Solved

Problem config. the question: Notebook has USB1; what external device do I buy to convert to USB2?

Posted on 2007-11-29
2
337 Views
Last Modified: 2013-11-17
If I knew how to ask this question specifically, I'd go to Newegg.com & buy the device.
I have an older Compaq Notebook Presario 900, which runs USB1. I want to backup the HD with Acronis to an external HD. It takes an hour for a full, new image.
So what do I buy to use faster USB2 to do this task?
A memory stick is still the same issue: USB1 slowwwww

Sure, with the costs of a new, refrub. laptop (mine is a notebook made of lead), I'd have no issue,
but I only use my notebook a few times a year. I wish I could travel more, but.....
Thanks,
Vineyardtechie
0
Comment
Question by:jamesg1940
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
mmcodefive earned 125 total points
ID: 20380061
There is no "converter" to go from usb 1.1 to usb 2.0. Probably your only bet is getting a USB 2.0 for Cardbus.

http://www.usb-2-0.com/usb-2-0-cardbus-card.html

How fast usb 2.0 will go with an older laptop like that; I couldnt tell you. It will be faster then using usb 1.1 which limits at 1.5 Megs a second transfer.
0
 
LVL 1

Author Closing Comment

by:jamesg1940
ID: 31623402
mmcodefive:
Thanks for the tip; I continue to learn more about spending as little $, but then I find I spend too much on my primary PC. Anyway, I knew there was a simple but techno complex device for my solution. I just bought a #13.00 device new delivered from Ebay. My Experts subscription is a plus "insurance policy". Best to you, Jim
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This is about my first experience with programming Arduino.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question