SD Memory Cards

SD Memory CardThe SD memory cards known as the “Secure Digital” first began as miniature cards. Afterwards the new and advanced form of the SD memory card SDIO “Secure Digital Input/output” was introduced into the market. The SDA “Secure Digital Association” included new features and technology to the SD memory cards. The SDA included new varieties of card functions. These new card functions included wireless “Local Area Network LAN” devices, cell phones, GPS receiver, digital video camera etc. The memory card readers that were used in the Secure Digital devices connected to the Universal Serial Bus (USB). The Windows Operating System detects and manages the SD (Secure Digital) memory cards through the driver called the (USB) Universal Serial Bus mass storage. The (SD) Secure Digital host controllers are supported by the Operating System. The Operating System connects the host controller SD to the Peripheral Component Interconnect (PCI) bus. When the SD-host controller is detected by the operating system, the “SD Secure Digital bus driver” is loaded by the operating system OS. When the SD card is inserted by the user, the windows Operating system loads two drivers the “Storage mini-port” and the “SD Secure Digital Storage Class”. These two drivers are loaded on top of “Bus driver” by the Windows Operating System. On the other hand if the SD memory card of a different function like the wireless Local Area Network (LAN) or the Global Positioning System is inserted by the user, then the Windows Operating System loads the driver that is supplied by the vendor. It is necessary that both the vendor supplied and the native drivers in the (SD) Secure Digital stack communicate with “Secure Digital Bus”. The device drivers call the routines to communication with the “Secure Digital Bus”. These routines are called in the static “Secure Digital Bus library”. When the SD Secure Digital drivers compile, it is necessary that they link to the “Secure Digital SD Bus library”. There are some limitations for the SD device drivers. The “Host Controller Register” is not directly accessible by the Secure Digital device drivers.

The SD device drivers call the routines of “Secure Digital Library”. Then the Secure Digital Library forwards the Secure Digital commands to “Host Controller”. Music can be stored in the Flash Memory card and it is most advantageous than storing it in the Hard drives.  The SD flash memory cards consume less power and are more portable. The SD flash cards also have resistance to shocks. The SD card facilities its users and they can easily record the data to their personal liking like music, pictures. The users can easily carry and move the data with ease and comfort. The SD memory card has the technology to fulfill the requirements of the future networked society. The tiny SD memory card provides many advantages to their users. These memory cards are highly compatible and they can link to different digital equipments. Because of the compatibility of the SD memory cards, their usage is more likely to expand even more in the future. The SD card has now become a standard of memory cards that are used for digital connectivity. In the near by future, the SD cards will be universally accessible to more wide array of Multimedia data. The size of the SD memory card is approximately 24mm x 32mm x 2.1mm. The design of the SD card is very compact and slim. Therefore, they are easy to handle and the user can easily transfer the data.

The devices that are compatible with SD card can play video clips & music with the help of “decoder software”. The DVD & CD players use “drive mechanism” while the SD memory cards do not require “drive mechanism” to play the video clips. So, this gives the product designers more freedom and they can be more creative and innovative. The other popular form of the SD memory card is the miniSD memory card. The size of the mini-SD card is approximately 20mm x 21.5mm x 1.4mm. The miniSD card is smaller in size than the SD card.

The SD memory cards have different recording capacitates, their capacity reaches up to 8GB. The large capacity helps to store the High quality videos. The demand for high capacity SD cards with fast data transfer speed has increased because of the increased digital content range. The SD cards also have the technology of “Copyright Protection”. This “Copyright Protection” technology enables new distribution system. This provides safety and security to the illegal copying of the data.The SD card has built in technology called the Key Revocation. The SD memory card has “Control Circuit”, which allows to read & write the after the detection of the external devices. The data is written and read within the “protection area” of the card. The authentication among the digital devices has to be enabled so that the SD card could be accessed.

