<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet title="XSL_formatting" type="text/xsl" href="https://news.samsung.com/in/wp-content/plugins/btr_rss/btr_rss.xsl"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
	<channel>
		<title>Small and Medium Business &#8211; Samsung Newsroom India</title>
		<atom:link href="https://news.samsung.com/in/tag/small-and-medium-business/feed" rel="self" type="application/rss+xml" />
		<link>https://news.samsung.com/in</link>
        <image>
            <url>https://img.global.news.samsung.com/image/newlogo/logo_samsung-newsroom_in.png</url>
            <title>Small and Medium Business &#8211; Samsung Newsroom India</title>
            <link>https://news.samsung.com/in</link>
        </image>
        <currentYear>2019</currentYear>
        <cssFile>https://news.samsung.com/in/wp-content/plugins/btr_rss/btr_rss_xsl.css</cssFile>
		<description>What's New on Samsung Newsroom</description>
		<lastBuildDate>Wed, 22 Apr 2026 15:34:07 +0000</lastBuildDate>
		<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
					<item>
				<title>Keep Your Business Safe with Mobile Security and Management</title>
				<link>https://news.samsung.com/in/keep-your-business-safe-with-mobile-security-and-management?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Wed, 04 Dec 2019 11:01:45 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Customization]]></category>
		<category><![CDATA[KNOX]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Samsung KNOX]]></category>
		<category><![CDATA[Samsung Security]]></category>
		<category><![CDATA[secured by knox]]></category>
		<category><![CDATA[Small and Medium Business]]></category>
                <guid isPermaLink="false">http://bit.ly/2DKlPOs</guid>
									<description><![CDATA[As smartphone and tablet use continues to expand in the business landscape, organizations have become more aware than ever of the threat of mobile security]]></description>
																<content:encoded><![CDATA[<p>As smartphone and tablet use continues to expand in the business landscape, organizations have become more aware than ever of the threat of mobile security attacks. While different, what these companies all share is a sense of helplessness — that it’s only a matter of time before someone finds a way to infect their smartphones and tablets with malware or fall victim to phishing.</p>
<p>&nbsp;</p>
<p>In some cases, that feeling of helplessness is real, particularly if you’re working for a smaller business that doesn’t have a formal security role or a dedicated team to assess and mitigate potential risks.</p>
<p>&nbsp;</p>
<p>However, fending off potential security issues is especially important for these small and midsize firms. Given that their employees tend to juggle multiple responsibilities, they rely on mobile devices to go wherever they’re needed while staying connected to corporate data and applications.</p>
<p>&nbsp;</p>
<p>Here are 10 ways your organization can remain proactive in its approach to mobile security and management.</p>
<p>&nbsp;</p>
<h2><strong>1. Make upgrading a priority</strong></h2>
<p>&nbsp;</p>
<p>According to the most recent <a href="https://www.npd.com/wps/portal/npd/us/news/press-releases/2018/the-average-upgrade-cycle-of-a-smartphone-in-the-u-s--is-32-months---according-to-npd-connected-intelligence/">NPD Connected Intelligence Mobile Connectivity Report</a>, the average upgrade cycle for smartphones in the U.S. is 32 months — nearly three years. That reflects how often consumers make the move to a new device, and it’s up from 25 months the year before.</p>
<p>&nbsp;</p>
<p>That kind of cadence might be fine for people who are only using their devices for personal apps and content, but businesses need to approach upgrade decisions differently. Security researchers learn a lot about the changing tactics of malware authors, distributed denial of service (DDoS) attackers and ransomware campaigns in a three-year period. So do device manufacturers, who are building in protections that specifically address common attack vectors as networks <a href="https://insights.samsung.com/2019/04/03/5g-is-real-and-its-here-now-will-it-offer-something-for-everyone/">evolve to 5G</a>.</p>
