Samsung unveils massive 16TB SSD built with new 3D NAND | ExtremeTech

&mailing=ExtremeTech&mailingID=20F926B39303EA4C341F151D74C917B5 You can visit the link above to view an image of the device. We’ve seen multiple companies jockey for the record of largest SSD over the years, but Samsung appears to have gotten tired of the hooplah and decided to own the category outright. The company announced a new 16TB SSD (formatted capacity, 15.36TB) at the 2015 Flash Memory Summit. The massive increase in density is thanks to the 48-layer 3D TLC NAND that Samsung announced earlier this week, and it’s one massive puppy. Based on the company’s own statistics, each of its new 3D NAND chips can hold up to 256Gb (32GB). That means 32 chips per terabyte, and 512 chips to provide 16TB of data. If Samsung over-provisioned the drives by 10%, there could be as many as 600 NAND chips inside the PM1633a. Techfrag managed to snap a photo of the drive, and as you can see, it’s not what you’d call a standard form factor. If you’re hoping to see this kind of capacity come to consumer drives in the near future, well, don’t get your hopes up. While it’s true that SSD cost per GB and total number of GB per drive have been on the decrease and increase respectively, the fact that Samsung packed 500-600 NAND chips into this thing speaks to the limitations of consumer drive scaling. Consumer drives will continue to improve, but at significantly slower rates. Given that Samsung’s current 48-layer 3D NAND can deliver 256Gb, it’s reasonable to assume we’ll see 96 layer chips roll out in the next few years, with a corresponding improvement to SSD density. How long that train can roll is a matter of some debate in technical circles. Samsung claims that it can stack up to 100 layers with current V-NAND technology, but as we’ve previously covered, it gets harder to stack the layers the more layers there are. Doubling up to 96 would give Samsung 512Gb chips, and doubling again would push that to a full 1024Tb per chip. At 128GB per IC, high-end multi-terabyte SSDs would drop from thousands of dollars into territory the average consumer can afford. Whether or not we manage to squeeze that much capacity out of NAND before another memory technology either becomes viable (ReRAM, PCM, Intel’s 3D XPoint) or simply can’t stack dies that high, well, that’s another area where there’s much debate. Samsung hasn’t formally announced a price for the PM1633a, but it appears to be the kind of part where if you have to ask what it costs, you can’t afford it. *11) Don’t be blind sided by tupperware wanna be’s get the real thing]]>

Posted in Uncategorized | Leave a comment

CLARIA ZOOM, THE ALL-IN-ONE APP FOR ELDERLY AND PARTIALLY SIGHTED PEOPLE

Posted in Uncategorized | Leave a comment

Healthy eating courtesy of Mama Peach

Posted in Uncategorized | Leave a comment

How to Charge Your Smartphone Without Access to Electricity

from the company’s website. https://www.k-tor.com/pocket_socket.php *The SivaCycle Atom http://sivacycle.com/products/the-atom What about those long bike rides, where you’re out enjoying a sunny day on the street, but the music streaming into your headphones is chewing up battery life faster than your phone can keep up? That’s where the SivaCycle Atom comes in. The Atom is a small, human-powered generator that works by hooking onto the gearset of your bike, and by harnessing the movement of your wheels, charges a small battery pack that can be used to bring your portable devices from dead to daylight in just a matter of minutes. The Atom differentiates itself from other bike-based charging solutions with its extension that allows you stay plugged in while you’re on the road, so you never use more power than you have to while you’re still in motion. For anyone who commutes to or from their work on a bike and needs to stay connected at all times, this device is the ultimate in keeping your devices happy and full of juice no matter where you go. The only drawback for the Atom is the relatively small capacity of its portable battery pack, which rates at just 1650mAh. In layman’s, this amounts to about 15 percent of a charge on an iPhone 6. But even so, while that may not sound like much, in a pinch it’s still better than nothing at all. The SivaCycle Atom is one of the pricier solutions here, but considering that you get a portable battery pack and the entire bike kit for $129.99, the tradeoff is more than worth the extra bump in cost. The Levin Solar Charger The Levin Solar Charger has many benefits over other solar chargers you might have seen ranking near the top of your Amazon search list. While many of those chargers boast bonuses like big batteries and wide panel footprints, none do as good of a job combining all the features we care about most. The Levin is a powerful, durable, 100 percent waterproof solar panel that can easily fit in your sidebag without any fuss and does everything we need it to for the amazingly low price of just $24.99. Though not optimal for cloudy days lost in the wilderness, the Levin is still a solid piece of tech that belongs in any serious backpacker’s toolkits. The 2.1A output from the 6000mAh onboard battery provides more than enough charge for any cellphone, and even produces enough electricity to keep tablets and laptops running long past their due date. When left out in direct sunlight for 7-8 hours of exposure, the charger will get an iPhone 6 up to about 50 percent battery on a single surge. The Levin will also hold its charge for weeks at a time, which means that you can power it up when it’s convenient, and save what you need for when the going gets tough and the lights go out after a big storm. You can snag your own Levin Solar Panel in your choice of four colors, which for our money is one of the best portable sun chargers on the market today. http://www.amazon.com/Rain-resistant-Shockproof-Portable-authentic-knockoffs /dp/B00JEGLLHM/ref=sr_1_4?tag=hotoge-20 &ie=UTF8&qid=1435000323&sr=8-4&keywords=solar+phone+charger So what should you do the next time a natural disaster strikes and you run out of battery to call friends or family members in the crisis? It turns out the best kind of power is human power, and these alternative mini-generators have got more than enough to spare.]]>

