Transcend Information Inc., a leading manufacturer of storage and multimedia products, is proud to introduce SSD Enclosure Kit options in different form factors to cover all possibilities and enhance data mobility. Available in M.2 and 2.5-inch variants, these portable storage enclosures are equipped with USB 3.1 Gen 1 interface and UASP (USB Attached SCSI Protocol) support to deliver fast and efficient data transfers compared to traditional USB 3.0.

 

Enhanced Performance with UASP
Unlike conventional USB 3.0 and BOT (Bulk Only Transport) protocol, which only allow for a single, unidirectional command at a given time, UASP allows for simultaneous, bidirectional commands that, when used with a UASP-enabled host computer, results in accelerated read and write speeds at peak performance. UASP also demonstrates up to 80% reduction in required processor resources.

 


 

UASP Supported M.2 SSD Enclosure Kit
Transcend’s CM42 and CM80 are enclosures in different form factors designed specifically for M.2 SATA SSDs. The M.2 SSD enclosure uses the USB 3.1 Gen 1 interface incorporated with UASP (USB Attached SCSI Protocol) that makes transfer speeds faster than with a sole USB 3.0 interface when used with a UASP-enabled host computer. Transcend’s M.2 SSD enclosure features a lightweight aluminum construction, making it both portable and durable while you are on the move. By following the step-by-step installation guide, you can transform an M.2 SATA SSD into a portable USB 3.1 Gen 1 external drive, maximizing utilization.


 

UASP Supported 2.5-inch SSD/HDD enclosures
In terms of 2.5-inch SSD/HDD enclosures supporting UASP, the StoreJet 25S3 features a stylish, yet compact aluminum case, while the StoreJet 25CK3 protects your drive against shock and vibration with an outer rubber case and inner rubber shock absorber.

 


 

Transcend’s 2.5” SSD/HDD Enclosure Kit comes with all the tools you need to reuse the 2.5-inch hard drive removed from your notebook. Follow the step-by-step installation guide to find useful tips and assembly instructions. The kit also features a one-touch backup function, so download the Transcend Elite software from our website to better manage your data.

 


 

Other UASP Supported Products from Transcend
Besides SSD Enclosure Kit, Transcend also offers UASP supported portable storage ready to use. The ESD220C external SSD features fast data transfer rates and solid data integrity, while the Storage 25MC portable storage for PC comes with USB Type-C ports and advanced 3-stage shock protection system.

 

Warranty
The SSD Enclosure Kit options are backed by Transcend’s two-year limited warranty.

 

Specifications:

Model

TS-CM42S

TS-CM80S

Form Factor

Type 2242 only

Type 2242 / 2260 / 2280

Interface

USB 3.1 Gen 1

USB 3.1 Gen 1

Bus

SATA III 6Gb/s

SATA III 6Gb/s

Connector

USB Type-C to USB Type-A

USB Type-C to USB Type-A

Operating Temperature

0°C to 70°C

0°C to 70°C

Storage Temperature

-40°C to 85°C

-40°C to 85°C

Dimensions

81.41 x 33.6 x 7.5 mm

120.16 x 33.6 x 7.5 mm

Weight

29g

41g

Model

TS0GSJ25S3

TS0GSJ25CK3

Form Factor

2.5-inch

2.5-inch

Interface

USB 3.1 Gen 1

USB 3.1 Gen 1

Bus

SATA III 6Gb/s

SATA III 6Gb/s

Connector

Micro-USB to USB Type-A

Micro-USB to USB Type-A

Operating Temperature

5°C to 55°C

0°C to 70°C

Dimensions

129 x 79.9 x 13 mm

129.5 x 80.8 x 18.8 mm

Weight

86g

108g


RECOMMENDED ARTICLE FOR TECHWORLD


 
Fortinet’s Newest Sandbox Solution Recommended by NSS Labs
Techworld Date Posted: 26 October 2017 1:39 PM | 918 Views
Fortinet® (NASDAQ: FTNT), the global leader in high-performance cybersecurity solutions, today announced the results of the latest NSS Labs Breach Detection System (BDS) group test.. See More
 
Fortinet’s Newest Sandbox Solution Recommended by NSS Labs
Techworld Date Posted: 1:39 PM | 918 Views
Fortinet® (NASDAQ: FTNT), the global leader in high-performance cybersecurity solutions, today announced the results of the latest NSS Labs Breach Detection System (BDS) group test.See More

 
Apacer Launches the AH336 and AC233 in Partnership with P714
Techworld Date Posted: 3 November 2017 10:45 AM | 359 Views
When pursuing a dream, we all need the support and company of friends. Apacer partnered with P714, a Taiwanese illustration brand famous for their heartwarming, adorable designs, in creating 3 special edition flash drives.... See More
 
Apacer Launches the AH336 and AC233 in Partnership with P714
Techworld Date Posted: 10:45 AM | 359 Views
When pursuing a dream, we all need the support and company of friends. Apacer partnered with P714, a Taiwanese illustration brand famous for their heartwarming, adorable designs, in creating 3 special edition flash drives...See More

 
New Variant of SynAck Ransomware Uses Sophisticated Doppelgänging Technique to Evade Security
Techworld Date Posted: 31 May 2018 10:59 AM | 286 Views
Kaspersky Lab researchers have discovered a new variant of the SynAck ransomware Trojan using the Doppelgänging technique to bypass anti-virus security by hiding in legitimate processes. This is the first time the Doppelgänging technique.... See More
 
