Feeds

AMD tempts gamers with multi-monitor Eye candy

One card, six displays, one billion pixels

High performance access to file storage

AMD has announced a new graphics card that can fill six displays with over one billion pixels per second to provide what the company unblushingly claims to be "the ultimate in entertainment and productivity".

The Wednesday announcement of the expansively named ATI Radeon HD 5870 Eyefinity 6 Edition notes that users of the card can benefit from the "well-developed ecosystem" of ATI's Eyefinity technology, and that the new card will use updated Catalyst drivers.

ATI Radeon HD 5870 Eyefinity 6 Edition

Six independent display controllers support either six independent displays or one unified mega-view

Although AMD pays some lip service to the Eyefinity 6's productivity capabilities - think multiple-monitor spreadsheet, business intelligence, and newsfeed setups - the card's clear target is the gamer who wants a wrap-around, immersive experience. As the company gushes: "Think of it as Surround Sight." The release specifically cites Codemasters' DiRT 2 and EA's Battlefield: Bad Company 2, both which can take advantage of the card's DirectX 11 support.

Bezel compensation is available in the March 2010 Catalyst 10.3 driver, but to benefit from it, all your displays will need to have pixel densities of within five per cent of each other.

The Radeon HD 5870 GPU driving the Eyefinity 6 is a 40 nanometer, 2.1 billion transistors beastie with 1,600 stream processing units. Its GDDR5 interface provides 153.6 gigabytes per second of bandwidth - the Eyefinity 6 comes with 2GB of GDDR5 memory. It supports OpenGL 3.2 and OpenCL 1.0, and connects to your machine over its PCI Express 2.1 x16 bus interface.

A full listing of the ATI Radeon HD 5870 Eyefinity 6 Edition's specs, speeds, and feeds can be found here. Pricing and availability were not included in today's announcement, and AMD did not immediately respond to our requests for any hint as to when the Eyefinity 6 might be available and how much it might set you back. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.