Feeds
80%

Nvidia G92-based GeForce 8800 GTS 512MB

The 8800 GT and then some

Choosing a cloud hosting partner with confidence

Review The GeForce 8800 GT slipped into Nvidia’s line-up towards the top of the range by offering similar performance to the existing 8800 GTS with 320MB of memory. This was achieved with an updated version of the 'G80' chip called 'G92', which moved the fabrication process to 65nm, changed the memory controller, raised the core speed and increased the number of unified shaders - or Stream Processors.

Although the 8800 GT performed in a similar way to the 8800 GTS it used a different technical approach and employed a different design. Where 8800 GTS and GTX are double-slot designs that blow cooling air over a hefty heatsink and out through a vented bracket at the back of the case, the new GT has a single-slot form-factor and keeps the air inside the case of your PC.

Nvidia GeForce 8800 GTS - G92 version

Nvidia's GeForce 8800 GTS: the G92 version

As we mentioned in our review, the GT gets hot to the touch, and we’ve recently heard a rumour that explains this situation. Nvidia was determined that the new GT would beat AMD’s equally new ATI Radeon HD 3870 so it raised the core and memory speeds as far as it dared and then set the fan speed to the point where it would just about keep the GT cool. The result is an impressive level of performance from a quiet, slender graphics card at a very keen price. The 8800 GT looks like a natural to replace the existing 8800 GTS over the next few months.

Which makes Nvidia’s new 8800 GTS something of a puzzle. For one thing, there’s the name. There is only one GT, so it’s clear that you’re getting a G92 chip. But the new GTS sits alongside existing GTS models that use the G80 chip. The safest way to tell them apart is that G80 cards have either 320MB or 640MB of memory while the G92 version comes with 512MB of GDDR 3. And a 256MB model is coming soon to further muddy the waters.

The technical differences between the new GTS and the GT are very slight and come down to clock speeds as they have the same amount of memory, the same memory controller and - according to most card suppliers - they each have 112 Stream Processors.

Beginner's guide to SSL certificates

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
Here's your chance to buy an ancient, working APPLE ONE
Warning: Likely to cost a lot even for a Mac
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.