Firmware revision MU04 for the Crucial MX200 (all form factors) is now available. This firmware update applies to the MX200 SSD (all form factors), and should not be applied to any other Crucial SSD model. Currently, the firmware update is only available through the Crucial Storage Executive. An iso (manual boot file) will be made available later today 6/30/2016 at the link below:
Release Date: 06/30/2016
Reduced resume from DEVSLP time
Improved drive error handling
Improved random read performance for some workloads
Improved Async Powerloss recovery
Thermal Throttling may not engage, issue introduced in MU03
Additional details can be found in the firmware guide.
... View more
Before you can use your new SSD with your Mac, or install OS X onto it, you have to initialize and partition it first. Follow the steps in this article if you are using OS X El Capitan or later. If you have not upgraded, follow our guide for earlier versions of OS X.
1. If you are adding a drive to an existing setup, connect the SSD via USB adapter or other external connection method and enter Disk Utility, or install the SSD internally into your system and enter Disk Utility via the OS X Recovery tool or your installation media. When the SSD is noticed by the Mac, you will see a message telling you that the drive cannot be read by this computer. In this message, click the button Initialize.
2. The Crucial SSD will be listed in Disk Utility. Highlight the SSD and click the Erase button.
3. Type in the name you would like for the new partition and verify that it's set to "GUID Partition Table".
4. Verify that the selected format has defaulted to "Mac OS Extended (Journaled)".
5. Select Erase. The drive will now be partitioned and formatted.
6. When the Disk Utility is done, close it.
The SSD should now be visible on your desktop with the new name you gave it, as well as during the drive selection menu if your run an OSx installer.
If you need assistance with the physical installation of your SSD, we offer guides for installing a replacement SSD here.
... View more
What is density?
The density of a memory module is determined by the small black DRAM chips that make up the memory module. The fewer chips there are on the module, the higher the density. High density modules process the same amount of information at the same speed as low density parts, but they use fewer chips. Fewer components also cost less to manufacture, and the end user won’t notice a performance difference.
Will high or low density parts work with my original memory?
Your system will most likely accept either type without any issues, and we manufacture and sell both types of memory. However, if you are mixing the new memory with your existing memory, you may want to try to match the memory modules as closely as possible. It is possible, though not common, to experience incompatibility issues when trying to mix high and low density modules together. It is recommended to match your original memory as closely as possible for optimal performance.
Which is better, high density or low density?
Truly, there is no difference in performance to you, the end user. It can be likened to a lug pattern on a wheel. The wheels are going to work the same – the difference is in how they’re made. The only thing to consider is which type will be compatible with your computer. Any part that is recommended by the Crucial System Scanner is guaranteed compatible with your system when you order on Crucial.com. If you haven’t used the scanner just yet it can be found here.
Which one should I buy: high or low density?
You should always purchase whichever memory your system supports. In this case, buy the type that’s compatible with your system. If both types are listed, both types should be compatible. However, keep in mind that for optimal performance it’s recommended to have your installed memory match whenever possible.
... View more
Question What are Micron CPG’s preferred Incoterms?
Answer The International Chamber of Commerce (ICC) created and maintains a series of trade terms used for business to business transactions. These are referred to as Incoterms, and are intended to represent the most common elements of a sales transaction, for example, the buyer’s and seller’s costs, and responsibilities, in the transaction.
Micron CPG’s preferred Incoterms are FCA Origin.
Customers who need to use different Incoterms are encouraged to contact the Micron CPG Sales team for assistance with their purchase order:
US Sales and Support EMEA Sales and Support
... View more
The Crucial SSD Install Kit (UK/EU) contains every additional part needed for a typical install of a solid state drive (SSD) into most laptops or desktops. With this kit and the appropriate tools (often just a Phillips screwdriver, but refer to your system or install documentation for anything extra needed for your assembly), your SSD can be securely attached in your system, your operating system migrated from the original drive, and your computer upgraded with high performance storage quickly and easily. Below is a breakdown of what the kit includes, as well as the most common substitutions or additional parts needed for more specialized install, or cheaper alternatives in cases where our full kit is not necessarily needed.
The kit includes a 2.5-to-3.5 inch SSD bracket with appropriate screws, a SATA cable, a SATA-to-USB adapter, and a product key for Acronis True Image HD 2014, which is typically used to clone your Windows operating system (OS) to the SSD prior to replacement, though some customers prefer other software for cloning, or a clean installation of their OS from scratch.
