Stories
Slash Boxes
Comments

SoylentNews is people

posted by n1 on Tuesday July 07 2015, @10:01AM   Printer-friendly
from the always-more-data-to-store dept.

Big things can come in small packages. According to Computerworld, Samsung has released the world's first 2 TB consumer SSDs:

Samsung today announced what it is calling the first multi-terabyte consumer solid-state drive (SSD), which will offer 2TB of capacity in a 2.5-in. form factor for laptops and desktops.

[...] The 850 Pro is designed for power users and client PCs that may need higher performance with up to 550MBps sequential read and 520MBps sequential write rates and up to 100,000 random I/Os per second (IOPS). The 850 EVO SSD has slightly lower performance with 540MBps and 520MBps sequential read/write rates and up to 90,000 random IOPS.

The 2TB model of the 850 Pro will retail for $999.99 and the 850 EVO will sell for $799.99.

The 1TB EVO SSD will retail for $399; the 500GB for $179; the 250GB for $99 and the 120GB for $69. The 1TB 850 Pro will retail for $499; the 512GB model for $259; the 256GB model for $144.99 and the 128GB model for $99.

[...] Samsung guarantees the 2TB 850 Pro for 10 years or 300 terabytes written (TBW), and the 2TB 850 EVO for five years or 150 TBW.

To put that in perspective, there are approximately 7 billion people on earth. One of these drives has sufficient space to keep about 285 bytes of information on every single person on the planet! Put another way, that is over 6 KB for every single person in the USA.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Insightful) by LoRdTAW on Tuesday July 07 2015, @01:39PM

    by LoRdTAW (3755) on Tuesday July 07 2015, @01:39PM (#206102) Journal

    I had one computer where I used the SSD's native encryption and then subsequently attempted to move that SSD to a new computer. The new computer didn't like it at all - couldn't even wipe the disk. Had to move it back to the old computer, turn off the encryption, then move it back to the new computer and then everything was fine. Might just have been an incompetent BIOS - I hope matters have improved since.

    Sounds like the disk encryption worked exactly as it should. Think about that. If you are paranoid enough to enable full disk encryption, why even consider that disk be useable on a foreign machine?

    Starting Score:    1  point
    Moderation   +4  
       Insightful=3, Informative=1, Total=4
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 2) by lentilla on Tuesday July 07 2015, @02:30PM

    by lentilla (1770) on Tuesday July 07 2015, @02:30PM (#206123)

    I hadn't considered it like that! Given that I "unlocked" the drive with a password on the old computer, I expected it to unlock on the new computer with the same password. It hadn't occurred to me that it would be locked to the original computer.

    There are times when having a disk locked forever to its original host could be useful. On the other hand, I like knowing that if a computer dies I can at least read the data off the disk on another machine.

    These Samsung drives in the parent article - would they only be accessible to the computer that originally locked them? So (for instance), if the CPU fries, the data on the disk is effectively gone?

    If you are paranoid enough to enable full disk encryption

    I strongly believe all computers should have full disk encryption - even if it has a blank passphrase. We store too much of our identity that letting people resurface from a dumpster-dive with a digital treasure trove is too much of a risky proposition. Even with a blank passphrase, trashing the contents of your disk is as simple as deleting the key and only takes a few seconds.

    • (Score: 2) by tangomargarine on Tuesday July 07 2015, @03:04PM

      by tangomargarine (667) on Tuesday July 07 2015, @03:04PM (#206134)

      Not having the data be readable on another machine doesn't preclude the ability to wipe and start from scratch, I wouldn't think.

      --
      "Is that really true?" "I just spent the last hour telling you to think for yourself! Didn't you hear anything I said?"
      • (Score: 2) by LoRdTAW on Tuesday July 07 2015, @03:14PM

        by LoRdTAW (3755) on Tuesday July 07 2015, @03:14PM (#206137) Journal

        I would almost consider that a feature. Then again, if your computer craps out, then how would you ever recover? Then again ... backups.

        • (Score: 2) by TheRaven on Wednesday July 08 2015, @08:25AM

          by TheRaven (270) on Wednesday July 08 2015, @08:25AM (#206387) Journal
          Normally, you'd need to explicitly dump the keys from the old computer (and store them safely!) and then have a different procedure for recovering. I think Microsoft's BitKeeper can do this if you have a TPM - the password authorises the TPM to do the decryption, but the keys are stored in the TPM. When you first initialise the disk, they're generated in software and can be backed up, after that they're inaccessible (so make sure that it's backed up!). I seem to recall some vulnerabilities in how BitKeeper uses AES that may make it possible to recover without the keys, but certainly not trivial.
          --
          sudo mod me up