Solved

ls120 reliability

Posted on 1998-11-23
4
283 Views
Last Modified: 2010-04-27
Is the ls120 drive reliable ? especially with regards to the  reliability of long-term storage of information in the  flexible media
0
Comment
Question by:jkdanu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 1

Accepted Solution

by:
EMTECH earned 100 total points
ID: 1129629
The LS120 are very reliable. They are better the the normal zip drives and operator around about the same speed.
0
 
LVL 12

Expert Comment

by:Otta
ID: 1129630
They operate at 4 to 5 times the speed of a 1.44MB 3.5" floppy.
0
 

Author Comment

by:jkdanu
ID: 1129631
I need to find out users experience with the drive, specifically
whether the media can store information reliably. Even after a
long period of time (effect of weather, temperature, etc.).


0
 
LVL 12

Expert Comment

by:Otta
ID: 1129632
> Even after a long period of time (effect of weather,
> temperature, etc.).

Although I let my cat out at night, the computer isn't allowed out;
it has to stay inside the house,   :-)
where the weather and temperature don't seem vary as much as the cat experiences.
Just keep your computer away from the steam produced
by the automatic dishwasher, and you should be OK,
as long as you water the plants, and not the computer.


0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question