A standard desktop install will utilize the bracket and SATA cable, with the bracket resizing the SSD to fit into a standard 3.5" desktop hard drive bay, and the SATA cable connecting between the SSD and a system's open motherboard SATA connection, replacing the original drive if desired or if additional SATA ports are not available. Additionally, a SATA power connector will need to be attached to the SSD. This will be available on the wires coming off your system's internal power supply, or have to be taken from an existing drive if unused terminals aren't available.
If no cloning software or the USB adapter are required, the SATA cable alone (UK/EU) is available, as is the 3.5" Adapter Bracket (UK/EU). Some systems, such as workstations and servers, have special OEM bracketing or install rails requiring a thicker profile to installed drives more closely matching the 3.5" drive standard. The 2.5" to 3.5" SATA SSD/HDD Converter (UK/EU) will be a substitute for the 3.5" drive bracket in these scenarios.
The SATA-to-USB adapter is often used for laptop installs requiring cloning, or desktops where a lack of free SATA ports prevents the SSD and original drive being connected on SATA ports simultaneously for cloning, in which case the SSD can be connected via USB for the duration of the cloning operation. This is also used in most Apple systems, as Disk Utility's Restore function fills the same role as 3rd party cloning software for most users. If, for any reason, the additional software is not needed, the SATA-to-USB adapter (UK/EU) alone is available separately, though some customers prefer a full-sized USB hard drive enclosure, which provides housing and an interface for both cloning, as well as using a "decommissioned" hard drive externally via USB long-term. We offer two options depending on hard drive size.
2.5" External Hard Drive/SSD Enclosure USB 3.0 (UK/EU)
3.5" External Hard Drive Enclosure USB 3.0
A standard laptop installation requires no additional hardware. It consists of simply moving over any mounting hardware attached to the original 2.5" hard drive to the replacement SSD. After that it's all a matter of installing an OS via either cloning or a clean installation.
Lastly, the Acronis product key will provide you with a cloning program to migrate your original hard drive’s contents to the SSD. A setup overview is available here, and links to a video showing the process of cloning itself.
If you require more tools than just a standard Phillips, we offer a precision tool kit (UK/EU) that covers a wide variety of makes and models for upgrading and repairing both Mac and PC systems.
... View more
I'm sorry to hear the SSD is not working as expected.
It sounds as if the issues are related to power management of the SSD port. If that is the case, you will want to look at the power savings options in your BIOS. Make sure they are set to not power off the drive during idle times, in other words, you want the SSD to have full power at all times. You may also want to check and make sure that you have the latest BIOS on your NUC.
If you are still running into difficulties after making the changes to your power management settings, please contact Technical Support directly for more in-depth troubleshooting.
... View more
If you have never purchased or installed memory for a server or workstation, there are additional considerations above and beyond that of normal desktop and laptop computers. These factors are not apparent using detection tools such as the Crucial System Scanner, so it is important to be aware of them and familiarize yourself with what to watch out for when shopping for upgrades for these more demanding system types. The most common issues reported to us by users caught unaware are below.
ECC versus Non-ECC
Servers and workstations, for improved stability in mission-critical systems, often incorporate memory with added features to check for errors in operation and prevent crashing of programs or a system as a whole. This is referred to as ECC (Error Checking and Correction) memory, and allows for a process in which the memory can check the integrity of the data it processes for any errors created by interference and fix single-bit errors as it handles data. Non-ECC memory is typically quite stable, but for added peace of mind in systems which must have zero downtime, ECC memory is often preferred. Problems reported by our users usually come from mixing ECC and non-ECC memory, for example when a pre-built system ships with non-ECC as a value option and ECC is added later. This can work in rare instances, simply disabling the ECC functionality, but in most cases your system will fail to complete POST and load into your operating system. Another potential problem is if your motherboard or processor do not support ECC memory, which can also either work but disable the added functionality or refuse to allow your system to complete startup. The best way to confirm any restrictions on mixing or using ECC memory at all is by checking your motherboard and processor specifications and/or any comprehensive hardware or maintenance documentation for your pre-built configuration if applicable.
