape cassettes and high-capacity floppy disks (e.g., Imation SuperDisk), and other forms of drives with removable magnetic media, such as the Iomega Zip and Jaz drives, are now largely obsolete and rarely used. There are products in today's market that will emulate these legacy drives for both tape and disk (SCSI1/SCSI2, SASI, Magneto optic, Ricoh ZIP, Jaz, IBM3590/ Fujitsu 3490E and Bernoulli for example) in state-of-the-art Compact Flash storage devices – CF2SCSI.
Particularly with the advent of USB, external hard disks have become widely available and inexpensive. External hard disk drives currently cost less per gigabyte than flash drives and are available in larger capacities. Some hard drives support alternative and faster interfaces than USB 2.0 (e.g., Thunderbolt, FireWire and eSATA). For consecutive sector writes and reads (for example, from an unfragmented file), most hard drives can provide a much higher sustained data rate than current NAND flash memory, though mechanical latencies seriously impact hard drive performance.
Universal Serial Bus (USB) is a standard that defines both communication protocols and physical connections for data transfer. Using thumb drives based on this standard ensures they work with a broad range of devices, making it simple to show digital pictures on a USB-enabled television, transfer files between Apple and Microsoft computers or use your saved game on a friend's gaming console. These devices also offer plug-and-play compatibility with most operating systems and require no additional software to access the storage they provide.