Feeds

Seagate's flash cache drive rocket

Ten times faster Photoshop load

Secure remote control for conventional and virtual desktops

A user of the flash cache-enabled Seagate Momentus XT drive reports a tenfold improvement in PhotoShop application load time and three times faster startup.

It is only anecdotal evidence from one user on his amnesiablog but it is compelling. He has a Windows 7, Core2Duo notebook with 2GB of RAM and replaced the had drive with the Momentus XT and its 4GB of NAND flash cache. Software on the drive populates the cache with the most popular files and applications so that they are accessed faster.

The times, recorded via an Android phone's stopwatch, were 2 minutes for starting up with the old hard drive versus 37 seconds with the Momentus XT. Hibernation time was reduced from 1.5 minutes to 22 secs and resume time decreased from 1 minute 55 secs to 27 secs. PhotoShop startup time went from 45 secs to 4.3 secs, a better than 10X reduction, with Powerpoint doing roughly the same; 20 secs to 2 secs. There was an initial improvement with the XT but it took four startup-shut down cycles for the improvement to each these levels and stabilise.

These are startling improvements and for PC and notebook users frustrated by slow Windows startup, hibernation and application load times the Momentus XT looks like a much cheaper alternative to a solid state drive. There wouldn't be a commensurate improvement in file write times as its read caching that is being offered so Quark users looking to speed up lengthy document saves won't see any change. But Quark itself should load faster.

We will surely see PC and notebook suppliers offering the Momentus XT pre-installed; it will give their systems a startup and application load edge over the hard drive only competition. As experience with the Momentus XT hopefully shows it doesn't lose performance as it ages then there could be a torrent of desktop and notebook owners looking to speed boost their Windows systems with a does of Momentum XT rocket fuel. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.