New Variant of SynAck Ransomware Uses Sophisticated Doppelgänging Technique to Evade Security
Techworld Date Posted: 10:59 AM | 286 Views
Kaspersky Lab researchers have discovered a new variant of the SynAck ransomware Trojan using the Doppelgänging technique to bypass anti-virus security by hiding in legitimate processes. This is the first time the Doppelgänging technique...See More

 
Kaspersky Lab Warns of Dangers of ‘Balkanisation’ at Its 4th APAC Cyber Security Summit
Techworld Date Posted: 26 September 2018 4:00 PM | 151 Views
Kaspersky Lab presented the cybersecurity risks that can result from Balkanisation in cyberspace — the fragmentation of the world wide web, during its 4th Asia Pacific (APAC) Cyber Security Weekend in Siem Reap, Cambodia.. See More
 
Kaspersky Lab Warns of Dangers of ‘Balkanisation’ at Its 4th APAC Cyber Security Summit
Techworld Date Posted: 4:00 PM | 151 Views
Kaspersky Lab presented the cybersecurity risks that can result from Balkanisation in cyberspace — the fragmentation of the world wide web, during its 4th Asia Pacific (APAC) Cyber Security Weekend in Siem Reap, Cambodia.See More

 
Streaming Movie Baywatch (2017)
Techworld Date Posted: 16 September 2017 9:37 AM | 201 Views
Fast-paced, on-the-go, and with a crucial priority for high-speed connectivity, the world today has increasingly higher and higher demands for the best Internet performance-and your Small Office/Home Office (SOHO) environment is no exception. Powered.... See More
 
Streaming Movie Baywatch (2017)
Techworld Date Posted: 9:37 AM | 201 Views
Fast-paced, on-the-go, and with a crucial priority for high-speed connectivity, the world today has increasingly higher and higher demands for the best Internet performance-and your Small Office/Home Office (SOHO) environment is no exception. Powered...See More

 
Half of Businesses Find It Hard to Identify a Serious Security Breach. Do You?
Techworld Date Posted: 8 November 2017 4:53 PM | 279 Views
Prevention is still the main pillar of corporate cybersecurity, says the report ‘New Threats, New Mindset: Being Risk Ready in a World of Complex Attacks’ from Kaspersky Lab.. See More
 
Half of Businesses Find It Hard to Identify a Serious Security Breach. Do You?
Techworld Date Posted: 4:53 PM | 279 Views
Prevention is still the main pillar of corporate cybersecurity, says the report ‘New Threats, New Mindset: Being Risk Ready in a World of Complex Attacks’ from Kaspersky Lab.See More

 
ASUS Announces Z370 Series Motherboards
Techworld Date Posted: 30 September 2017 9:37 AM | 410 Views
The arrival of the 8th Generation Intel CoreTM processors marks the latest launch of a new consumer-oriented desktop platform this year, one with unprecedented power and responsiveness. Otherwise known as Coffee Lake, these new.... See More
 
ASUS Announces Z370 Series Motherboards
Techworld Date Posted: 9:37 AM | 410 Views
The arrival of the 8th Generation Intel CoreTM processors marks the latest launch of a new consumer-oriented desktop platform this year, one with unprecedented power and responsiveness. Otherwise known as Coffee Lake, these new...See More

 
Fortinet Reports Third Quarter 2018 Financial Results
Techworld Date Posted: 6 November 2018 4:07 PM | 139 Views
Fortinet® (Nasdaq: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, has announced financial results for the third quarter of 2018.. See More
 
Fortinet Reports Third Quarter 2018 Financial Results
Techworld Date Posted: 4:07 PM | 139 Views
Fortinet® (Nasdaq: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, has announced financial results for the third quarter of 2018.See More

 
ADATA to Showcase Its Latest Industrial and Commercial Solutions at Flash Memory Summit 2018
Techworld Date Posted: 1 August 2018 2:12 PM | 273 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules and NAND Flash products, is pleased to announce that it will be at the Flash Memory Summit 2018 (Booth 714), one of the most important.... See More
 
ADATA to Showcase Its Latest Industrial and Commercial Solutions at Flash Memory Summit 2018
Techworld Date Posted: 2:12 PM | 273 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules and NAND Flash products, is pleased to announce that it will be at the Flash Memory Summit 2018 (Booth 714), one of the most important...See More

 
Industrial Cybersecurity Threat Landscape in H1 2017: Every Third ICS Computer Under Attack Was in Manufacturing Companies
Techworld Date Posted: 14 October 2017 1:53 PM | 269 Views
In the first half of the year manufacturing companies were most susceptible: ICS computers of them accounted for about one-third of all attacks, according to the Kaspersky Lab report “Threat Landscape for Industrial Automation.... See More
 
Industrial Cybersecurity Threat Landscape in H1 2017: Every Third ICS Computer Under Attack Was in Manufacturing Companies
Techworld Date Posted: 1:53 PM | 269 Views
In the first half of the year manufacturing companies were most susceptible: ICS computers of them accounted for about one-third of all attacks, according to the Kaspersky Lab report “Threat Landscape for Industrial Automation...See More


Power by

Download Free AZ | Free Wordpress Themes