Feeds
90%
Crucial CT256M225

Crucial CT256M225 256GB SSD

The best value solid-state drive yet?

  • alert
  • submit to reddit

High performance access to file storage

If you take the two sets of synthetic benchmarks together, the Patriot and Crucial SSDs have the same level of performance. However, the variations in write speeds are noteworthy.

ATTO Test Results
Crucial CT256M225

Crucial CT256M225

In our real-world file transfer tests, we copy folders that contain 2GB of files. We started, as usual, by transferring files within the drive and saw that the time taken for the test was pretty much identical for the Patriot and the Crucial. When you consider that the two drives are very similar, apart from their capacity, this is what we expected to see.

Transferring files from one drive to another revealed a more complex situation. When we used a second-generation Intel X25-M drive as the other half of the pair we saw that the Crucial SSD was marginally slower than the Patriot when reading files from the Intel drive. That’s marginal as in a fraction of a second out of 16 seconds, which equates to around six per cent. By contrast, when we read files from the test drive and wrote them to the Intel X25-M, we found that the Crucial drive was significantly faster than the Patriot to the tune of five seconds with big movie files and ten seconds with smaller music files. That’s a huge margin of 25 per cent in favour of the Crucial.

As a final test we switched the paired SSD from the 160GB X25-M to the older, first-gen 80GB X25-M and this threw up some more oddities.

ATTO Test Results
Intel X-25M 2G

Crucial CT256M225

When we transferred files between the original X25-M and the Patriot all of the transfer speeds slowed by a significant amount. In the case of the Crucial drive, the read times were unaffected but the write times took a similar clobbering to those that we saw on the Patriot.

Combat fraud and increase customer satisfaction

Next page: Verdict

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.