Feeds
85%
HIS 5850

AMD ATI Radeon HD 5870 and 5850 DirectX 11 GPUs

Next-generation gaming

  • alert
  • submit to reddit

High performance access to file storage

Review Before we dive into our review of the HIS Digital HD 5850 and Sapphire HD 5870 graphics cards, let’s take a quick look at the technology behind the AMD’s new family of graphics chips.

Sapphire Radeon HD 5870

Sapphire's Radeon HD 5870: a 50 per cent gaming performance boost...

These DirectX 11 graphics cores use the same 40nm fabrication process that we saw in the ATI Radeon HD 4770 and this has allowed AMD to increase the transistor count by a huge margin. The 55nm HD 4870 packed 956m transistors into a die size of 263mm² while the new 40nm HD 5870 has 2.15bn transistors - 2.25 times more - in a die area of 334mm², 27 per cent bigger than the previous one.

Most of those extra transistors have been used to double the number of stream processors, or unified shaders, and the remainder support the DirectX 11 features that will be introduced with Windows 7.

The HD 4850 and the HD 4870 each have 800 shaders, but we step up to 1440 shaders for HD 5850 and an enormous shader count of 1600 for the HD 5870. Like the HD 4890, the 5870 has an 850MHz core speed and a 256-bit memory controller. The 1GB of GDDR 5 memory it connects to has a clock speed of 1200MHz (4800MHz effective).

The short version is that HD 5000 is HD 4000 with double the number of shaders, more than double the transistors and the addition of DirectX 11. That may sound like a recipe for a volcano of a graphics chip but the 40nm die shrink has done the trick. The fully loaded power draw of the HD 5870 card is 188W, a tad lower than the HD 4890’s 190W.

HIS Digital HD 5850

HIS' 5850: ...but with an incredibly low idle power consumption

But the amazing thing is that the idle power draw of the HD 5870 has been reduced to a mere 27W. AMD is emphasising that this is one third of the 90W idle power draw of an HD 4870, but we feel it's more appropriate to focus on the 60W draw of the HD 4890. No matter how you look at it, the 27W power draw of the HD 5850 and 5870 is incredibly low.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.