<p>&nbsp;</p>
<p>In BYOD environments, it’s critical to set minimum requirements for the devices that are allowed to access corporate systems and apps. Beyond three years from initial release, many devices stop receiving regular OS updates and security patches, making them more vulnerable to new exploits.</p>
<p>&nbsp;</p>
<p>If you’re dealing with constrained IT resources, you have to determine the tradeoff between trying to figure out a mobile security strategy on your own and simply making use of what is already market-ready and available to businesses.</p>
<p>&nbsp;</p>
<h2><strong>2. Make MDM a mainstay</strong></h2>
<p>Companies have always made sure they could keep track of the equipment they’ve purchased, but there’s a difference between monitoring what happens on an oil rig that never moves and a fleet of smartphones that have been deployed to on-the-go employees.</p>
<p>&nbsp;</p>
<p>While <a href="https://www.samsung.com/us/business/solutions/services/mobility-software/knox-manage/?cid=com-btb-sky-blg-122001">mobile device management</a> (MDM) has been adopted by most enterprises, smaller firms have plenty of reasons to explore it as well. MDM tools can be helpful to companies that offer a <a href="https://insights.samsung.com/2018/10/04/how-to-accelerate-byod-with-mobile-device-management/">bring your own device (BYOD)</a> program but want to make sure employee devices don’t open them up to security threats.</p>
<p>&nbsp;</p>
<p>While choosing an MDM solution will take some research, midsize firms can get a head start by making sure the devices they deploy or recommend to employees incorporate security capabilities <a href="https://insights.samsung.com/2019/06/27/the-most-secure-phone-samsung-knox-is-setting-a-high-bar-2/">from the chip up</a>.</p>
<p>&nbsp;</p>
<h2><strong>3. Whitelisting and blocklisting</strong></h2>
<p>&nbsp;</p>
<p>Many security threats penetrate companies due to user errors which are often just honest mistakes. Employees might not realize by downloading an app, for instance, that they are effectively leaving the door open to have corporate data stolen from their smartphone.</p>
<p>&nbsp;</p>
<p><a href="https://insights.samsung.com/2018/08/07/whitelisting-and-blocklisting-mobile-applications-pros-and-cons/">Whitelisting and blocklisting apps via MDM</a> helps protect employees — and their employers — from these kinds of risks by making it clear which apps and sites are safe.</p>
<p>&nbsp;</p>
<p>Blocklists give IT departments peace of mind by blocking access to certain apps and sending notifications when an attempt is made. Whitelists, on the other hand, may be more effective for highlighting the mobile tools employees should be prioritizing over games and social media.</p>
<p>&nbsp;</p>
<h2><strong>4. Two-factor authentication and biometrics</strong></h2>
<p>&nbsp;</p>
<p>Weak and easily forgotten passwords can make it simple for rogue third parties to gain access to mobile devices. Two-factor authentication is a straightforward way for small and midsized businesses to begin developing a layered mobile security strategy.</p>
<p>&nbsp;</p>
<p>While tokens have sometimes been used as part of two-factor authentication, <a href="https://insights.samsung.com/2019/03/19/which-biometric-authentication-method-is-the-most-secure/">fingerprints and other biometric identifiers</a> are quickly gaining ground. In fact, 70 percent of businesses will use biometrics for workforce access by 2022, according to market research firm <a href="https://www.gartner.com/en/newsroom/press-releases/2019-02-05-gartner-predicts-increased-adoption-of-mobile-centric">Gartner</a>. Biometrics can be used in tandem with the data separation technologies discussed below.</p>
<p>&nbsp;</p>
<h2><strong>5. Get comfortable with customization</strong></h2>
<p>&nbsp;</p>
