Feeds

Doom 3 maestro speaks

John Carmack gives graphic cards a going over

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

John Carmack, the co-founder of id Software, top code creator and man behind the trail-blazing Doom shoot-em-up game has been talking to Voodooextreme.com and provided some grand info on where 3D gaming is going.

It's pretty techy stuff - do you know your BSP based visibility algorithms from your pre-computed PVS? - but this is a man who knows what he's talking about and if you're caught up in this market or are just an obsessive gamer, this interview series is worth a look.

For us, the most interesting bit about the latest instalment is what John has to say about graphics cards and what they can and can't do with his vision of the next generation Doom game.

Here's a short extract: "The ideal card for Doom hasn't shipped yet, but there are a couple good candidates just over the horizon. The existing cards stack up like this:

Nvidia GeForce[2]: We are using these as our primary development platform. I play some tricks with the register combiners to get a bit better quality than would be possible with a generic dual texture accelerator.

ATI Radeon: All features work properly, but I needed to disable some things in the driver. I will be working with ATI to make sure everything works as well as possible. The third texture unit will allow the general lighting path to operate a bit more efficiently than on a GeForce. Lacking the extra math of the register combiners, the specular highlights don't look as good as on a GeForce.

3DFX Voodoo4/5, S3 Savage4/2000, Matrox G400/450, ATI Rage128, Nvidia TNT[2]: Much of the visual lushness will be missing due to the lack of bump mapping, but the game won't have any gaping holes. Most of these except the V5 probably won't have enough fill-rate to be very enjoyable.

3DFX Voodoo3, S3 Savage3D/MX, Matrox G200, etc: Without a stencil buffer, much of the core capabilities of the renderer are just lost. The game will probably run, but it won't be anything like we intend it to be viewed. Almost certainly not enough fill rate."

If this kind of thing is causing you to salivate, go here for the full piece. The final part of the interview has also just been put up on Voodooextreme's site.

Related Link

Part 2 of John Carmack interview
Voodoo Extreme

Related Story

Voodoo gets 12,000 volt shock (just a stupid bit of fun for a Thursday)

Secure remote control for conventional and virtual desktops

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.