Posted in Uncategorized | Leave a comment

Helpful tips for November 2015

Posted in Uncategorized | Leave a comment

Dynamic dreaming

Posted in Uncategorized | Leave a comment

How to Choose the Best Apple Watch for You For Dummies

Posted in Uncategorized | Leave a comment

From the recipe book of Mama Peach

Posted in Uncategorized | Leave a comment

Keeping up with the markets

Posted in Uncategorized | Leave a comment

Free Program To Create Bootable USB Pen Drive

are some form of a masquerade or phishing attack, designed to convince you that the attacker is trustworthy as a friend or as a legitimate authority figure. The attacker might use an email, phone call, or even face-time interview to deceive you. Common social engineering attacks include greeting cards , bogus lottery winnings, stock investment scams, warnings from an alleged banker that you’ve been hacked, credit card companies pretending to protect you. Read more about social engineering here … Social Engineering Attacks http://antivirus.about.com/od/securitytips/tp/socialengineeringattacks.htm Below start the third and last set of internet terms for beginners in 2015. *Link to thurd set of ie terms http://netforbeginners.about.com/od/internetlanguage/tp/the-top-internet-ter ms-for-beginners.02.htm 21. Phishing and Whaling ‘Phishing’ is what modern-day con men do to defraud you of your personal accounts. Phishing is the use of convincing-looking emails and web pages to lure you into typing your account numbers and passwords/PINs. Often in the form of fake eBay web pages, fake PayPal warning messages, and fake bank login screens, phishing attacks can be very convincing to anyone who is not trained to watch for the subtle clues. As a rule, smart users distrust any email link that says “you should login and confirm this”. Read more about phishing and whaling here… Internet Phishing and Email Scams – What Phishing and Email Scams Look Like http://netforbeginners.about.com/od/scamsandidentitytheft/ig/Phishing-Scams- and-Email-Cons/ 22. Addons and Plugins Addons are custom software modifications. User optionally install addons to improve the power of their Web browsers or office software. Examples include: a custom eBay toolbar for your Firefox browser, a new search feature for your Outlook email. Most addons are free, and can be found and downloaded from the Web. Plugins are a special kind of web browser addon. Plugins are essentially required addons, if you wish to view very specialized web pages. Examples include: Adobe Flash or Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader. Read more about addons here … Best Overall Add-On (Non-Security) http://browsers.about.com/library/bl-best-overall-addon.htm Read more about plugins here … Basic Web Browser Plug-Ins and Extensions http://netforbeginners.about.com/od/p/a/The-Best-Internet-Plugins.htm 23. Trojan A trojan is a special kind of hacker program that relies on the user to welcome it and activate it. Named after the famous Trojan horse tale, a trojan program masquerades as a legitimate file or software program. Sometimes it will be an innocent-looking movie file, or an installer that pretends to be actual anti-hacker software. The power of the trojan attack comes from users naively downloading and running the trojan file. Read more about trojan malicious programs here … Trojan – What Is a Trojan http://antivirus.about.com/od/whatisavirus/g/trojan.htm 24. Spamming and Filtering ‘Spam’ has two meanings. 1) Spam can mean ‘the rapid reptition of a keyboard command’. But more commonly, 2) spam is the jargon name of ‘unwanted/unsolicited email’. Spam email is usually comprised of two sub-categories: high-volume advertising, and hackers attempting to lure you into divulging your passwords. Filtering is the popular-but-imperfect defense against spam. Filtering uses software that reads your incoming email for keyword combinations, andthen either deletes or quarantines messages that appear to be spam. Look for a ‘spam’ or ‘junk’ folder in your mailbox to see your quarantine of filtered email. More on spam and filtering here … Spam and How to Get Rid of It – About Email http://email.about.com/od/spamandgettingridofit/ 25. Cloud Computing and Software-as-a-Service (SaaS) Cloud computing is a fancy term to describe that your software is online and ‘borrowed’, instead of purchased and actually installed on your computer. Web-based email is the most prevalent example of cloud computing: the users’ email is all stored and accessed ‘in the cloud’ of the Internet, and not actually