Feeds
90%
TwoBig 48pixels

LaCie Two Big 1TB eSATA drive

A terabyte of hot-swappable storage... on your desk

High performance access to file storage

OK, the Two Big isn't for everyone, as you've most likely figured out by now. But if you're in need of a humongous external drive that performs as fast as an internal SATA drive, then this is the one for you. Sure, there are some limitations of what you can connect an eSATA drive to, but LaCie has already thought of this one and kindly bundles a PCI-X 133 eSATA card with the Two Big. This offers four eSATA ports and is backwards-compatible with 64- and 32-bit PCI slots.

The Two Big also comes supplied with a 2m eSATA cable, a power adaptor, two stands that clip on to the base of the case, and four rubber feet that can be stuck to the case.

TwoBig 3qtr

One advantage that SATA shares with USB and Firewire is that you can add and remove drives without having to set the hard drives up in the motherboard's BIOS. This is handy if you want to use the Two Big to move large amounts of information from one location to another with minimal fuss.

As LaCie caters mainly for the Mac market - the G5 Power Macs have PCI-X slots ready for LaCie's eSATA card - it makes sense supplying a PCI-X card with the drive. However, for PC users PCI-X is usually only found only in servers or high-end workstations. If you really fancy a desktop board with PCI-X slots then Asus has the P5WDG2-WS which has two of them.

However, it would be much easier to get a motherboard with an eSATA connector already fitted too it, and there are several manufacturers that have offered this for some time now. The other advantage of using a built-in SATA controller is that most of them should offer speed advantages over the add-in card, at least on a PC. For Mac users the add-in card would be the way to go and it should offer much better speeds than the ones I achieved using a standard 32-bit 33MHz PCI slot.

I used the Asus A8R32-MVP Deluxe's on-board eSATA PCI Express controller to run some additional benchmarks to see if a faster interface made any actual difference. The good news is that it did, but not as much as I hoped for.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.