Power Consumption

The Extreme Pro supports both DevSLP and slumber power. We are still working on a way to measure DevSLP power but in the mean time, we have to rely on slumber power measurements. Slumber power consumption is quite average -- it's not the most efficient drive we have tested but 100mW is pretty typical for a high performance SSD. What is awesome, however, is the load power consumption, because the drive doesn't exceed 3W in any case and stays at around 2W when under random write workload. Out of the high performance SSDs, the Extreme Pro is definitely the most power efficient because it supports DevSLP and slumber states, yet the load power consumption is very low too.

SSD Slumber Power (HIPM+DIPM) - 5V Rail

Drive Power Consumption - Sequential Write

Drive Power Consumption - Random Write

Performance vs. Transfer Size Final Words
Comments Locked

85 Comments

View All Comments

  • vaayu64 - Tuesday, June 17, 2014 - link

    Look for the review here on anandtech....
  • Shiitaki - Monday, June 16, 2014 - link

    Actually, Samsung sells the 840 EVO up to 1TB in a msata.
  • apertotes - Monday, June 16, 2014 - link

    Well, I am just a simple architect, and probably I am not representative of Anandtech userbase, but, why do you feel hardware encryption is so important? Am I missing something? Should I be worried that my hard drives are not encrypted?
  • r3loaded - Monday, June 16, 2014 - link

    I'm wondering about the focus on encryption too. I have a Samsung Evo in my Sandy Bridge desktop machine and it supposedly supports this Opal hardware encryption. Trouble is, I have no idea how to enable it. Apparently, I can set a disk password but I see no option for that in my computer's firmware. Someone mentioned enabling BitLocker in Windows 8.1, but I get an error message saying my system doesn't have a TPM chip. I have zero idea how to go about enabling it on Linux, but I suppose dm-crypt for software encryption should work just fine.
  • andychow - Monday, June 16, 2014 - link

    I don't get it either. If your file system is not encrypted, then simply plugin the ssd to another machine and get all the data. If your file system is encrypted, then what does it matter if the hardware is encrypted? I think they just offer it because it costs them almost nothing to have a hardware encryption chip, and enterprises like buzzwords.

    @reloaded, you don't have to enable it, it's always on. The password is on the controller, if you destroy that, the data could not be recuperated. But why would you destroy the controller and not the rest of the drive is beyond me.

    I personally don't see the point.
  • chiechien - Tuesday, June 17, 2014 - link

    Your BIOS has to support disk passwords, and you have to enable it. For drives with hardware encryption, the ATA/disk/whatever password has to be known to get at the encryption key, otherwise it's just left at some default that every machine can read.
  • Kristian Vättö - Tuesday, June 17, 2014 - link

    Hardware encryption means that the encryption is done by the hardware rather than software. The benefit is that because it's done at the device-level, it doesn't consume the host CPU like software encryption and it's more secure.

    While SSDs often encrypt all data that is written to them, you still have to enable encryption from the host to ensure that the data can't be accessed by a third party. Otherwise the SSD think that any machine (and user) is allowed to access the data.
  • thomas-hrb - Monday, June 16, 2014 - link

    Good point, personally encryption at the hardware level is not important to me. I find common sense and protection of property out weighs the continuous management overhead of encryption keys especially for a developer like me who regularly and repeatedly reformats partitions.

    Especially when working with cloudbased/corporate share online only storage. I do wonder however, I have a samsung 840 pro (256GIB version) I have 2 vertex4's (256 GiB version). I have on many occasions rebuilt/reformatted and transplanted my SSD's from one machine to the next. I don't know if I have to explicitly enable/disable the feature on the SSD, but IMHO, if I could easily read the SSD contents simply by moving it to another computer, then what ever encryption is on the drive is simply not effective.
  • chiechien - Tuesday, June 17, 2014 - link

    The Samsung (and probably the Vertex) encrypts (just by the nature of how it works) everything that is written to the drive as a matter of course. Unless you set an ATA password in your BIOS, though, the password/encryption key/whatever is left 'blank' or default or whatever, so it is readable by any other motherboard. If you set an ATA password, though, that changes the encryption key, you will probably have to wipe the drive to enable it, and then the drive will not be readable in another system unless you also configure it for ATA passwords as well, and then type it in.
  • hojnikb - Monday, June 16, 2014 - link

    I wonder why Sandisk didn't went with marvel *89 controller ?

Log in

Don't have an account? Sign up now