WD's Purple reign continues: 12TB helium disks for vid spy tech

Eight platters serving up 1.5TB each for data-belching surveillance cameras

Video surveillance is an insatiable monster, constantly needing more digital storage – and Western Digital is now feeding it 12TB drives.

WD's Purple hard disk family this week had a 20 per cent jump in capacity, from 10TB to 12TB, courtesy of incrementing the platter count by one to eight, and an increase in per-platter capacity to 1.5TB from 1.4TB. Like the 10TB Purple drive, this new 12TB HDD is filled with helium, and it spins at 7,200rpm. It has a 256MB cache, and delivers data at a sustained rate of 245MB/sec though a 6Gbit/s SATA interface.

Also, like the 10TB Purple spinner, it has technology to smooth video-stream recording, branded as AllFrame AI tech, and time-limited error-recovery to make RAID rebuilds faster. The latest drive has a 1.5 million hour MTBF rating, supports 24x7 operation, has a 360TB/year workload rating, and a three-year warranty.

The mechanics are basically the same as the WD Gold nearline 12TB drive. That drive is higher-spec'd than the 12TB Purple, with a five-year warranty, 2.5 million-hour MTBF rating, and 550TB/year workload.

Toshiba has an MG07 ACA 12TB drive with eight platters, and a 14TB device with nine platters, both helium-filled and spinning at 7,200rpm. It is not specifically for video surveillance. Seagate's SkyHawk video-surveillance HDDs top out at 10TB, with seven platters. Not for much longer we expect.

Check out a WD Purple HDD data sheet here. ®

Similar topics

Other stories you might like

  • Western Digital open to spinning out flash, hard disk businesses
    Messrs Elliott strike again

    Western Digital has confirmed the board is considering "strategic alternatives" for the storage supplier, including spinning out its flash and hard disk businesses.

    This follows calls last month by activist investor Elliott Management, which has amassed a $1 billion investment in WD equating to a six percent share stake, for a "full separation" based on those product lines.

    In a statement, CEO David Goeckeler said: "The board is aligned in the belief that maximizing value creation warrants a comprehensive assessment of strategic alternatives focused on structural options for the company's Flash and HDD businesses.

    Continue reading
  • Elliott Management to WDC board: Spin out or sell flash biz
    HDD and NAND memory maker has 'underperformed by any objective measure'

    Updated Activist investor Elliott Management is pushing for Western Digital Corporation's board to break the business in two by splitting the hard disk drive and NAND flash divisions into separately traded entities.

    In an open letter to the board [PDF], Elliott – which has over time invested roughly $1 billion in WDC, representing about a 6 percent stake – says it is almost six years since WD bought SanDisk for $19 billion, scooping up its NAND memory biz.

    At the time, this purchase was "nothing less than transformative", the letter adds, propelling five-decade-old WDC beyond HDDs into one of the biggest players in flash. Synergies, a better strategic position, and enhanced financial profile were among the rationale for the deal, says Elliott.

    Continue reading
  • Western Digital tells EdgeRover users to patch app again
    Critical vulnerability may have allowed an attacker to escalate local privileges

    Users of Western Digital's EdgeRover app for Windows and Mac are advised to download an updated version to avoid a security flaw that might allow an attacker unauthorized access to directories and files.

    The flaw, which was given the CVE identification number CVE-2022-22988, carries a Common Vulnerability Scoring System (CVSS) severity rating of 9.1, making it a critical weakness. It has now been addressed, however, with a modification to the way EdgeRover handles file and directory permissions.

    According to Western Digital, the flaw meant that EdgeRover was subject to a directory traversal vulnerability, which may have allowed an attacker to carry out a local privilege escalation and bypass file system sandboxing. If successfully exploited, this could lead to the disclosure of sensitive information or even a potential denial-of-service attack, the firm said.

    Continue reading

Biting the hand that feeds IT © 1998–2022