Feeds
80%
SanDisk Extreme 120GB SDSSDX-120G-G25

SanDisk Extreme 120GB SSD

Sata 3 Sandforce speedster

  • alert
  • submit to reddit

High performance access to file storage

Review Another week and yet another new range of Sandforce controlled drives has been pitched into battle in an already crowded market place. Still, here’s hoping the increased competition will impact on prices. Arriving hard on the heels of Intel’s new 520 range reviewed recently, is the Extreme series from flash memory experts SanDisk – the company’s second generation of consumer drives using a Sandforce controller.

SanDisk Extreme 120GB SDSSDX-120G-G25

Second time around: SanDisk's Extreme SSD

While better known for its range of Compact Flash and SD products, SanDisk was actually among the very first companies to release an SSD into the mainstream market. The U5000 appeared in 2007 and had a whopping 32GB of capacity. Soon after, the company seemingly disappeared off the radar as far as mainstream SSD’s were concerned, returning to the fray in 2011 with the launch of the Ultra range of drives.

As with the Ultra series, the Extreme drives use a Sandforce controller but in this case it is the ubiquitous Sandforce SF2281VB1-SDC with its 6Gb/s interface. Yet unlike many of the drives with this controller on-board that rely on Sandforce’s own firmware, the one in the Extreme has SanDisk custom coded (R112) firmware.

SanDisk Extreme 120GB SDSSDX-120G-G25

Sandforce controller, but the SanDisk Extreme has its own firmware

At the time of writing, the line-up consists of just two capacities – the 120GB model, which is on test here, and a 240GB version. A third drive, the flagship 480GB version, is on the way. The quoted sequential read/write performance for the range is 550/510MB/s for the 120GB drive, 550/520MB/s for the 240GB while the 480 is quoted at 540MB/s reads and 460MB/s writes. The 120GB drive has a quoted random read/write performance of up to 23,000IOPS and 83,000IOPS respectively.

SanDisk Extreme 120GB SDSSDX-120G-G25

High performance access to file storage

Next page: Up to the test

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
FOUR DAYS: That's how long it took to crack Galaxy S5 fingerscanner
Sammy's newbie cooked slower than iPhone, also costs more to build
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.