Sidebar Sidebar Sidebar

UCS-CPU-E5-4650= - Cisco 2.70 GHZ E5-4650 130W 8C/20MB CACHE/DDR3 1600MHZ/NO HS

Write a Review
$10,087.97
$5,604.43
(You save $4,483.54 )

Have questions?

Adding to cart… The item has been added
SKU: UCS-CPU-E5-4650=
Availability: In Stock
Weight: 5.20 LBS
Shipping: Calculated at Checkout
Processor base frequency: 2.7 GHz
Processor cache: 20 MB
Processor model: E5-4650
Processor threads: 16
System bus rate: 8 GT/s
Processor operating modes: 32-bit, 64-bit
Processor boost frequency: 3.3 GHz
Number of QPI links: 2
Bus type: QPI
Component for: Server/workstation
Processor lithography: 32 nm
Processor family: Intel® Xeon® E5 Family
Processor cores: 8
Processor socket: LGA 2011 (Socket R)
Maximum internal memory supported by processor: 384 GB
Memory types supported by processor: DDR3-SDRAM
Memory clock speeds supported by processor: 800,1066,1333,1600 MHz
Memory channels: Quad-channel
ECC: Yes
On-board graphics card: No
46C566DB-4644-460E-8DA7-038C0B9646AB E06A9D60-42A9-4459-8131-FA3002495928
ECC Memory SupportedECC Memory Supported indicates processor support for Error-Correcting Code memory. ECC memory is a type of system memory that can detect and correct common kinds of internal data corruption. Note that ECC memory support requires both processor and chipset support.Intel Virtualization Technology (VT-x)Intel Virtualization Technology (VT-x) allows one hardware platform to function as multiple “virtual” platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions.Intel Virtualization Technology for Directed I/O (VT-d)Intel Virtualization Technology for Directed I/O (VT-d) continues from the existing support for IA-32 (VT-x) and Itanium processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environments.Intel VT-x with Extended Page Tables (EPT)Intel VT-x with Extended Page Tables (EPT), also known as Second Level Address Translation (SLAT), provides acceleration for memory intensive virtualized applications. Extended Page Tables in Intel Virtualization Technology platforms reduces the memory and power overhead costs and increases battery life through hardware optimization of page table management.Intel 64Intel 64 architecture delivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software. Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual and physical memory.Enhanced Intel SpeedStep TechnologyEnhanced Intel SpeedStep Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep Technology switches both voltage and frequency in tandem between high and low levels in response to processor load. Enhanced Intel SpeedStep Technology builds upon that architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery.AES New InstructionsAdvanced Encryption Standard New Instructions (AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.Trusted Execution TechnologyIntel Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system.Execute Disable BitExecute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks and prevent harmful software from executing and propagating on the server or network.

Customers Also Viewed