Installers of some operating systems can be stored to a flash drive instead of a CD or DVD, including various Linux distributions, Windows 7 and newer versions, and macOS. In particular, Mac OS X 10.7 is distributed only online, through the Mac App Store, or on flash drives; for a MacBook Air with Boot Camp and no external optical drive, a flash drive can be used to run installation of Windows or Linux.
Universal Disk Format (UDF) version 1.50 and above has facilities to support rewritable discs like sparing tables and virtual allocation tables, spreading usage over the entire surface of a disc and maximising life, but many older operating systems do not support this format. Packet-writing utilities such as DirectCD and InCD are available but produce discs that are not universally readable (although based on the UDF standard). The Mount Rainier standard addresses this shortcoming in CD-RW media by running the older file systems on top of it and performing defect management for those standards, but it requires support from both the CD/DVD burner and the operating system. Many drives made today do not support Mount Rainier, and many older operating systems such as Windows XP and below, and Linux kernels older than 2.6.2, do not support it (later versions do). Essentially CDs/DVDs are a good way to record a great deal of information cheaply and have the advantage of being readable by most standalone players, but they are poor at making ongoing small changes to a large collection of information. Flash drives' ability to do this is their major advantage over optical media.
Specially manufactured flash drives are available that have a tough rubber or metal casing designed to be waterproof and virtually "unbreakable". These flash drives retain their memory after being submerged in water, and even through a machine wash. Leaving such a flash drive out to dry completely before allowing current to run through it has been known to result in a working drive with no future problems. Channel Five's Gadget Show cooked one of these flash drives with propane, froze it with dry ice, submerged it in various acidic liquids, ran over it with a jeep and fired it against a wall with a mortar. A company specializing in recovering lost data from computer drives managed to recover all the data on the drive.[64] All data on the other removable storage devices tested, using optical or magnetic technologies, were destroyed.
Some file systems are designed to distribute usage over an entire memory device without concentrating usage on any part (e.g., for a directory) to prolong the life of simple flash memory devices. Some USB flash drives have this 'wear leveling' feature built into the software controller to prolong device life, while others do not, so it is not necessarily helpful to install one of these file systems.[39]
Some organizations forbid the use of flash drives, and some computers are configured to disable the mounting of USB mass storage devices by users other than administrators; others use third-party software to control USB usage. The use of software allows the administrator to not only provide a USB lock but also control the use of CD-RW, SD cards and other memory devices. This enables companies with policies forbidding the use of USB flash drives in the workplace to enforce these policies. In a lower-tech security solution, some organizations disconnect USB ports inside the computer or fill the USB sockets with epoxy.
To ensure this information isn't stolen as well, having a locked flash drive can keep anyone from viewing your files should the drive fall into the wrong hands. Tiny and portable, they easily slip into a pants or coat pocket, in a computer bag or purse, and come in a variety of shapes and sizes. External keypads add an additional level of security to portable memory, meaning a viewer must first input a numerical code to gain access to files. These in turn can be encrypted and password protected, deterring serious threats to personal security.
Digital audio files can be transported from one computer to another like any other file, and played on a compatible media player (with caveats for DRM-locked files). In addition, many home Hi-Fi and car stereo head units are now equipped with a USB port. This allows a USB flash drive containing media files in a variety of formats to be played directly on devices which support the format. Some LCD monitors for consumer HDTV viewing have a dedicated USB port through which music and video files can also be played without use of a personal computer.
Macbooks require a USB Type-C device, which is where this swivel dual flash drive from Silicon Power comes in handy. It features a dual interface with USB Type-C and USB Type-A 3.0 ports on opposite ends of a compact device. The 360-degree swivel cap protects whichever connector is not in use and attaches easily to keychains. The C80 doesn’t require any special drivers or software to work; just plug it into the port and it is ready to go. But it has an optional file management app, which is a free and simple automatic file categorization that puts your work in the appropriate folders. Expect fast read and write speeds and 64 GB of storage to hold all your photos and files.
Custom flash drives are practical giveaway items you can personalize with a logo or company name to help promote your brand. In the age of information and data storage, thumb drives are a hands-on approach to transferring data when a “cloud” isn’t readily available. Browse our catalog and select form a variety of styles that include plastic, leather, metal and novelty designs to truly impress your audience. Compact and easy to transport, our wholesale USB flash drives can be custom printed, or laser engraved to fit your portable storage needs. Combine a with a custom lanyards for the perfect trade show giveaway - enjoy Guaranteed Low Prices and Free Shipping!
Like all flash memory devices, flash drives can sustain only a limited number of write and erase cycles before the drive fails.[71][unreliable source?][72] This should be a consideration when using a flash drive to run application software or an operating system. To address this, as well as space limitations, some developers have produced special versions of operating systems (such as Linux in Live USB)[73] or commonplace applications (such as Mozilla Firefox) designed to run from flash drives. These are typically optimized for size and configured to place temporary or intermediate files in the computer's main RAM rather than store them temporarily on the flash drive.
Most USB flash drives do not include a write protection mechanism. This feature, which gradually became less common, consists of a switch on the housing of the drive itself, that prevents the host computer from writing or modifying data on the drive. For example, write protection makes a device suitable for repairing virus-contaminated host computers without the risk of infecting a USB flash drive itself. In contrast to SD cards, write protection on USB flash drives (when available) is connected to the drive circuitry, and is handled by the drive itself instead of the host (on SD cards handling of the write-protection notch is optional).
Flash drives may present a significant security challenge for some organizations. Their small size and ease of use allows unsupervised visitors or employees to store and smuggle out confidential data with little chance of detection. Both corporate and public computers are vulnerable to attackers connecting a flash drive to a free USB port and using malicious software such as keyboard loggers or packet sniffers.
