Feeds
90%

Nvidia GeForce 8800 GTX graphics card

GeForce 8800 GTX = 2 x Radeon X1950 XTX

SANS - Survey on application security programs

Review Are you ready for DirectX 10 gaming under Windows Vista? No? Didn't think so. Today Nvidia finally unveiled its new DX10-capable graphics chip, the GeForce 8800 - aka 'G80' - but is it worth forking out for one now, or should you wait until Windows Vista ships? Read on to find out how good the GeForce 8800 GTX really is...

Sparkle_GeForce_8800GTX

The first batch of GeForce 8800 GTX graphics cards all come out of the same Taiwanese factory and use reference clock speeds so there's very little to distinguish one 8800 GTX board from another, but Sparkle, which kindly supplied Reg Hardware with our 8800 GTX review sample, has added some neat branding to the cooler while the packaging is positively under stated. In addition to the graphics card you get Call of Duty 2, Cyberlink PowerDVD 6 (stereo version), an s-video extension cable, a breakout cable that offers s-video outpur and component-video connections, two DVI-to-VGA adaptors, and not one, but two six-pin power cables.

Only you won't notice any of those things as you will be immediately and utterly captivated by the enormous graphics card.

It's a double-slot design that measures 26.5cm from the inside of the bracket to the end of the PCB. To put that in context, the sizeable AMD ATI Radeon X1950 XTX measures 22.8cm in length.

The GeForce 8800 GTX chip is fabricated by TSMC on a 90nm process and uses 681m transistors in its design, which is a huge increase from previous designs. The 384-bit memory controller connects to 768MB of DDR memory that runs at 900MHz to give an effective speed of 1,800MHz and a memory bandwidth of 86.4GBps, but after that things start to get a bit complicated.

GeForce 8800 GTX supports DirectX 10 Shader Model 4.0 graphics and, as we predicted Nvidia Quantum Effects technology.

Combat fraud and increase customer satisfaction

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Apple patent LOCKS drivers out of their OWN PHONES
I'm sorry Dave, I'm afraid I can't let you text that
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.