Feeds
78%
PowerColor X1900XT tiny

PowerColor X1900 XT 512MB

PowerColour brings a price-competitive ATI Radeon X1900 XT to the market

3 Big data security analytics techniques

Review It's generally a waste of a lot of money to go for a top-of-the-range card from any manufacturer. Unless you really, really need that extra little bit of performance, it makes more financial sense to go for the next card down. This is especially the case with ATI's X1900 XT and X1900 XTX - the XTX's performance advantage over the XT simply isn't enough to justify its higher price...

PowerColor X1900XT

Indeed, considering that the X1900 XT runs neck and neck with Nvidia's GeForce 7900 GTX, costs less and supports 512MB of graphics memory, it looks like something of a bargain card in this end of the market...

The Powercolor X1900 XT can hardly be classified as cheap, but you could spend a lot more money. The downside of buying a performance card from ATI these days is the excessive amount of noise that some of them produce. Nvidia has managed to get around this problem by using a different cooler design, although you could always get a third-party cooler from someone like Arctic Cooling, but ATI's board partners, Powercolor included, should really consider using them as standard. At least it's not too bad until you fire up a 3D-intensive game.

The PowerColor X1900 XT's core is clocked at 625MHz, while its memory runs at an effective 1450MHz. That's 25MHz and 100MHz lower than the XTX's core and memory clock speeds, both of which are within reach of the XT if you're brave enough to overclock your graphics card. There really shouldn't be any need to do so, at least not if the benchmark numbers this card produced are anything to go by. Judging from our overclocking adventures with the Sapphire Blizzard card, another Radeon X1900 XT-based card, it seems like you can push the latest ATI GPUs quite hard.

It's also worth taking into consideration that the latest high-end cards from both ATI and Nvidia are quite long, so if you have a small case, or inward-facing hard drives, you might have some problems fitting these cards. You'd also do well to upgrade your power supply to a model with a built-in PCI Express power connector, as using the supplied power splitter isn't ideal. These cards draw quite a lot of power, and having an under-powered PSU isn't a good idea, potentially causing problems throughout your entire system.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.