<p>When new hires are brought on board, they usually aren’t given keys to every filing cabinet, the company’s banking credentials or other proprietary data that require a certain level of seniority or privilege. In the same way, it doesn’t make sense to grant every employee unfettered access to all manner of corporate apps and data.</p>
<p>&nbsp;</p>
<p>IT managers can get around this with tools that let them customize mobile devices before they are handed out to their workforce. A good example is Samsung’s <a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-configure">Knox Configure</a>, which enables businesses to create a myriad of simple-use scenarios, from customizing boot-up screens to creating dedicated-use devices with only work-related apps.</p>
<p>&nbsp;</p>
<h2><strong>6. Separate work and play</strong></h2>
<p>&nbsp;</p>
<p>Even if they don’t have a dedicated desk with their own drawers, companies often offer employees a safe place of some kind where they can place personal items and secure them until they’re needed at the end of the day. Strong mobile security involves taking a very similar approach to the way data and apps are partitioned on the device.</p>
<p>&nbsp;</p>
<p>Containerization, for example, allows smartphones to create <a href="https://insights.samsung.com/2019/06/24/how-to-keep-data-safe-with-knox-platform-for-enterprise-sbtv/">separate workspaces</a> of business apps and content that can be centrally protected and managed. Administrators don’t need access to an employee’s personal apps or data and can therefore provide the optimum mix of flexibility and security. This lets IT departments lock down sensitive company information, while letting employees maintain confidence in their personal privacy.</p>
<p>&nbsp;</p>
<h2><strong>7. Ease the updating process</strong></h2>
<p>&nbsp;</p>
<p>Just as new security threats are constantly cropping up, companies are simultaneously developing fixes that can be applied to mobile devices. Unfortunately, that often puts the burden on a company’s IT resources (which can be scarce or spread thin in midsized firms) to apply all the right patches on a regular basis. According to <a href="https://www.globenewswire.com/news-release/2019/07/31/1894927/0/en/Security-Priorities-Investments-Outlined-in-Latest-IDG-Research.html">IDG’s 2019 Security Priorities Study</a>, patch management is still one of the most widely used methods for large enterprises to combat security threats, and smaller firms should do the same.</p>
<p>&nbsp;</p>
<p>Technologies such as <a href="https://insights.samsung.com/2018/12/31/managing-mobile-patches-and-updates-with-e-fota-adds-security-reliability/">electronic firmware over-the-air (E-FOTA)</a> mean employees don’t have to wait while patches or other updates are being pushed to their devices. Instead, updates can be scheduled across the entire team, ensuring all updates are tested and compatible, and all devices are uniform.</p>
<p>&nbsp;</p>
<h2><strong>8. Keep policies current</strong></h2>
<p>&nbsp;</p>
<p>If employees fall victim to a <a href="https://insights.samsung.com/2018/10/09/what-is-phishing-and-how-do-i-stop-it/">phishing scheme</a> and get locked out of their devices, or data loss occurs because settings were somehow tampered with, a company will probably be quick to outline an updated mobile security policy for everyone to follow.</p>
<p>&nbsp;</p>
<p>Rather than wait until disaster strikes, however, the most successful organizations stay on top of security issues and get in front of them from a policy perspective. At least every six months, <a href="https://www.samsung.com/us/business/short-form/incident-response-playbook-for-mobile-devices/?cid=com-btb-sky-blg-122001">review your mobile security posture</a>, from your ability to monitor device usage, points of vulnerability and the age of your smartphone fleet.</p>
<p>&nbsp;</p>
<p>Then, look forward to new devices that might be integrated into your workforce as part of new hire onboarding or upgrades across a department. Make sure updated policies are well documented. Of course, make sure employees are held accountable for reviewing and adhering to the policy as well.</p>
<p>&nbsp;</p>