Registered and Unbuffered
Registered memory (RDIMMs), as opposed to unbuffered (UDIMMs), features a register on the module which buffers data for a clock cycle between a system's memory controller and a module's DRAM. This reduces electrical load on the components involved and in exchange for slight performance loss allows a system to address much higher memory totals than unbuffered memory will typically allow for. Almost all registered memory is also ECC, with all the benefits that provides as well. Like ECC memory, CPU and motherboard limitations can prevent registered memory from being fully compatible with your system, though most often with registered parts the system will refuse to start at all if any other component is not fully compatible with that standard. Also, registered and unbuffered memory can't be mixed, even in an environment which is compatible with both types of memory.
Memory modules can be single-, dual-, quad-, or octal-ranked. While usually not a factor on standard systems, ranking limitations can present a few complications particularly when dealing with registered parts. Most commonly, quad-ranked or octal-ranked parts will have specific requirements in how and in what quantity they can be installed in your system's memory slots. Higher-ranked modules can limit how many total modules can be installed, for example allowing only four out of six memory slots to be populated when any quad-ranked parts are installed, and forcing you to use specific slots in your system if quad-ranked parts are mixed with single- or dual-ranked. Higher rankings can also impact your memory bandwidth, forcing your memory to run at lower speeds when high-ranked parts are present. This trade-off may be required to utilize higher capacities of memory in some systems, though, if single- or dual-rank parts are not available at capacities desired, or if reduced ranking parts are not compatible with a system at higher memory totals. If none of these restrictions apply, there is otherwise no functional difference between rankings of parts. More details on ranking can be found here.
Load-reduced memory (LRDIMM)
LRDIMMs are an evolution of registered memory featuring a unique memory chip buffer which further reduces electrical load. The result of this is the reduction or elimination of ranking concerns, allowing extremely high totals of memory without performance reduction (or at least diminishing its effect) or any need to avoid filling all slots in a compatible system. Like the relationship between UDIMMs and RDIMMs, LRDIMMs can't be mixed with the other standards without a system refusing to start up properly.
Server and workstation memory, especially RDIMMs and LRDIMMs, are often physically larger than their less demanding counterparts. Besides more components soldered to the parts, heat sinks are often attached to offset the additional heat generated by these more active parts. While server/workstation boards or memory risers for them generally account for this in how the slots for RAM are spaced, pay attention to any height needs in your system. Systems with larger CPU fans or other internal components limiting your RAM module height may require purchasing Very Low Profile (VLP) modules to fit alongside other installed components. Some users also prefer VLP parts due to the lower profile allowing slightly improved case airflow and cooling.
A potential issue in any computer is running an outdated BIOS, but servers and workstations especially work best when running your system's most recent BIOS. As newer technologies are introduced in RAM components, BIOS updates become increasingly likely to be required to run higher memory totals.
If your resources are unclear on any of the above, your motherboard or system manufacturer and Crucial Support can assist you further. Multiple contact methods for Crucial are available at http://www.crucial.com/usa/en/support-contact to help ensure the right parts are selected for your needs.
The contents of this article were originally provided by Matt_TheCru .
... View more
Yes, if you have a large number of questions it would probably be easier for you to receive swift and accurate answers if you ask the community in the SSD Forum. You can also contact our support, there is a link to their contact info in the footer of the article. :)
... View more
On an MX100, just as with any other Self-Encrypting Drive, all data is always encrypted by the controller when written to the NAND, and decrypted when read. Using Windows 8 BitLocker with the SED feature of the MX100 enables the user to put a "lock" on the drive, to protect the data against unauthorized access. Basically, once Windows 8 BitLocker has been activated and configured to use the drive's built-in hardware encryption, the data on the drive can only be accessed after the user puts in their BitLocker credentials. However, all the encryption is still done by the controller, just as it was before BitLocker was configured to work with the drive's SED ability. You can read more in this article, The Advantages of Hardware Encryption
... View more
If you are looking for a guide on how to install and activate Acronis True Image HD 2015 please visit this article for updated instructions for using Acronis True Image. A more comprehensive walkthrough of SSD setup and installation, including the cloning process, is provided by our SSD Install App .
Select Crucial SSDs come standard with a license key for Acronis True Image HD 2014. This article shows, step by step, how to install and activate your copy of the software, followed by a video on using the software.
If you are looking for a guide on how to clone with the version of Acronis True Image HD that was included in the Easy Install kits, the one that boots from a CD, we do have a written guide and video for that software as well.
