Toshiba new external drive: How small can it go?
- 24 September, 2012 18:06
Toshiba has released its smallest external hard drive, which trumps Western Digital's smallest drive released earlier this month.
Toshiba's new Canvio Slim hard drive
Like WD's new My Passport Edge, Toshiba's Canvio Slim is a single-platter, 5400RPM, 500GB drive. It is .35 inches thick, 4.21 inches long and 2.95 inches wide. WD's My Passport Edge, released at the beginning of the month, is a half-inch thick, 4.34 inches long and 3.2 inches wide.
Toshiba's predecessor to the Canvio Slim, the Canvio, was .53 inches thick.
Like WD's new drive, the Canvio Slim supports USB 3.0 (5Gbps) specification, an upgrade from the USB 2.0 (480Mbps) I/O interface. Also like WD's new drive, the Toshiba Canvio lacks the new Thunderbolt (10Gbps) interface.
As with any USB 3.0 enabled drive, the Canvio Slim is backward compatible for use with USB 2.0 devices.
The drive comes with an NTFS driver for use with Mac computers, but the drive also allows users to store and access files from PCs and Macs without reformatting.
Toshiba's new Canvio Slim hard drive
The Canvio Slim also comes equipped with software that makes back up easy. The included NTI Backup Now EZTM software provides a system scan that recommends the best type of coverage. Users can choose between backing up files to the cloud, backing up files and folders to the Canvio Slim portable hard drive, backing up anything saved on the computer, or all three for the most comprehensive coverage.
The Canvio Slim has a suggested retail price of $114 and comes with a three-year limited warranty.
Lucas Mearian covers storage, disaster recovery and business continuity, financial services infrastructure and health care IT for Computerworld. Follow Lucas on Twitter at @lucasmearian or subscribe to Lucas's RSS feed. His e-mail address is firstname.lastname@example.org.
Read more about data storage in Computerworld's Data Storage Topic Center.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Customer Success - St. John Ambulance Australia
- Managing Web Security in an Increasingly Challenging Threat Landscape
- Making Smarter Manufacturing Decisions With Business Intelligence
- A Clear Route to Data Protection - Your information: Clearly controlled
- Migrate From HP-UX and Standardise with Confidence
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
A Holistic Approach to your BYOD Challenge
More and more enterprises are seeing significant benefits from allowing employees to choose the device they use to get their jobs done, and are adopting bring your own device (BYOD) initiatives. While the BYOD trend increases flexibility and productivity, it introduces a host of new challenges for your IT administrators. Click for more!
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.