<h2><strong>9. User training and security awareness</strong></h2>
<p>&nbsp;</p>
<p>The IDG study showed that almost a third of those surveyed, or 31 percent, cited employee training as one of the top areas where they fall short. “This speaks to the perpetual problem of employees as a security risk,” the authors wrote.</p>
<p>&nbsp;</p>
<p>Training and security awareness is never a once-and-done activity, but something that should be treated as an ongoing work in progress. The companies that do this successfully make sure the content is easy to understand and available through different channels depending on their preference. Examples could include tips in an employee newsletter, an instructional video on a company intranet or even push notifications sent to all employee smartphones.</p>
<p>&nbsp;</p>
<h2><strong>10. Seek a scaleable path</strong></h2>
<p>&nbsp;</p>
<p>A small company might not be small forever. Growth can come quickly via a strategic initiative to expand into a new market or territory, an M&amp;A or some other tipping point. What won’t change is the need for your workforce to be equipped with the best tools available to do their jobs from wherever they are.</p>
<p>&nbsp;</p>
<p>Of course, configuring and provisioning devices one by one is a nonstarter for IT departments, so think about how you can find an MDM tool or related application that will streamline this process as the organization evolves.</p>
<p>&nbsp;</p>
<p>Fortunately, none of the Android mobile security tips outlined here have to be developed from scratch. Solutions such as <a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-manage">Knox Manage</a> and <a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-configure">Knox Configure</a> were deliberately designed to help organizations from small firms to large enterprises with the ability to secure, manage and provision smartphones successfully.</p>
]]></content:encoded>
																				</item>
					<item>
				<title>Samsung Unveils Comprehensive Data Center SSD Lineup for SMBs in India</title>
				<link>https://news.samsung.com/in/samsung-unveils-comprehensive-data-center-ssd-lineup-for-smbs-in-india?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Thu, 15 Nov 2018 12:54:28 +0000</pubDate>
						<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Semiconductors]]></category>
		<category><![CDATA[Samsung SSD]]></category>
		<category><![CDATA[Small and Medium Business]]></category>
		<category><![CDATA[SMB]]></category>
		<category><![CDATA[Solid State Drive]]></category>
                <guid isPermaLink="false">http://bit.ly/2B8whPr</guid>
									<description><![CDATA[Samsung, country’s most trusted consumer electronics and mobile phone brand, today unveiled the Samsung Data Center solid-state drive (SSD) lineup for Small]]></description>
																<content:encoded><![CDATA[<p>Samsung, country’s most trusted consumer electronics and mobile phone brand, today unveiled the Samsung Data Center solid-state drive (SSD) lineup for Small and Medium Business (SMBs) in India. The new portfolio is designed to address the current and future trends in high performance computing storage in the big data era for small and medium businesses (SMBs). Engineered to meet the evolving needs of SMBs, the SSDs are faster with sustained performance and come in higher capacities and enterprise-class reliability and security.</p>
<p>&nbsp;</p>
<p><img class="alignnone wp-image-7937 size-full" src="https://img.global.news.samsung.com/in/wp-content/uploads/2018/11/Samsung-SSD-883-DCT-e1542105677493.jpg" alt="" width="1500" height="881" srcset="https://img.global.news.samsung.com/in/wp-content/uploads/2018/11/Samsung-SSD-883-DCT-e1542105677493.jpg 1500w, https://img.global.news.samsung.com/in/wp-content/uploads/2018/11/Samsung-SSD-883-DCT-e1542105677493-695x408.jpg 695w, https://img.global.news.samsung.com/in/wp-content/uploads/2018/11/Samsung-SSD-883-DCT-e1542105677493-1024x601.jpg 1024w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
<p>&nbsp;</p>
