Language Selection

English French German Italian Portuguese Spanish

Nvidia GTX 1070 Ti review: A fine graphics card—but price remains high

Filed under
Graphics/Benchmarks
Reviews

The GTX 1070 Ti is a great graphics card but a frustrating product. In the year and a half since the GTX 1080 and the GTX 1070 launched, Nvidia has faced little competition from rival AMD, which has been stretched thin across the launch of mainstream graphics cards like the RX 480 and high-end processors like Ryzen Threadripper. As brilliant as those products are, particularly Threadripper, it took until August of this year for AMD to launch a competitor to Nvidia's year-old graphics cards. The resulting RX Vega 64 wasn't the graphical powerhouse many were hoping for, with high power consumption and performance that couldn't quite top a GTX 1080.

Read more

Benchmarks Coming

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Software: Latte Dock, Emacs, Ick, REAPER

  • Latte Dock 0.8 Released with Widget Separators, Setup Sharing, More
    A new version of Latte Dock, an icon-based task bar for the KDE desktop, is available to download. Latte Dock 0.8 is the first stable release of the app switching software in almost a year and is the third stable release overall.
  • 3 Emacs modes for taking notes
    No matter what line of work you're in, it's inevitable you have to take a few notes. Often, more than a few. If you're like many people in this day and age, you take your notes digitally. Open source enthusiasts have a variety of options for jotting down their ideas, thoughts, and research in electronic format. You might use a web-based tool. You might go for a desktop application. Or, you might turn to the command line. If you use Emacs, that wonderful operating system disguised as a text editor, there are modes that can help you take notes more efficiently. Let's look at three of them.
  • Ick version 0.53 released: CI engine
    I have just made a new release of ick, my CI system. The new version number is 0.53, and a summary of the changes is below. The source code is pushed to my git server (git.liw.fi), and Debian packages to my APT repository (code.liw.fi/debian). See https://ick.liw.fi/download/ for instructions.
  • REAPER 5.93 Brings New Linux-Native Builds
    Since 2016 we have been looking forward to the REAPER digital audio workstation software for Linux while with this week's v5.93 release, the experimental Linux-native builds are now officially available.
  • Digital Audio Workstation REAPER Adds Experimental Native Linux Builds
    REAPER, a popular music production tool, added experimental native Linux builds to its download page with the latest 5.93 release. Initially released in 2005, REAPER (Rapid Environment for Audio Production, Engineering, and Recording) is a powerful digital audio workstation (DAW) and MIDI sequencer, available for Windows, macOS and Linux. Cockos, the company that develops REAPER, was founded by Justin Frankel of Winamp and Gnutella peer-to-peer network fame. The application uses a proprietary license and you can evaluate it for free for 60 days without having to provide any personal details or register. After the free trial ends, you can continue to use it but a nag screen will show up for a few seconds when the application starts. A license costs $225 for commercial use, or $60 for a discounted license (details here).

today's howtos

Red Hat News

At Rest Encryption

There are many steps you can take to harden a computer, and a common recommendation you'll see in hardening guides is to enable disk encryption. Disk encryption also often is referred to as "at rest encryption", especially in security compliance guides, and many compliance regimes, such as PCI, mandate the use of at rest encryption. This term refers to the fact that data is encrypted "at rest" or when the disk is unmounted and not in use. At rest encryption can be an important part of system-hardening, yet many administrators who enable it, whether on workstations or servers, may end up with a false sense of security if they don't understand not only what disk encryption protects you from, but also, and more important, what it doesn't. Read more