Read More

2060-701537-004 WD PCB Circuit Board

HDD Printed circuit board (PCB) with board number 2060-701537-004 is usually used on these Western Digital hard disk drives: WD1600AAJS-00Z4A0, DCM HHRNNT2AAN, Western Digital 160GB SATA 3.5 Hard Drive; WD10EACS-22D6B0, DCM HHNNNT2CFB, Western Digital 1TB SATA 3.5 Hard Drive; WD5000AAKS-00D2B0, DCM HBNNHT2CB, Western Digital 500GB SATA 3.5 Hard Drive; WD2500AAKS-00F0A0, DCM HBRNHV2AGN, Western Digital 250GB…

Read More

Top 10 Data Disasters Stories for 2011 (Kroll Ontrack)

Think you have the worst data disaster story? Let’s find out! Submit your top data disaster for the chance to win an iPad2. – Ontrackdatarecovery.co.uk

data-disasters-2011

Top 10 Data Disasters Stories for 2011:

1. Triple whammy
When a lightning strike caused a fire that sent a famous Caribbean island home up in smoke, the computer servers were burned and then doused with water by the firemen. The media then corroded while the building sat idle until it was safe to re-enter. In the end, the triple whammy of a lightning strike, fire and water damage was overcome in the Ontrack Data Recovery cleanroom.

2. Doggy eat dog world
A man encouraged his girlfriend to back up her photo library, which contained thousands of high-resolution photos from her photo studio. She diligently moved the data from her laptop to an external hard drive, but unfortunately that represented the only good copy. A friend then pulled into the driveway and the couple went out to meet her, but not before the hyperactive family dog heard someone at the door and came tearing out from underneath the table where the drive was sitting. The drive went crashing to the floor, causing much damage to the data.

3. A little piece of history
A freelance photographer happened to have his camera with him in the midst of the recent London riots. Some rioters saw they were being filmed and opted to smash the camera in order to destroy the potentially incriminating evidence. The camera made its way to Kroll Ontrack where 100 percent of the data and the video footage was recovered and supplied to the police.

4. In the safe not on the safe
To avoid arriving late to a business meeting, an IT person opted to put a tape drive on top of the waterproof safe instead of inside it. Within an hour of doing so, the city was struck by a powerful earthquake and the tape was knocked to the ground. Then, the premise was engulfed by mud, water and sand. The tape looked irrecoverable.

5. Smoking kills
A newly hired security guard was doing his first evening security check in a chemical ingredients warehouse. While he was informed that smoking is forbidden, he pondered who could possibly spot him enjoying a cigarette after company hours. After it was lit, the fire alarm sounded and prompted the anti-fire sprinkler system. All the electronic equipment, including 44 desktops and two servers, were flooded.

6. Sunken business deal
Two businessmen met in a pub to discuss a future deal over a beer. The waitress accidently knocked over one of the glasses she was delivering, soaking the laptop which contained the business plans. A paper towel was not enough to save the laptop and its important deal files.

7. End of month disaster
A corporate accounting department stayed late to reconcile the books for the month. While rejuvenating on a coffee break, a power outage occurred. All of the computers shut down including the financial server. Luckily the department’s computers were connected to a UPS. However, the continued brewing of their cups of Java drained the UPS battery, resulting in a crashed server.

8. Magnetic attraction
A laptop was set down on a desk near some rare earth magnets. The earth magnets came into contact with the laptop and when the user went to turn on the machine, it did not fully boot up and started clicking. Physical damage was caused to the platters.

9. Virtual reality
To increase system performance, an IT administrator split the C and D partition of his virtual server across two different systems. Running out of space, the admin needed to rush and consolidate C and D onto the same system. Not knowing that the same naming convention already existed on the target system, he copied over the important data set.

10. Bad image
An actor deleted her entire portfolio including her model card samples and recent pictures by accidently selecting the wrong externally attached USB drive using the MAC disk utility program.

Note: Submit your worst data disaster story by January 31, 2012. Include how the data disaster occurred, how it impacted you or your business and if you were able to recover your data (if so, how much you recovered). The winner will be selected on February 1, 2012. Join Now

Read More

Physical bad sector recovery hard disk read slow files sometimes can not be opened recovery into

Case:A 500G Hitachi hard disk was found. One day, when the computer was opened, the hard disk read was slow, and the files also appeared sometimes to open and sometimes could not be opened. Solution:Engineers use professional equipment testing, and the hard disk has physical bad sectors. First, the degree of damage to the physical…

Read More

Windows 10: Scheduled tasks with workstation lock/unlock not being triggered

I’m running Windows 10, and trying to get a pair of scheduled tasks working. These tasks are set to run on workstation lock and workstation unlock, and execute a script that remotely locks or unlocks an adjacent arch-linux workstation. This is accomplished via the WinSCP command-line interface, WinSCP.com, and its built-in scripting ability. These scrips…

Read More