<p>Samsung’s new SSD portfolio will raise the bar for efficiency compared to legacy storage systems, requiring fewer servers and reduced power and cooling for a lower Total Cost of Ownership (TCO). The new lineup delivers better Quality of Service (QoS) for SMBs by reducing latency and lowering data delays. The entire lineup provides enhanced reliability and endurance for 24/7 operation, backed by a 5-year limited warranty and optimal Drive Writes Per Day (DWPD) ratings.</p>
<p>&nbsp;</p>
<p>“SMBs want solutions which are value for money and the right fit to their specific business needs. With our strong legacy in technology innovation and OEM engineering expertise, we have brought this simple, yet optimized SSD line up, which is future-proof when it comes to addressing today’s super computer trends,” said Sukesh Jain, Senior Vice President, IT and Mobile Enterprise Business, Samsung India.</p>
<p>&nbsp;</p>
<p>The comprehensive, new SSD lineup includes the following solutions to meet the widest range of SMB data storage needs:</p>
<ul>
<li><strong>The 860 DCT </strong>is designed for servers requiring SSD-levels of sustained performance and is suitable for various applications including content delivery networks. It allows for a lower TCO compared to hard disk drives (HDDs) and offers high capacities up to 4TB. The 860 DCT is the perfect solution for content delivery network systems and comes with a 20 DWPD rating.</li>
<li><strong>The 883 DCT </strong>is designed for servers used to safeguard critical data, including power loss protection and end-to-end data protection. It offers a high QoS under the SATA interface and will be available in a number of capacities ranging from 240GB to 3.84TB at a 0.8 DWPD rating.</li>
<li><strong>The 983 DCT </strong>is a high-performance solution for servers using an NVMe<img src="https://s.w.org/images/core/emoji/11/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> interface, which allows for blazing-fast speeds and high responsiveness. It comes in two form factors – 2.5-inch and M.2 – and will deliver sequential read/write speeds of up to 3,400/2,200 MB/s (2.5-inch) and 3,000/1,430 MB/s (M.2). The 983 DCT is ideal for real-time big data analytics applications and comes with a 0.8 DWPD rating.</li>
<li><strong>The 983 ZET </strong>is a powerful cache memory solution that offers a new level of performance with ultra-low latency, high level of QoS, breakthrough speeds and high reliability. It is the perfect storage solution for read cache applications such as hybrid caching servers and NoSQL DB, and it comes with a 10 DWPD rating.</li>
</ul>
<p>&nbsp;</p>
<p>All of Samsung’s new Data Center SSDs integrate with the advanced Samsung SSD Toolkit, which allows for efficient and simple maintenance &#8211; firmware updates, data erasure, over-provisioning setup and disk status information.</p>
<p>&nbsp;</p>
<p>The new lineup will start from INR 9,599 going up to INR 2,01,299.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;"><strong>Key Specifications</strong></span></h3>
<table>
<tbody>
<tr>
<td colspan="2"></td>
<td><strong>860 DCT</strong></td>
<td><strong>883 DCT</strong></td>
<td><strong>983 DCT</strong></td>
<td><strong>983 ZET</strong></td>
</tr>
<tr>
<td colspan="2"><strong>Interface</strong></td>
<td>SATA 6Gbps</td>
<td>SATA 6Gbps</td>
<td>PCIe Gen 3.0 x4, NVMe<img src="https://s.w.org/images/core/emoji/11/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 1.2</td>
<td>PCIe Gen 3.0 x4, NVMe<img src="https://s.w.org/images/core/emoji/11/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 1.2</td>
</tr>
<tr>
<td colspan="2"><strong>Form Factor</strong></td>
<td>2.5-inch 7mmT</td>
<td>2.5-inch 7mmT</td>
<td>2.5-inch 7mmT(U.2) , M.2 (22110)</td>
<td>AIC (HHHL half height, half length)</td>
</tr>
<tr>
<td rowspan="3"><strong>Hardware</strong></td>
<td><strong>NAND</strong></td>
<td>Samsung V-NAND</td>
<td>Samsung V-NAND</td>
<td>Samsung V-NAND</td>
<td>Samsung Low Latency V-NAND</td>
</tr>
<tr>
<td><strong>CTRL</strong></td>
<td>MARU</td>
<td>MARU</td>
<td>Phoenix</td>
<td>Phoenix</td>
</tr>
<tr>
<td><strong>DRAM</strong></td>
<td>4GB LPDDR4 (3.84TB)</p>
