Sonnet Announces Latest Echo Thunderbolt Docking Station
Sonnet Technologies has announced the Echo 11 Thunderbolt4 Dock, the latest model in the company’s Echo family of Thunderbolt docking stations.
The Echo 11 dock has four Thunderbolt 4 ports, three USB 3.2 Gen 2 (10Gbps) Type A ports, one USB 2.0 Type A charging port, one RJ45 Gigabit Ethernet port, one 3.5 mm combo audio port, and one SD 4.0 card slot. The dock is compatible with all computers equipped with Thunderbolt 4 ports, M1 Mac computers with Thunderbolt/USB ports, Intel Mac computers with Thunderbolt 3 ports, and more recent Windows computers with Thunderbolt 3 ports.
All Thunderbolt docking stations act as central hubs for indirect attachment of peripherals such as storage devices, input devices and headphones to a computer that typically often lacks the required number of ports in its own chassis. Thunderbolt 4 Dock then overcomes this limitation on number of ports on a computer by enabling the connection of up to 16 devices at once, including up to two monitors, as well as charging the computer with up to 90 watts of power, supporting wired network connectivity, and providing the ability to read SD memory cards. With its mix of three 10 Gbps USB Type A ports and three 40Gbps Thunderbolt 4 (USB-C) peripheral ports, the company claims the Echo dock connects almost all relevant current and legacy devices, while supporting high-performance peripherals.
You might also like...
Live Sports Production: Part 1 - New Sports Production Workflows
Welcome to Part 1 of ‘Live Sports Production’ - This new multi-part series uses a round table style format to explore the technology of live sports production with some of the industry’s leading system designers. It is a fascinating insight i…
Automating HDR-SDR Conversion
Automation seems like an obvious solution but effective conversion involves understanding what the image content is and therefore what the priorities are for how it should look.
Building Software Defined Infrastructure: Virtualization Vs Microservices
How virtualization and microservices differ, and workflows where virtualization and microservices would be used or avoided in terms of reliability, flexibility and security.
IP Security For Broadcasters: Part 8 - RADIUS Network Access
Maintaining controlled access is critical for any secure network, especially when working with high-value media in broadcast environments.
Standards: Part 25 - Designing Client-Side Video Players
Here we chart the historical development of client-side video players, describe the building blocks used to create them and the relevant standards.