pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

SLI Technology

Unveiled in the summer of 2004, SLI (Scaleable Link Interface) is Nvidia’s revolutionary approach to 3D graphics scalability which exploits the additional bandwidth and features of the PCI Express bus architecture to allow two graphics cards to operate in a single PC or workstation, thereby dramatically increasing graphics horsepower and delivering as much as 2x the performance of a single GPU configuration.

SLI joins two identical Nvidia graphics cards by way of a compatible motherboard sporting a pair of PCIe x16 slots, the company’s SLI-compatible PCIe graphics cards having a row of pins along their top edge that accept a daughter card that connects the cards, straddling the gap between adjacent card slots.

Nvidia

The SLI-compatible cards feature hardware and software innovations within their GPU and MCP (media and communications processor) components which facilitate use of the high-speed digital interface for the synchronisation and transfer of image information.

The way the rendering task is split between the two cards is not fixed, as it would be, for example, if either card were to be responsible for rendering either odd or even lines. Rather, each card renders whole sections of the screen at a time, the dynamic load balancing technique employed being designed to allow each card to work at as near to its full capacity as possible.

Nvidia was to enjoy a spell in which it was unchallenged in the dual graphics card arena. However, given its success, it was no surprise when arch-rival ATI launched its answer to SLI a few months down the line.

  • How Do Computers Make Pictures?
  • Graphic Card Resolution
  • Graphic Card Colour Depth
  • Graphic Card Components
  • Graphic Card Memory
  • Graphic Card Driver Software
  • 3d Accelerated Graphic Cards
  • Graphic Card Geometry
  • 3D Rendering
  • FSAA Graphic Card Technology
  • Digital Graphic Cards
  • DVI Graphic Cards
  • HDCP Technology
  • Graphic Card HDMI Ports
  • Graphic Card Display Port
  • Unified Display Special Interest Group
  • DirectX
  • OpenGL technology
  • Direct3D
  • Talisman
  • Fahrenheit Graphic Cards
  • SLI Technology
  • CrossFire Graphic Cards

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Google+ (Opens in new window)

Related

Filed Under: Graphics Cards

Latest Articles

Identifying and Protecting Against the Most Dangerous Keyloggers

Keyloggers are among the most frightening tools in the hands of a skilled hacker. They are malicious devices or malware applications that enable hackers to capture every keystroke that you type. Most Dangerous Keyloggers You need to be aware of the different types of keyloggers and know how to … [Read More...]

LED Flat Panels

LED Flat Panels

Nearly everyone is familiar with LEDs (light-emitting diodes) from their use as indicator lights and numeric displays on consumer electronic devices. The basic LED is a solid-state device that contains a chemical compound that gives off light … [Read More...]

Genie Backup Manager Review

Genie Backup Manager Review

PROS: Very easy to use data backup program that offers remote backup features and full image backups so you can recover quickly when hard drive failure hits CONS: Waiting on user feedback because we have none! This software simply rocks. OVERVIEW: It's hard to find such an easy and straight … [Read More...]


Eliminating Common WordPress Vulnerabilities to DDoS Attacks

Distributed Denial of Service (DDoS) attacks are serious threats that every website manager must be prepared for. Unfortunately, some of the most … [Read More...]

Securing Your Privacy Against Deep Packet Inspections

Network administrators, cybersecurity analysts and watchdogs use a variety of different tools to monitor Internet traffic. Deep packet inspection is … [Read More...]

Identifying and Protecting Against the Most Dangerous Keyloggers

Keyloggers are among the most frightening tools in the hands of a skilled hacker. They are malicious devices or malware applications that enable … [Read More...]

Excel Shortcuts for More Complicated Commands

We previously wrote an article on the benefits of using keyboard shortcuts in Excel. The shortcuts we focused on were used for simple formatting … [Read More...]

CleanTalk as Your Weapon against Spam

CleanTalk as Your Weapon against Spam

Are you tired of spam? You aren't alone. It has become a massive epidemic over the past few years. Around 14.5 billion spam messages are sent every … [Read More...]

VPN in 2019: Shortcut to Prevent Data Theft and Monitoring

VPN in 2019: Shortcut to Prevent Data Theft and Monitoring

Not all people are in the know about the beneficial functions of Virtual Private Networks. Some users install them to unblock torrenting sites, for … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Remove Win 7 Security 2012

Win 7 Security 2012 Win 7 Security 2012 is part of a multi rogue malware set. It goes by several different names. The purpose of this kind of malware … [Read More...]

CD-RW Installation Bios Setup

To have the BIOS automatically detect the new drive and set its parameters you need to enter the Standard CMOS Setup category of the BIOS Setup and … [Read More...]

Monitor Controls

Not so long ago, advanced controls were found only on high-end monitors. Now, even budget models boast a wealth of image … [Read More...]

Return to top of page

Copyright © 2019 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors