(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is USB Type-C the Answer for Fast Data Transfer?

Is USB Type-C the Answer for Fast Data Transfer?

You might use USB every day for your general technology needs, but do you know the difference between the various kinds of USB? This week’s tech term is dedicated to investigating the different types of Universal Serial Bus (USB) ports, including its history, development, and uses.

The Origins of USB
First developed and implemented in 1996, the USB cable was created with the purpose of connecting devices to a computer in mind. A total of seven leaders in the computing and communications industry--Compaq, DEC, IBM, Intel, Microsoft, NEC, and Nortel--wanted to create a simple solution that could allow several different kinds of devices to connect to a PC.

Essentially, an early USB connection provided a data transfer of about 1.5 Mbps to 12 Mps. While this isn’t as fast as today’s standards, it was quite remarkable for the time. The first major release of USB technology was in September 1998, and it provided users with a 12 Mbps transfer rate on high-speed devices. Apple’s own iMac computer was actually one of the first devices to come with USB built into it, and it success played a major role in the commercialization and popularity of USB. The original USB came in two different connector types: type A, or standard USB, and type B, the more squared-off connector.

Innovations of USB
In August of 2000, USB 2.0 was released. The increase in data transfer was substantial at about 280 Mbps. Additionally, the first mini-USB (types A and B) were also developed. Furthermore, USB 2.0 introduced a new integrated battery charging feature, as well as fast data transfer from the emerging smartphone market. USB 3.0, introduced in November 2008, achieved an impressive 5.0 Gbs transfer rate, and the next decade would only further enhance this. September 2017 brought about the Type-C connector and USB 3.2, resulting in a transfer of around 20 Gbps.

USB Type-C
The USB Type-C uses a 24-pin USB connector system. You can identify it by looking for its rotational-symmetrical connector. We think that this is not just the most identifiable feature, but its most important as well. Nowadays, there is no wrong way to plug in your USB cable. In terms of size, the USB-C connector is larger than the micro-B connector. Just like the typical USB wire, one end has a type-A or type-B connection, while the other end has the new type-C connector.

For your reference, here are three of the best new features for USB Type-C:

  1. It’s designed to be easier to plug in since there is no discernible way that the dongle has to be entered into the device.
  2. Data transfer and power capability are basically twice what they were with USB 3.1.
  3. It’s designed to become a future-proof option for data and power transfer for mobile devices.

Unfortunately, not all devices support one cable, but maybe in the future this will become the new standard. For more information about new developments and the latest technology, subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Productivity Hosted Solutions Internet Malware Backup Google Mobile Devices Efficiency VoIP Business IT Support Network Security IT Services Email Managed Service Provider Miscellaneous Innovation Server Data Workplace Tips Disaster Recovery Business Continuity Network Upgrade Software Windows Business Management Communication Computer Managed IT Services Saving Money Hardware Mobile Device Management Virtualization Browser Smartphone Save Money Android Smartphones communications User Tips Data Backup Microsoft Office Outsourced IT Holiday Cybercrime Windows 10 WiFi Computers Internet of Things BYOD Data Recovery Social Media Remote Monitoring Operating System Mobile Computing Cloud Computing Hacking Chrome Big Data Ransomware Small Business Automation Proactive IT Avoiding Downtime Collaboration IT Solutions VPN Managed IT Services Alert Application Apple Social Engineering Information Technology BDR Employer-Employee Relationship Passwords Office Marketing Budget The Internet of Things Quick Tips Tech Term spam Cybersecurity Gadgets Telephone Systems Bandwidth Artificial Intelligence Managed IT Going Green Remote Computing Mobility Health Bring Your Own Device Recovery Save Time Firewall App Gmail Router Private Cloud Vulnerability Compliance How To Data Security Redundancy Wireless Technology Office 365 User Error IT Support Two-factor Authentication Data Protection Document Management Vendor Management Business Intelligence Website iPhone Money Downtime Facebook History Tablet Entertainment Lithium-ion battery Analytics Value Retail Memory Search Phishing Identity Theft Networking Mouse Apps Law Enforcement Data Management Productivity Risk Management Word Windows 10 PowerPoint Connectivity Excel Phone System Antivirus Office Tips Content Filtering Hard Drives Current Events IT Management Mobile Device Administration Servers Work/Life Balance Maintenance IT Plan Smart Tech Running Cable Physical Security DDoS CES Data loss Skype Unsupported Software Unified Threat Management Robot Google Drive Public Cloud Mobile Office Environment Content Management Update Customer Relationship Management Intranet Human Resources SaaS Best Available Training People Safety HIPAA Government Programming Network Congestion Credit Cards Cleaning Meetings Trending HaaS Education IT Consultant Fax Server Black Market Solid State Drive Applications Humor Infrastructure Saving Time Statistics Data Storage Streaming Media Analysis Internet Exlporer Data storage Online Currency Workers Comparison Encryption Biometrics Outlook Windows 7 Sports Business Owner eWaste Printer OneNote Flexibility USB YouTube Reputation Wearable Technology End of Support Recycling Travel Print Server Millennials Windows Media Player Social IoT Wireless Charging Healthcare NarrowBand Customers Internet exploMicrosoft Criminal Net Neutrality Hiring/Firing Root Cause Analysis Workforce Thought Leadership Computer Repair Best Practice Social Networking WIndows 7 Fiber-Optic Electronic Health Records Flash Chromecast Patch Management Advertising Analyitcs Software as a Service Telecommuting Content Filter Insurance Managing Stress Settings Cables Machine Learning Sync Laptop Scam Distributed Denial of Service Touchscreen Remote Work Storage LinkedIn Charger Software Tips Virus Virtual Desktop Practices IT service Unified Communications HVAC Telephony Touchpad Relocation Hybrid Cloud Virtual Reality Blockchain Debate Google Docs Addiction Computer Care Uninterrupted Power Supply Computer Accessories Hosted Computing Domains Theft Start Menu Audit IaaS PDF Bloatware Staff Spam Blocking Voice over Internet Protocol Cache Video Surveillance HBO Cameras Customer Service Inventory Consultant Cortana Mobile Keyboard Screen Mirroring Entrepreneur Digital Signature Multi-Factor Security Access Control Fraud Wireless Internet Frequently Asked Questions Tech Support Printer Server Hacker Google Apps Professional Services Computer Fan Lifestyle Cast Worker Commute Cost Management Strategy Piracy Authentication Amazon Wire Tip of the week Shadow IT User Wireless Files Science Tools FENG Password Instant Messaging Company Culture Licensing Nanotechnology Amazon Web Services Smart Office Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi Shortcut SharePoint Colocation Twitter Windows 8 Password Manager Electronic Medical Records Accountants Bluetooth Online Shopping Paperless Office Crowdfunding Monitor Hosted Solution Computing Infrastructure Tablets Business Mangement Botnet Specifications Data Warehousing Notifications Legal Devices Evernote Students Regulations Books Emails CrashOverride IBM Emergency Webinar Worker Users Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Smart Technology Windows 10s Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile