Language Selection

English French German Italian Portuguese Spanish

NVIDIA Preps More GeForce 7 Graphics Chips

Filed under
Hardware

NVIDIA Corp. may be preparing a new GeForce 7-series graphics processors in addition to already launched GeForce 7800 GTX product, as the firm's unofficial drivers already list a chip code-named G72, which may turn out to be a more affordable GeForce 7 family member.

NVIDIA's ForceWare 80.40 drivers, which were recently leaked on the Internet and are available at 3DChipset web-site, list G72 and NV48 graphics processing units, which were not yet released, among all the graphics chips the driver is capable of support. The driver also supports yet unreleased, but already somewhat known - GeForce 6600 LE, nForce4 C51 IGP, G70GL and Quadro FX 4500 - products.

It is unclear for which markets the code-named G72 and NV48 products are positioned for, but is likely that the former belongs to the GeForce 7 family, whereas the latter probably belongs to the GeForce 6-series.

Usually NVIDIA designs three chips for one product lineup aiming at entry-level, mainstream and high-end markets. But with the last generation GeForce 6 lineup NVIDIA designed five chips: GeForce 6200 (NV44), GeForce 6600 (NV43), GeForce 6800 (NV40, NV41 and NV42) as well as GeForce 6800 GT/Ultra (NV40). The NV41 and NV42 processors were designed for performance-mainstream markets: they both feature 12 pixel and 5 vertex pipelines, whereas NV40 chip sports 16 pixel and 6 vertex processors.

NVIDIA GeForce 7800 GTX graphics chip features 24 pixel pipelines, 8 vertex pipelines and consists of more than 300 million transistors. By contrast, its top-end predecessor - GeForce 6800 Ultra - consisted of 220 million of transistors and had 16 pixel and 6 vertex processors. NVIDIA said its new graphics chip is aggressively more efficient than the previous-generation product, which was proved by X-bit labs' measurements: by having more transistors and 30MHz higher clock-speed, the new chip consumes just 3W more than the former top-of-the-range product and delivers up to more than 50% performance improvement in graphics intensive games.

A mainstream version of the GeForce 7 architecture - with 12 or 16 pixel pipelines as well as 5 or 6 vertex processors - may offer performance similar to the current high-end of the GeForce 6 lineup, which may affect sales of graphics cards based on the GeForce 6800-series chips, which is something that is unlikely to make graphics cards makers, who already have appropriate chips in stock, happy.

Source.

More in Tux Machines

KDE on Android: CI, CD & SDK

I guess we all agree that one of the biggest stoppers to get a contribution out is the ability to get the system ready to start working on the contribution. Today I want to talk a bit about generating Android binaries from our machine. In the KDE Edu sprint we had the blatant realisation that it’s very frustrating to keep pushing the project while not being swift at delivering fresh packages of our applications in different systems. We looked into windows, flatpak, snap and, personally, I looked into Android once again. Nowadays, KDE developers develop the applications on their systems and then create the binaries on their systems as well. Usually it’s a team effort where possibly just one person in the team will be familiar with Android and have the development combo in place: Android SDK, Android NDK, Qt binaries and often several KDE Frameworks precompiled. Not fun and a fairly complex premise. Read more Also:

today's howtos

Linux Kernel and Security: LVM2, Containers, AMD

  • LVM2 Begins Work On Major Changes To Logical Volume Management
    LVM2 as the user-space tools for Logical Volume Management (LVM) on Linux is in the process of going through a big re-work.
  • Containers and Cloud Security
    The idea behind this blog post is to take a new look at how cloud security is measured and what its impact is on the various actors in the cloud ecosystem. From the measurement point of view, we look at the vertical stack: all code that is traversed to provide a service all the way from input web request to database update to output response potentially contains bugs; the bug density is variable for the different components but the more code you traverse the higher your chance of exposure to exploitable vulnerabilities. We’ll call this the Vertical Attack Profile (VAP) of the stack. However, even this axis is too narrow because the primary actors are the cloud tenant and the cloud service provider (CSP). In an IaaS cloud, part of the vertical profile belongs to the tenant (The guest kernel, guest OS and application) and part (the hypervisor and host OS) belong to the CSP. However, the CSP vertical has the additional problem that any exploit in this piece of the stack can be used to jump into either the host itself or any of the other tenant virtual machines running on the host. We’ll call this exploit causing a failure of containment the Horizontal Attack Profile (HAP). We should also note that any Horizontal Security failure is a potentially business destroying event for the CSP, so they care deeply about preventing them. Conversely any exploit occurring in the VAP owned by the Tenant can be seen by the CSP as a tenant only problem and one which the Tenant is responsible for locating and fixing. We correlate size of profile with attack risk, so the large the profile the greater the probability of being exploited.
  • Canonical Releases AMD Microcode Updates for All Ubuntu Users to Fix Spectre V2
    Canonical released a microcode update for all Ubuntu users with AMD processors to address the well-known Spectre security vulnerability. The Spectre microprocessor side-channel vulnerabilities were publicly disclosed earlier this year and discovered to affect billions of devices made in the past two decades. Unearthed by Jann Horn of Google Project Zero, the second variant (CVE-2017-5715) of the Spectre vulnerability is described as a branch target injection attack.

Programming: 5 Pillars of Learning Programming, New Releases of Rust and Git

  • 5 Pillars of Learning Programming
    Learning how to program is hard. I often find that university courses and boot camps miss important aspects of programming and take poor approaches to teaching rookies. I want to share the 5 basic pillars I believe a successful programming course should build upon. As always, I am addressing the context of mainstream web applications. A rookie’s goal is to master the fundamentals of programming and to understand the importance of libraries and frameworks. Advanced topics such as the cloud, operations in general, or build tools should not be part of the curriculum. I am also skeptical when it comes to Design Patterns. They presume experience that beginners never have.
  • The Rust Programming Language Blog: Announcing Rust 1.27
    The Rust team is happy to announce a new version of Rust, 1.27.0. Rust is a systems programming language focused on safety, speed, and concurrency.
  • Rust 1.27 Released With SIMD Improvements
    Most notable to Rust 1.27 is SIMD support via the std::arch module to make use of SIMD (Single Instruction, Multiple Data) instructions directly. Up to now Rust could already make use of LLVM's auto-vectorization support, but this lets Rust developers write SIMD instructions on their own and to allow for the proper Rust code to be executed based upon the CPU at run-time.
  • Git 2.18 Released With Initial Version Of Its New Wire Protocol
    Version 2.18 of the Git distributed revision control system is now available. Arguably most notable about Git 2.18 is the introduction of its new wire protocol "protocol_v2" that is designed to offer much greater performance. This new protocol is designed to be much faster and is already being used at Google and elsewhere due to the significant performance benefits.
  • Git v2.18.0
    The latest feature release Git v2.18.0 is now available at the usual places. It is comprised of 903 non-merge commits since v2.17.0, contributed by 80 people, 24 of which are new faces.