Feeds

ATI bests Nvidia in notebook graphics – McComas

InQuest head-to-head

  • alert
  • submit to reddit

ATI remains the leader in the battle for notebook graphics accelerator performance, edging arch-rival Nvidia, according to preliminary tests perfomed by InQuest, the semiconductor analyst firm.

It was so nearly a draw, but at the last gasp, Bert McComas and colleague Richard Lee, plumped for ATI after "taking into consideration system power consumption under graphics loads".

The duo are being a tad cautious. They ran their benchmarks over the 64MB ATI mobility 7500, fitted inside a Dell notebook, and a 32MB Mobile GeForce 4, housed inside a Toshiba Satellite, both systems retailing at $2,100.

There were some differences in CPU speed and type, but InQuest reckon their tests isolated the contribution to performance made by the processors.

Power consumption was the biggest difference between the two graphics accelerators - "when under heavy graphics and video loads the... figures diverge significantly," McComas and Lee say.

"We do not know how much the graphics controllers contribute to these differences as compared to other components. More than anything else, this data raises a red flag and begs for further detail level evaluation."

You can read the full report at InQuest. ®

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.