Feeds
90%
Crucial CT256M225

Crucial CT256M225 256GB SSD

The best value solid-state drive yet?

  • alert
  • submit to reddit

High performance access to file storage

If you take the two sets of synthetic benchmarks together, the Patriot and Crucial SSDs have the same level of performance. However, the variations in write speeds are noteworthy.

ATTO Test Results
Crucial CT256M225

Crucial CT256M225

In our real-world file transfer tests, we copy folders that contain 2GB of files. We started, as usual, by transferring files within the drive and saw that the time taken for the test was pretty much identical for the Patriot and the Crucial. When you consider that the two drives are very similar, apart from their capacity, this is what we expected to see.

Transferring files from one drive to another revealed a more complex situation. When we used a second-generation Intel X25-M drive as the other half of the pair we saw that the Crucial SSD was marginally slower than the Patriot when reading files from the Intel drive. That’s marginal as in a fraction of a second out of 16 seconds, which equates to around six per cent. By contrast, when we read files from the test drive and wrote them to the Intel X25-M, we found that the Crucial drive was significantly faster than the Patriot to the tune of five seconds with big movie files and ten seconds with smaller music files. That’s a huge margin of 25 per cent in favour of the Crucial.

As a final test we switched the paired SSD from the 160GB X25-M to the older, first-gen 80GB X25-M and this threw up some more oddities.

ATTO Test Results
Intel X-25M 2G

Crucial CT256M225

When we transferred files between the original X25-M and the Patriot all of the transfer speeds slowed by a significant amount. In the case of the Crucial drive, the read times were unaffected but the write times took a similar clobbering to those that we saw on the Patriot.

High performance access to file storage

Next page: Verdict

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.