Feeds
90%

Nvidia GeForce 8800 GTX graphics card

GeForce 8800 GTX = 2 x Radeon X1950 XTX

Top three mobile application threats

Review Are you ready for DirectX 10 gaming under Windows Vista? No? Didn't think so. Today Nvidia finally unveiled its new DX10-capable graphics chip, the GeForce 8800 - aka 'G80' - but is it worth forking out for one now, or should you wait until Windows Vista ships? Read on to find out how good the GeForce 8800 GTX really is...

Sparkle_GeForce_8800GTX

The first batch of GeForce 8800 GTX graphics cards all come out of the same Taiwanese factory and use reference clock speeds so there's very little to distinguish one 8800 GTX board from another, but Sparkle, which kindly supplied Reg Hardware with our 8800 GTX review sample, has added some neat branding to the cooler while the packaging is positively under stated. In addition to the graphics card you get Call of Duty 2, Cyberlink PowerDVD 6 (stereo version), an s-video extension cable, a breakout cable that offers s-video outpur and component-video connections, two DVI-to-VGA adaptors, and not one, but two six-pin power cables.

Only you won't notice any of those things as you will be immediately and utterly captivated by the enormous graphics card.

It's a double-slot design that measures 26.5cm from the inside of the bracket to the end of the PCB. To put that in context, the sizeable AMD ATI Radeon X1950 XTX measures 22.8cm in length.

The GeForce 8800 GTX chip is fabricated by TSMC on a 90nm process and uses 681m transistors in its design, which is a huge increase from previous designs. The 384-bit memory controller connects to 768MB of DDR memory that runs at 900MHz to give an effective speed of 1,800MHz and a memory bandwidth of 86.4GBps, but after that things start to get a bit complicated.

GeForce 8800 GTX supports DirectX 10 Shader Model 4.0 graphics and, as we predicted Nvidia Quantum Effects technology.

Combat fraud and increase customer satisfaction

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.