<p>2GB LPDDR4 (1.92TB)</p>
<p>1GB LPDDR4 (960GB)</td>
<td>4GB LPDDR4 (3.84TB)</p>
<p>2GB LPDDR4 (1.92TB)</p>
<p>1GB LPDDR4  (960GB)</p>
<p>512MB LPDDR4 (480GB, 240GB)</td>
<td>3GB LPDDR4 (1.92TB)</p>
<p>1.5GB LPDDR4  (960GB)</td>
<td>1.5GB LPDDR4</td>
</tr>
<tr>
<td colspan="2"><strong>Capacity<sup>1</sup></strong></td>
<td>3.84TB, 1.92TB, 960GB</td>
<td>3.84TB, 1.92TB, 960GB, 480GB, 240GB</td>
<td>1.92TB, 960GB</td>
<td>960GB, 480GB</td>
</tr>
<tr>
<td colspan="2"><strong>Seq. Read/Write<sup>2</sup></strong></td>
<td>Up to 550/520 MB/s</td>
<td>Up to 560/520 MB/s (480GB-3.84TB)</p>
<p>Up to 560/320 MB/s (240GB)</td>
<td>Up to 3,400/2,200 MB/s</p>
<p>(2.5-inch 1.92TB)</p>
<p>Up to 3,300/1,300 MB/s</p>
<p>(2.5-inch 960GB)</p>
<p>Up to 3,000/1,430 MB/s</p>
<p>(M.2 1.92TB)</p>
<p>Up to 3,000/1,200 MB/s</p>
<p>(M.2 960GB)</td>
<td>Up to 3,400/3,000 MB/s</td>
</tr>
<tr>
<td colspan="2"><strong>Power Loss Protection</strong></td>
<td>Not provided</td>
<td>Provided</td>
<td>Provided</td>
<td>Provided</td>
</tr>
<tr>
<td colspan="2"><strong>Data encryption</strong></td>
<td>Class 0 (AES 256)</td>
<td>Class 0 (AES 256)</td>
<td>Class 0 (AES 256), TCG/Opal</td>
<td>Class 0 (AES 256), TCG/Opal</td>
</tr>
<tr>
<td colspan="2"><strong>Total Bytes Written<sup>3</sup></strong></td>
<td>Up to 1,396TB (3.84TB)<br />
Up to 698TB (1.92TB)<br />
Up to 349TB (960GB)</td>
<td>Up to 5,466TB (3.84TB)<br />
Up to 2,733TB (1.92TB)<br />
Up to 1,366TB (960GB)<br />
Up to 683TB (480GB)<br />
Up to 341TB (240GB)</td>
<td>Up to 2,733TB (1.92TB)<br />
Up to 1,366TB (960GB)</td>
<td>Up to 17.52PB (960GB)</p>
<p>Up to 7.44PB (480GB)</td>
</tr>
<tr>
<td colspan="2"><strong>Warranty<sup>4</sup></strong></td>
<td>Up to 5-year limited warranty</td>
<td>Up to 5-year limited warranty</td>
<td>Up to 5-year limited warranty</td>
<td>Up to 5-year limited warranty</td>
</tr>
<tr>
<td colspan="2"><strong>DWPD</strong></td>
<td>0.2</td>
<td>0.8</td>
<td>0.8</td>
<td>10.0 (960GB)</p>
<p>8.5 (480GB)</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><span style="font-size: small;">* <em>1 1MB = 1,000,000 Bytes, 1GB = 1,000,000,000 Bytes, Unformatted Capacity. User accessible capacity may vary depending on operating environment and formatting.</em></span></p>
<p><span style="font-size: small;">* <em>2 For detail test conditions, please refer to each product’s respective data sheet.<br />
*860 DCT, 883 DCT: Performance measured using FIO 2.18 with queue depth 32, Z270 Intel SATA 6G port. Measurements are performed on whole LBA range. Write cache enabled. Performance vary depending on capacity.<br />
*983 DCT: Based on PCI Express Gen3 x4, Random performance measured using FIO 2.7 in CentOS6.6 (kernel 3.14.29) with 4KB (4,096 bytes) of data transfer size in queue depth 32 by 4 workers and Sequential performance with 128KB (131,072 bytes) of data transfer size in queue depth 32 by 1 worker. Actual performance may vary depending on use conditions and environment. 1 MB/sec = 1,000,000 bytes/sec was used in sequential performance<br />
*983 ZET: Based on PCI Express Gen3 x4, Random performance measured using FIO in CentOS 7.0 with queue depth 32 by 4 workers and Sequential performance with queue depth 32 by 1 worker. Actual performance may vary depending on use conditions and environment. 1 MB/sec = 1,000,000 bytes/sec was used in sequential performance<br />
</em></span></p>
<p><span style="font-size: small;">* <em>3 TBW(Total byte written) is measured while running 100 % random 4 KB writes across the entire SSD (TBW = DWPD x 365 x 3 x User capacity)<br />
*All documented endurance test results are obtained in compliance with JESD218 Standards. Please visit www.jedec.org for detailed information on JESD218 Standards<br />
</em></span><br />
<span style="font-size: small;">* <em>4 For 5-years warranty case, please contact your local Samsung sales representative.</em></span></p>
<p><span style="font-size: small;">* <em>5 The NVM Express® design mark is a registered trademark of NVM Express, Inc.</em></span></p>
]]></content:encoded>
																				</item>
			</channel>
</rss>
