Feeds
80%

Nvidia G92-based GeForce 8800 GTS 512MB

The 8800 GT and then some

3 Big data security analytics techniques

Review The GeForce 8800 GT slipped into Nvidia’s line-up towards the top of the range by offering similar performance to the existing 8800 GTS with 320MB of memory. This was achieved with an updated version of the 'G80' chip called 'G92', which moved the fabrication process to 65nm, changed the memory controller, raised the core speed and increased the number of unified shaders - or Stream Processors.

Although the 8800 GT performed in a similar way to the 8800 GTS it used a different technical approach and employed a different design. Where 8800 GTS and GTX are double-slot designs that blow cooling air over a hefty heatsink and out through a vented bracket at the back of the case, the new GT has a single-slot form-factor and keeps the air inside the case of your PC.

Nvidia GeForce 8800 GTS - G92 version

Nvidia's GeForce 8800 GTS: the G92 version

As we mentioned in our review, the GT gets hot to the touch, and we’ve recently heard a rumour that explains this situation. Nvidia was determined that the new GT would beat AMD’s equally new ATI Radeon HD 3870 so it raised the core and memory speeds as far as it dared and then set the fan speed to the point where it would just about keep the GT cool. The result is an impressive level of performance from a quiet, slender graphics card at a very keen price. The 8800 GT looks like a natural to replace the existing 8800 GTS over the next few months.

Which makes Nvidia’s new 8800 GTS something of a puzzle. For one thing, there’s the name. There is only one GT, so it’s clear that you’re getting a G92 chip. But the new GTS sits alongside existing GTS models that use the G80 chip. The safest way to tell them apart is that G80 cards have either 320MB or 640MB of memory while the G92 version comes with 512MB of GDDR 3. And a 256MB model is coming soon to further muddy the waters.

The technical differences between the new GTS and the GT are very slight and come down to clock speeds as they have the same amount of memory, the same memory controller and - according to most card suppliers - they each have 112 Stream Processors.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.