on their own computers. This is the modern version of the 1970’s mainframe computing model. As part of the cloud computing model, ‘Software as a Service’ is the business model that claims people would rather rent software than actually own it. With their web browsers, users access the cloud of the Internet, and log into their online rented copies of their SaaS software . Read more about cloud computing and SaaS here … What Is ‘Cloud Computing’? http://netforbeginners.about.com/od/c/f/cloudcomputing.htm 26. Apps and Applets Apps and applets are small software applications. They are designed to be much smaller than regular computer software, but still provide very useful functions. Lately, apps are very popular with cellphone and mobile platforms; specifically: with the Apple iPhone and the Google Android phone. Examples of apps: rangefinder GPS for golfing, song identification software, restaurant reviews, pocket video games, language translators for traveling. Read about popular apps here … What is the Best Free iPhone App – Readers Pick the Best Free iPhone App According to about.com http://cellphones.about.com/od/softwarereviews/f/readers-choice-awards-best- free-iphone-app.htm 27. Encryption and Authentication Encryption is the mathematical scrambling of data so that it is hidden from eavesdroppers. Encryption uses complex math formulas (‘ciphers’) to turn private data into meaningless gobbledygook that only trusted readers can unscramble. Encryption is the basis for how we use the public Internet as a pipeline to conduct trusted business, like online banking and online credit card purchasing. On the provision that reliable encryption is in place, your banking information and credit card numbers are kept private. Authentication is directly related to encryption. Authentication is the complex way that computer systems verify that you are who you say you are. More on encryption and authenticating … Encryption – 40-bit vs 128-bit Encryption – What is the Difference? http://compnetworking.about.com/od/networksecurityprivacy/l/aa011303a.htm 28. Ports and Port Forwarding ‘Network ports’ are thousands of tiny electronic ‘lanes’ that comprise your network connection. Every computer has 65,536 tiny ports, through which Internetworking data travels in and out. By using port management tools like a hardware router, users can control port access to better safeguard themselves against hackers. ‘Port forwarding ‘ is the semi-complex technique of opening specific network ports. You would port-forward to speed up your downloading and speed up your online connections for gaming and teleconferencing. Read more about ports and port forwarding here … What Is “Port Forwarding”? How Do I Set My Own? http://netforbeginners.about.com/od/p/f/What-Is-Port-Forwarding.htm 29. Firewall Firewall is a generic term to describe ‘a barrier against destruction’. It comes from the building term of a protective wall to prevent the spreading of housefires or engine compartment fires. In the case of computing, ‘firewall’ means to have software and/or hardware protecting you from hackers and viruses. Computing firewalls range from small antivirus software packages, to very complex and expensive software + hardware solutions. All the many kinds of computer firewalls offer some kind of safeguard against hackers vandalizing or taking over your computer system. Read more about computer firewalls for personal use… Top Free Personal Firewalls and Firewall Software Downloads According to about.com http://compnetworking.about.com/od/firewalls/tp/homefirewalls.htm 30. Archives and Archiving A computer ‘archive’ is one of two things: a compressed container of multiple smaller data files, or a purposeful long-term storage of files that are not going to be used often. In some cases, an archive can be both. The act of ‘archiving’, similarly, is one of two things: to combine and squeeze multiple files into a larger single file (for easier emailing); or, archiving is when you will retire data and documents to be put into long-term storage (e.g. your thousands of old emails in your inbox). Read about popular archiving software, WinZip … What Is ‘Zip’ and ‘WinZip’? How Do Zip Files Work? http://netforbeginners.about.com/od/downloadingfiles/f/how-zip-files-work.ht m Read about archiving your old email here … Archiving Old Mail in Outlook – Keep the PST File Small http://email.about.com/od/outlooktips/qt/et_archive_mail.htm Version: 2014.0.4830 / Virus Database: 4365/10652 – Release Date: 09/16/15]]>

Posted in Uncategorized | Leave a comment