With wide deployment(s) of flash drives being used in various environments (secured or otherwise), the issue of data and information security remains important. The use of biometrics and encryption is becoming the norm with the need for increased security for data; on-the-fly encryption systems are particularly useful in this regard, as they can transparently encrypt large amounts of data. In some cases a secure USB drive may use a hardware-based encryption mechanism that uses a hardware module instead of software for strongly encrypting data. IEEE 1667 is an attempt to create a generic authentication platform for USB drives. It is supported in Windows 7 and Windows Vista (Service Pack 2 with a hotfix).[47]
The memory in flash drives is commonly engineered with multi-level cell (MLC) based memory that is good for around 3,000-5,000 program-erase cycles,[40] but some flash drives have single-level cell (SLC) based memory that is good for around 100,000 writes. There is virtually no limit to the number of reads from such flash memory, so a well-worn USB drive may be write-protected to help ensure the life of individual cells.
Motherboard firmware (including BIOS and UEFI) can be updated using USB flash drives. Usually, new firmware image is downloaded and placed onto a FAT16- or FAT32-formatted USB flash drive connected to a system which is to be updated, and path to the new firmware image is selected within the update component of system's firmware.[49] Some motherboard manufacturers are also allowing such updates to be performed without the need for entering system's firmware update component, making it possible to easily recover systems with corrupted firmware.[50]
The various writable and re-writable forms of CD and DVD are portable storage media supported by the vast majority of computers as of 2008. CD-R, DVD-R, and DVD+R can be written to only once, RW varieties up to about 1,000 erase/write cycles, while modern NAND-based flash drives often last for 500,000 or more erase/write cycles. DVD-RAM discs are the most suitable optical discs for data storage involving much rewriting.
Features: 100% New&High Quality Storage Capacity: 32GB Support USB version 3.0 and 3.1 Easy plug and play installation Interface: USB 3.0; Capacity: 32GB Due to the inner system and procedure data will occupy some space and the real capacity will reduce lightly Stylish lightweight; portable,new concept modeling,classic fashion,compact Brisk High Speed; plug and play, in line with USB 3.0 specification, data transfer speed. Compatible with Windows 7/Windows 8, Windows XP, Windows Vista, Hi-Speed USB 3.0 port required for high speed transfer Support solution for Linux kernel version 2.4 or later version Driveless for OS 9X or up Durable solid-state storage No external power is required 4.5V ~ 5.5V from USB port The data read speed: 20MB-30MB/S(USB 3.0) The data write speed: 10MB-15MB/S(USB.
Most USB flash drives weigh less than 30 g (1 oz).[31] While some manufacturers are competing for the smallest size[32] with the biggest memory,[33] some manufacturers differentiate their products by using elaborate housings, which are often bulky and make the drive difficult to connect to the USB port. Because the USB port connectors on a computer housing are often closely spaced, plugging a flash drive into a USB port may block an adjacent port. Such devices may carry the USB logo only if sold with a separate extension cable. Such cables are USB-compatible but do not conform to the USB standard.[34][35]
Anyone who has accidentally left their flash drive in their pants pockets through a laundry cycle will appreciate the durability of this Samsung drive. Its durable metal casing is waterproof, shockproof, magnetproof, and resistant to high temperatures. The drive is housed inside the metal casing, so it won’t break off (and the keyring is made with the same quality casing, again helping your drive live longer). Samsung believes in this drive enough to provide a five-year warranty should anything happen. Durability isn’t its only perk, either. USB 3.0 and NAND technology gives this drive data transfer respectable read speeds of up to 130 MB/s and write speeds over 100 MB/s. It is also backwards compatible with USB 2.0, but expect a drop in transfer speeds.
This depends on the programs. Most programs will situate their contents in multiple locations, so if it's on your computer, you'll need to know where all of a program is stored. It can be easier to download the program from scratch again as it brings in all of the needed content for you. If you are trying to transfer from a computer, at the very least be sure to capture the EXE, Application and Java files; however, there are usually many other files too. Also, the programs will differ between operating systems (for example, EXE is Windows, while .app is Mac). End answer: it can be done but it's easier if you can download the program afresh.
Digital audio files can be transported from one computer to another like any other file, and played on a compatible media player (with caveats for DRM-locked files). In addition, many home Hi-Fi and car stereo head units are now equipped with a USB port. This allows a USB flash drive containing media files in a variety of formats to be played directly on devices which support the format. Some LCD monitors for consumer HDTV viewing have a dedicated USB port through which music and video files can also be played without use of a personal computer.
When used in the same manner as external rotating drives (hard drives, optical drives, or floppy drives), i.e. in ignorance of their technology, USB drives' failure is more likely to be sudden: while rotating drives can fail instantaneously, they more frequently give some indication (noises, slowness) that they are about to fail, often with enough advance warning that data can be removed before total failure. USB drives give little or no advance warning of failure. Furthermore, when internal wear-leveling is applied to prolong life of the flash drive, once failure of even part of the memory occurs it can be difficult or impossible to use the remainder of the drive, which differs from magnetic media, where bad sectors can be marked permanently not to be used.[74]
To ensure this information isn't stolen as well, having a locked flash drive can keep anyone from viewing your files should the drive fall into the wrong hands. Tiny and portable, they easily slip into a pants or coat pocket, in a computer bag or purse, and come in a variety of shapes and sizes. External keypads add an additional level of security to portable memory, meaning a viewer must first input a numerical code to gain access to files. These in turn can be encrypted and password protected, deterring serious threats to personal security.