1. Go to www.acronis.com/en-us/promo/tihd-download 2. Choose a language from the presented options.
3. Download and run the .exe file.
4. Click Install.
5. Review and accept the license agreement to continue.
6. Acronis will ask if you'd like to participate in the Acronis Customer Experience Program. Your participation in this is voluntary, and can be refused without affecting your ability to use the software. Crucial and Micron Consumer Products Group are in no way affiliated with this program.
7. Select an install destination, click 'Next' and verify your selections are exactly how you would like them, then click 'Proceed'.
8. After installation finished, you can immediately start the application, or click "Finish" to close the installer if you'd prefer to resume this process later by running the software from where you installed it.
9. On the product key screen, click the link in the lower right corner "I have only short key".
10. If you don't already have one, you must create an Acronis account with your name and e-mail address, and enter the 16-digit product key you received.
11. Acronis will e-mail you a confirmation link to finalize your account creation (this step does not apply if you used an existing Acronis account).
12. Your 64-character product activation key will be displayed once registration is complete. A copy of it will also be sent to your Acronis account's e-mail address for your records. Copy and paste it back into the Acronis 2014 splash screen text box to continue with the activation.
13. Once activated, the program will immediately move into the "Get Started" screen of the Acronis True Image HD 2014 suite, ready for use.
Once you are ready to begin, the below video illustrates the cloning process itself.
Some users have reported difficulty in successfully cloning using the Windows version of Acronis True Image HD 2014. The process below details creating a bootable CD or USB drive to launch the Acronis Software from directly without ever loading Windows. This requires either a blank CD or USB drive. While testing has shown this process is non-destructive to existing USB drive data, our recommendation is you remove any files from a USB drive you intend to use as bootable media in this way to eliminate the risk of data loss from this process.
1.To begin, from the main screen of Acronis True Image HD 2014, select the "Backup and recovery" tab. 2.Click the button for "Create bootable media". 3.A new Window for "Acronis Media Builder" will appear. Click Next to proceed. 4.The next screen will have you select what programs to place on the bootable media you are creating. Check the box next to Acronis True Image 2014, then click Next. 5.An options menu will appear next. Nothing needs to be set here for normal use of Acronis, so simply click Next. 6.A list of connected media the bootable device can be created from will be displayed. Select the desired target (in our example, USB drive letter 'I'), and click Next. 7.If everything looks correct in the process summary, click Proceed. 8.A progress indicator will appear as your bootable media is created, and once complete a notification window will appear. Afterward, you can close all Acronis windows.
From here, you will boot from the created media, adjusting your BIOS/UEFI boot menu options if necessary to do so, and run the Acronis software to clone your source drive to another target disk.
... View more
Let us first of all clarify what SMART data actually is. The acronym SMART stands for Self-Monitoring, Analysis and Reporting Technology, and that is exactly what the technology is. A SMART enabled storage drive monitors itself and collects data, and this data can be read and interpreted with the help of utilities capable of reporting the SMART data to the user. While this seems pretty straight-forward, there are a few things you need to be aware of as you interpret your SSD’s SMART data. The first thing is that a lot of utilities for reporting SMART data were designed for HDDs, and because they are, they tend not to report SSD data correctly. The SMART attributes of an SSD are not organized in the same way the attributes of an HDD are, primarily because most of them don’t apply to a drive that is lacking any kind of moving parts. This means that although the SMART data reported by an SSD will be correct and valid for the SSD, the attributes may not be correctly identified, which for obvious reasons leads to confusion. For example, when the “Power-on Hours Count” attribute reports a number to the utility, an incompatible utility may incorrectly label that number “Program Fail Count” or “Reported Uncorrectable Errors”. When that happens, a perfectly good SSD is incorrectly reported as a failing drive to the customer attempting to read the SMART data, all because he or she is not aware that they are using a utility that isn’t compatible with their SSD. It is in other words very important to use a utility that can correctly read the SMART layout of your SSD.
In regards to the attribute named “Percentage Lifetime Used” (sometimes referred to as “Percent Lifetime Remaining”), this is simply a metric for how much wear life is left on your SSD. A solid state drive like any flash memory-based storage device has a limited amount of data which can be written to the memory blocks before they start to lose their reliability, and eventually go into read only mode. Your Crucial SSD will keep track of this life with SMART attribute 173,“Average Block Erase Count.” The Lifetime Used is a reflection of the block erase count in terms of a percentage. So if for example your drive is rated for 3000 block erases and you have a total of 100, your Percentage Lifetime Used would be 100/3000, or 3-4%. For percent lifetime remaining we would simply take (3000-100)/3000 = 96-97%. These attributes are not a full picture of the health of a drive, but an expectation of how much usable life is left.
