Feeds
80%

Nvidia G92-based GeForce 8800 GTS 512MB

The 8800 GT and then some

High performance access to file storage

Review The GeForce 8800 GT slipped into Nvidia’s line-up towards the top of the range by offering similar performance to the existing 8800 GTS with 320MB of memory. This was achieved with an updated version of the 'G80' chip called 'G92', which moved the fabrication process to 65nm, changed the memory controller, raised the core speed and increased the number of unified shaders - or Stream Processors.

Although the 8800 GT performed in a similar way to the 8800 GTS it used a different technical approach and employed a different design. Where 8800 GTS and GTX are double-slot designs that blow cooling air over a hefty heatsink and out through a vented bracket at the back of the case, the new GT has a single-slot form-factor and keeps the air inside the case of your PC.

Nvidia GeForce 8800 GTS - G92 version

Nvidia's GeForce 8800 GTS: the G92 version

As we mentioned in our review, the GT gets hot to the touch, and we’ve recently heard a rumour that explains this situation. Nvidia was determined that the new GT would beat AMD’s equally new ATI Radeon HD 3870 so it raised the core and memory speeds as far as it dared and then set the fan speed to the point where it would just about keep the GT cool. The result is an impressive level of performance from a quiet, slender graphics card at a very keen price. The 8800 GT looks like a natural to replace the existing 8800 GTS over the next few months.

Which makes Nvidia’s new 8800 GTS something of a puzzle. For one thing, there’s the name. There is only one GT, so it’s clear that you’re getting a G92 chip. But the new GTS sits alongside existing GTS models that use the G80 chip. The safest way to tell them apart is that G80 cards have either 320MB or 640MB of memory while the G92 version comes with 512MB of GDDR 3. And a 256MB model is coming soon to further muddy the waters.

The technical differences between the new GTS and the GT are very slight and come down to clock speeds as they have the same amount of memory, the same memory controller and - according to most card suppliers - they each have 112 Stream Processors.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.