Feeds
65%
Sapphire Radeon HD 5970

AMD ATI Radeon HD 5970 two-GPU graphics card

Serious performance, serious price

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

AMD has carried over the Volterra VT1165 Digital Programmable Regulators that have been used on previous graphics cards such as HD 4890, along with chips from Texas Instruments that allow real-time power monitoring. We understand these chips allow AMD to throttle performance if the thermal levels rise to unacceptable heights.

3DMark Vantage Results

Sapphire Radeon HD 5970

Longer bars are better

We lined up an HIS Digital HD 5970 with reference speeds of 725MHz/4000MHz and a Sapphire card that has the most miniscule overclock we have ever seen: 735MHz/4040MHz. That’s right, the core and memory are overclocked by a paltry 10MHz.

It may sound trite but running the two cards on our Core i7 test rig - Core i7-965, Intel DX58SO motherboard, Intel X25-M SSD and Windows 7 Professional - delivered epic performance in 3DMark Vantage, Battle Forge and Far Cry 2.

An HD 5870 churns out pixels and frames at a rate that is practically obscene so it comes as no surprise that the two chips in HD 5970 deliver more of the same. CrossFireX isn’t a perfect science and based on our experiences we reckon you can expect your HD 5970 to deliver 25-50 per cent more performance than an HD 5870.

Interestingly enough, the power draw that we measured at the mains socket was 290-300W with the system under load. That’s the motherboard, memory, CPU and graphics card so we can say that either we didn’t have the graphics card fully loaded, or AMD as been cautious with its power figures. We’ll vote for the first option as we doubt that any current game will properly stretch an HD 5970/Core i7 combo.

System Power Draw

Sapphire Radeon HD 5970

Power draw in Watts

Adding the second HD 5970 in CrossFireX raised our test results even further. In 3DMark Vantage, the overall score was 29,745 and the GPU score was 34,959. The HD 5870 of has a GPU score of 15,778.

Secure remote control for conventional and virtual desktops

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
End of buttons? Apple looks to patent animating iPhone sidewalls
Filing suggests handset with display strips
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
Tip: Put the shades on and you'll look less of a spanner
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.