The Crucial Storage Executive tool will correctly report the SMART data on all supported Crucial SSD models. On storage drive models that are not supported by the Crucial Storage Executive, the tool will still report the SMART data. However, the attribute definitions will only be displayed for SSD models supported by the tool.
The second thing to remember is that SMART data is not a comprehensive diagnostic tool. Standard troubleshooting practices and operating system diagnostics are more reliable when it comes to determining the health status and reliability of an SSD than any SMART data read-out.
Incorrectly reported or interpreted SMART data can lead to incorrect conclusions which, unfortunately, can lead to an RMA of a perfectly functional drive. Interpreted correctly on the other hand, the SMART data from your SSD can be a useful tool in troubleshooting your SSD.
... View more
Revision 5294 is unfortuantely not compatible with Windows 8.1. For Windows 8 and Windows 8.1 you need revision 0713. If you contact our Customer Service they will be able to provide you with revision 0713 though.
I apologize for any inconvenience.
... View more
SED technology provides verified and certified data security which offers nearly unbreakable pre-boot access protection for user data. Because SED access is pre-boot, there is no possibility of running an OS utility to break authentication codes. Following TCG Opal 2.0 specifications and IEEE-1667 access authentication protocols provide data security which meets government standards for data in banking, finance, medical and government applications. Support for Windows 8 eDrive provides the individual user with simple plug-and-play data security which can protect sensitive personal data, without having to modify BIOS settings, and without having to spend time to encrypt data already in place (as is the case for software encryption methods). Windows 8 Professional, Enterprise, and RT editions all automatically support encryption key management of SEDs. Crucial SEDs support Microsoft’s requirements for eDrive capability. This provides security for data at rest with no loss of throughput performance. In other words, in order to active the password feature, to arm the security system if you will, all it takes in Windows 8 is to enable BitLocker. While BitLocker in older Windows Operating Systems does not support SED technology, you can still use BitLocker like on any other drive, it just won’t take advantage of the benefits of the hardware encryption on the SED. To help users on Windows 7 or other Operating Systems take advantage of the SED ability third-party software vendors, such as Wave Systems, WinMagic, and others provide advanced encryption and authentication management features for Opal 2.0 storage devices.
The majority of current Crucial SSDs are Self-Encrypting Drives (SEDs) which means all data is always encrypted by the controller when written to the NAND and decrypted when read. Windows 8 BitLocker, along with other products, can work with this built-in hardware encryption ability when you apply a password in Windows, provided the following requirements are met (solutions other than BitLocker may have further or modified requirements):
BitLocker only supports TPM version 1.2 and 2.0 (or newer). In addition, you must use a Microsoft-provided TPM driver (Please note, BitLocker can also work without a TPM, but it will need a USB flash drive to set the password instead)
The host computer should be at a minimum of UEFI 2.3.1 and should have the EFI_STORAGE_SECURITY_COMMAND_PROTOCOL defined. This enables security protocol commands to be sent to and from the SED. Please contact the manufacturer of your host computer to ensure that this requirement is met.
Secure Boot must be enabled.
The system needs to support Opal 2.0 The Opal 2.0 standard is not backwards compatible; Crucial SEDs are not compatible with Opal 1.0
The host computer must always boot from UEFI. Any “compatibility” or “legacy” boot mode must be disabled. We recommend putting the system in UEFI-only mode before installing the Crucial SED.
The boot order must be set to start first from the SSD (not the USB or CD drives)
The compatibility support module (CSM) must be disabled, if it is available.
The SSD must have two partitions (drives with Windows installed generally do anyway) and the main partition to be encrypted must be NTFS
The drive must be in an uninitialized state with all security modes inactive. (This refers to the security state of the SED under the TCG and ATA protocols.) If the drive has been previously initialized, you may need to refer to instructions from the BIOS maker or any previous encryption software which may have been used in order to return the SED to an uninitialized state. Windows 8 and 8.1 cannot manage encryption on SEDs that are attached to the host computer via a RAID controller.
Dynamic discs are not supported by BitLocker
A trusted platform module (TPM) on the host computer is not required in order to run hardware encryption. However, a TPM can provide additional data security functions, such as mating the SED to the host system so it cannot be operated in any other host computer. Instructions for using a TPM should be obtained from the manufacturer of the host computer. Installation on a host computer without a TPM may require using a USB thumb drive as a key. (See Microsoft's Windows 8 documentation for more details.)
