Feeds

The return of the diskless PC

1TB SSDs to free desktops from slow HDD strangulation

High performance access to file storage

The diskless PC is to return - not as a thin client, but packing a 1TB solid state drive instead. OCZ is showing Colossus, a prototype of this, at Computex in Taiwan.

Unlike OCZ's Z-Drive, a PCIe-connected 1TB SSD shown at this year's CeBIT, Colossus comes in a standard 3.5-inch drive bay form factor. This format is generally used for hard drive storage arrays and server and desktop drive bays, with the 2.5-inch format, which many SSDs use, designed into notebook computers.

According to reports, Colossus uses Samsung flash chips and has two Indilinx controllers, plus a JMicron RAID controller. It offers read and write performance up to 265MB/sec though a 3Gbit/s SATA connection.

The Z-Drive is much faster, offering 510MB/sec read performance and 480MB/sec write, although the sustained write speed drops to 200MB/sec.

The idea of getting back to PCs that zip through applications instead of lumbering along waiting for the disk I/O is obviously attractive. We all know that Microsoft just cannot write a fast system anymore: Windows 7 is not going to turn our desktop Hummers into Ferraris, any more than Windows Vista did. No, the Windows O/S is a dog, and replacing the hard drive with an SSD looks to be the only practical way of turning our desktop mutt into a greyhound.

One terabyte SSDs show that the capacity needed is here. Now we want the price to drop. Imagine the SSD sales boost if masses of desktop users could afford to retrofit SSDs to their PCs by swapping out a hard drive. That's got to be exciting SSD suppliers in a big way. It's also surely got to be a big interest of PC suppliers needing a sales boost and not getting one from new versions of either the Windows O/S or Intel CPUs.

The price decrease needed for desktop HDD-replacement SSDs to become generally affordable is substantial, but we may be seeing the start of such desktop HDD replacement in 2011, possibly sooner.

The Colossus device may hit retail outlets in six to eight weeks in 512GB and 1TB configurations, and cost around €2,500 for 1TB. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.