Feeds
90%
ATI X1900 XTX graphics card

ATI Radeon X1900 XT and XTX

The world's fastest graphics cards?

SANS - Survey on application security programs

Multi-texture fillrate

Multitexturing is bandwidth-limited as texture layers increase, hence the large lead for the GTX 512. It makes good use of 850MHz memory in this test. Even with the same ROP count, texture units and memory bandwidth as X1800 XT, X1900 XT still exhibits less performance loss, although only to the tune of 3.5 per cent.

ATI X1900 XTX graphics card

Floating-point texture bandwidth

We measure available texture bandwidth by asking the hardware to read from sequential locations in an FP16 texture, the second texel sample relying on the first, creating a dependant texture read.

ATI X1900 XTX graphics card

For some reason the hardware can't execute the texture read as fast as the R520 and the X1800 XT can, despite there being no theoretical reason other than a driver problem or issue scheduling the texture fetch. Software defeats the hardware, likely. We'll come back to that theme later.

Texture-fetch latency

In our texture-fetch test the R580 is again slightly slower than the R520 when fetching texels from a small texture. The entire texture fits nicely inside the GPU's texture cache on all three tested chips, indicating G70 has a larger texel cache bandwidth than either ATI chip.

ATI X1900 XTX graphics card

When using a texture that - even with compression - wouldn't fit inside the texture cache, ATI's high-end GPUs do better than the G70, although the R580 is still ever so slightly slower than the R520 at the same clocks.

ATI X1900 XTX graphics card

PCI Express bandwidth

As a nod to the modern GPU's ability to act prefectly well as a generally programmable parallel stream processor, and with R5-series GPUs supporting scatter writes into card memory from shader programs via an OpenGL extension, testing the PCI Express bandwidth of these high-end graphics boards when pushing data back to the GPU is prudent.

ATI X1900 XTX graphics card

The R580 and R520 have over 1000MBps of writeback bandwidth to use, given a suitable host platform. Indeed, the R580 is the first GPU, backed by nearly 50GBps of local memory bandwidth, we've tested that breaks the 1GBps barrier when squirting data back to the host.

SANS - Survey on application security programs

Next page: Verdict

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.