Configuring the Host System
It is recommended that the host system UEFI be configured to properly accept the SED before physically installing it, as outlined in the example below. Details of the system setup will vary from system to system, as will the names of various functions. However, they are similar enough that a single example should be sufficient. For details on specific UEFI setups, contact your computer's manufacturer.
Enabling Secure Boot
Microsoft Secure Boot is a requirement to run any Windows 8.x system. Any computer that has been configured from the factory for Windows 8 (as shown by a Windows 8 sticker) will already have Secure Boot enabled. If the host system was originally configured for Windows 7 or a previous operating system, check to ensure that Secure Boot is enabled, as shown below.
UEFI Boot Mode/CSM Support
The host computer system must be in UEFI-only mode, as shown below. Typically, the CSM will be automatically disabled in UEFI-only mode; however, this should be verified and the CSM should be disabled if necessary.
Installing Windows 8.x
The most straightforward method of implementing hardware encryption is to perform a clean, new installation of the operating system. BitLocker versions in the Windows 8.x Enterprise and Professional editions support hardware encryption on SEDs. No special steps are needed for this function; simply follow the normal OS installation process described by Microsoft. After the OS is installed, proceed to the Enable BitLocker section.
Because Crucial SEDs support eDrive, activating BitLocker creates special partitions, which are required to put the eDrive features in effect. When an eDrive-activated SSD is cloned, these special partitions may not be properly copied to the target drive. The target drive may function, but this is not considered a valid process and it may cause latent performance problems. If the source disk has been encrypted using software encryption in Bitlocker, first ensure that BitLocker is turned off before initiating the image clone to a Crucial SED. If using BitLocker in software encryption mode on the source system, a decryption process will be required to turn off BitLocker. This can take several hours, depending on the amount of user and OS data on the drive.
Follow the steps below to enable BitLocker.
Press the Windows key (usually between <Ctrl> and <Alt>); then type “This PC” and press Enter.
Right-click on the icon for the system drive and select Turn on BitLocker from the pop-up menu.
Next, a status box confirming that BitLocker is configuring will display, along with a status bar. This will complete momentarily.
Select one of Microsoft's options for saving your recovery key. While Crucial has no preferred option here, do not neglect this step. In some circumstances, this may be the only way to recover data from your SSD. Crucial has no factory backdoor methods by which to recover data if an authentication key or password is lost. Once the key is saved, select Next to continue.
BitLocker will ask, "Are you ready to encrypt this drive?" After you click Continue, a system restart will be required to complete the process.
After the reboot is complete, you will see from the BitLocker padlock icon on your system drive that BitLocker is enabled.
The video below illustrates the process in full.
... View more
I'm sorry to hear you were having difficulties finding the information you need. We are always open to customer feedback; please let us know of any improvements you think we can do to the Tribal Knowledge Base to make it easier to locate the information you were looking for.
If you have any additional questions, please don't hesitate to make use of our free Technical Support by sending us an email, or call, or contact us via chat. We'll be happy to provide all the information we can.
... View more
I'm sorry to hear you weren't able to sort out the cloning issues you were having. Did you at any point use the link at the end of the guide to contact our Technical Support for your region? Even though we respond to comment if they are left unanswered for a few days, the comment section of our Knowledge Base articles is not intended to be an official support channel, and if you need help urgently, this is unfortunately not the best place to ask for it.
... View more
Unfortunately the SSD needs to be connected directly to a SATA port in order for the firmware update to run properly. So yes, I would suggest Temporarily connecting the SSD directly to the motherboard for the update. After the firmware has been updated, you can move the SSD back to the adapter again.
... View more
We have Acronis software that will work with Windows 8. Since we have both versions in stock, I recommend that you call Customer Support for your region to place your order. That way, we can make sure that the Windows 8 compatible version of the software is shipped out.
... View more
I am sorry to hear that you're having issues with your SSD.
We do not have a customer service center located in Taiwan, but you are welcome to contact our US Customer Service. They will be happy to assist with troubleshooting, and if you need to do an RMA, they would handle that for you as well. Be sure to let them know what troubleshooting steps you have already taken on your own, to make it easier for them to assist you. :)
... View more
I'm sorry you ran into issues with your SSD, but I'm happy to hear the power cycle process worked and that you're back up and running now.
