![]() Why these drives? Because they have an average seq read speed of 155 MB/s (source: ), and four of them makes 620 MB/s total seq read speed in RAID0. And in my case it's fairly simple: using RAID0 for speed only, I assume it will fail at some point, so backups should always be in place.ītw, if you're interested - planning my software RAID0 like this now:Ĥ-bay JBOD enclosure, USB 3.0 and/or eSATAģ or 4 x Seagate Barracuda ST4000DM005 4TB ![]() The programme SoftRAID has some monitoring tools for disk status. Unless you're immediately going into the $10k price range, software RAID nowadays seems on par with hardware RAID. ![]() I'm curious to hear why you still feel hardware RAID might be better suited for my needs? I'm using Premiere Pro CC and a bit of Davinci Resolve 14. I've been researching this for quite a couple of days now - about time to pull the trigger. You can check out other models in these series for 2 bay, or with hardware RAID.Ĭheers, I think this setup would be decent enough indeed. Judging by the looks of the enclosure, I suspect you could also look into the brands Startech and Mediasonic - they seem to be the same products, just a different brand name for a different market. For the project files, media cache and exports I am considering an SSD however.īopajuice, looking into these JBOD enclosures:įantec QB-35US3-6G. The HDD's I'm after I at least select based on their sequential read speeds - since they'll almost exclusively will be read from when editing in my NLE. For me it's therefore all about the combination speed and disk space, hence RAID using HDD's. However, apart from smaller and short-term commercial projects, I also work on long-term documentary films with potentially dozens, if not hundreds of hours of material, easily leading to multiple TB's even in ProRes Proxy. It seems like any JBOD enclosure would do the trick for software RAID then.Ĭoldcase, I definitely see your point. Thanks for your feedback, casperes1996 and ColdCase. NLE project files, media cache and exports will reside on / got to another disk. Its footage (RAW / proxy) will be properly backed up on an archival disk. I'll be using this RAID0 as a fast disk for source / proxy footage, to edit from. are the cooling systems a significant difference between the two?Ĭonsidering this RAID0 setup for my video editing needs. Would any of you have insights concerning the following?ġ Am I correct to I believe you can use any JBOD enclosure, without any RAID hardware controllers built in, for RAID? That is, can and will the disks inside be seen by the OS as separate disks? Or are there certain JBOD enclosures that "force" its disks to be seen as a single big disk, rendering such an enclosure unable to be set up into a software RAID?Ģ What are the differences between a JBOD enclosure and a RAID enclosure, apart from the RAID hardware controller in the RAID enclosure? F.i. Filesystems: What filesystems are supported.I'm considering setting up a RAID0 system, using 3 / 4 disks, through a combination of a JBOD enclosure and software RAID, either MacOS's own software or SoftRAID. ![]() Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2.Multiple keys: Whether an encrypted volume can have more than one active key.Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords.Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others. Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established) can be created for deniable encryption.TrueCrypt License Version 3.0 (legacy code only) Trend Micro Endpoint Encryption (Mobile Armor) PGP Corporation (acquired by Symantec in 2010) NetLib Encryptionizer (directory encryption) Source Auditable for Commercial Customersĭustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) This is a technical feature comparison of different disk encryption software.
0 Comments
Leave a Reply. |