Feeds
70%
Western Digital My Book Live

Western Digital My Book Live Nas box

Homelan security?

  • alert
  • submit to reddit

Top three mobile application threats

Review Western Digital’s My Book line of drives spans nearly all areas of external storage, supporting fast modern interfaces from FireWire 800 and eSATA to USB 3.0. Yet the My Book Live is network drive and, in terms of connectivity, sports nothing more than a DC input and a gigabit Ethernet port.

Western Digital My Book Live

Silent running: Western Digital My Book Live

Available in both one and two terabyte capacities, Western Digital claims 100MB/s read performance for the My Book Live. WD’s instantly recognisable My Book enclosure makes another appearance here, which is likely to disappoint some potential purchasers familiar with this design. Alas it’s not the most stable upright drive and prone to topple with the slightest nudge – not exactly ideal when your precious data is spinning at speeds in excess of 5000 RPM.

Vertical challenges aside, the My Book Live is passively cooled, as always. For those wanting a quiet Nas box to sit on their desk, this is ideal. However, much like every other WD drive that has utilised this enclosure, the Live runs fairly hot under load.

Admittedly, I have been impressed by the performance of other models in Western Digital’s My Book line in the past – notably, the USB 3.0-equipped My Book 3.0. So I had high hopes that the My Book Live would live up to its claimed 100MB/s performance.

Testing with Crystal DiskMark 3.0 using a 1GB file size resulted in a maximum read rate of 48.33 MB/s, just under half of what the spec suggests. Inevitably conditions vary and different file sizes may produce a peak throughput. Still, the My Book Live is certainly not the slowest Nas box I’ve encountered by a long shot. Yet while it apparently doesn’t deliver in terms of claimed throughput, some of its other features certainly hit the spot.

Western Digital My Book Live

Power and networking ports – yup, that's it for connectivity

Seven Steps to Software Security

Next page: Streaming ahead

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.