If you are interested, we have another article that has directions on how to determine your firmware version, and the latest firmware can be found here.
... View more
The hardware encryption on the M5500 is always operating, however, it is not always password protected to the point it locks out unauthorized access. We are at this time not aware of a software tool for Mac that provides this functionality integrated with the SED feature.
... View more
Unfortunately we don't offer a download of the software. It is included with both the Desktop Install Kit and the Laptop Install Kit, both of which we sell on Crucial.com. You can find them both here.
Please let me know if you have any further questions. You can also contact Customer Support directly.
... View more
The hardware encryption on the M5500 is always operating, however, it is not always password protected to the point it locks out unauthorized access. We are at this time not aware of a software tool for Mac that provides this functionality integrated with the SED feature. In other words, if you need your data to be protected by encryption that keeps unauthorized users from accessing the drive, you will need to keep FIle Vault on.
The TKB Article "An introduction to the encryption features of the M500" has more information on the SED ability of the M500 and on how the encryption works, if you are interested in learning more about it.
... View more
This article was originally written by Matt_TheCru and featured on the CRU blog.
Virtual memory (also known as a page file) is essentially a block of space on your hard drive or SSD being allocated by the OS to pretend to be RAM when your physical RAM runs short for actively running programs. It supplies additional "fake" RAM to allow programs to continue functioning, but because hard drive and SSD access and performance is much slower than that of actual RAM, noticeable performance loss is usually observed when relying on virtual memory extensively. Managing virtual memory in a Windows system is relatively easy, but largely unnecessary. Windows will, by default, adjust it on the fly based on your needs and your installed RAM. It tries to set itself to what it expects you to need based on your installed RAM and it will adjust itself if your usage spikes. This can lead to it self-adjusting to end up taking a large amount of space if you are currently running a large amount of RAM (for example a system with 8GB of RAM will often default to 8GB of virtual memory and can grow as large as 16GB). Some users will change it to reduce space being used by their OS on their hard drive or SSD because they feel they have sufficient RAM to never need to rely on the virtual memory feature of their OS, and (especially with higher cost storage on an SSD) to reclaim space that is simply being wasted if that virtual memory is not being used. However, reducing or eliminating your virtual memory to free up drive space carries some risk of causing errors or system instability in cases where you would need more but have capped what your system can use. Increasing this memory setting is also generally not needed. Instances where more virtual memory makes the difference between a program working or not are best solved with a RAM upgrade, as RAM speeds greatly exceed the performance of virtual memory. Your system performance will be reduced compared to improving the dedicated hardware meant to provide this benefit. Manual adjustments to this setting are done at your own risk, and this should not be attempted unless you have solid guidelines toward what you actually need. Under-allocating space for this can lead to programs or your system as a whole malfunctioning. Additionally, older programs are designed with the assumption there is a page file in place for them to use, and malfunctions of individual programs may occur if this is unavailable to them due to incorrect configuration. Detailed instructions for these adjustments in older versions of Windows vary slightly from the below but will still be mostly applicable, as this feature has not changed much from Windows XP on. 1. Enter System Properties by either the 'System' link in the 'System and Security' sub-menu of Control Panel or by right-clicking 'Computer' in your start menu and selecting 'Properties (Windows 7 and earlier only). This will open the Window pictured below.
2. Select 'Advanced System Settings' (link outlined in red numbered 1 in the above screen). This will open a window titled "System Properties".
3. Click the "Settings" button in the Performance category (outlined button labeled 2 in the screenshot above). This opens the Performance Options window. 4. Navigate to the Advanced tab (outlined and labeled 3) then click the Change button (outlined and labeled 4). This will open the Virtual Memory window (outlined and labeled 5), from which any adjustments can be made. If you disable the 'Automatically manage paging file size for all drives', this window will allow you to manually set sizes or size ranges, specify which drive this space is placed on if you have more than one (to free up space on an SSD by moving the page file to a secondary platter hard drive), or disable the feature entirely. While some users do shut off automatic management, or virtual memory features as a whole, our official recommendation is to leave it in place. If you are comfortable reducing the size based on your usage that can be done safely, but disabling this entirely is not necessarily safe. Even if you feel you have sufficient RAM to go without this, that change does put you at risk of poorly optimized software, particularly something with a memory leak issue ballooning it's RAM footprint, causing malfunctions later.
... View more