Intel Xeon E5-2640 - Processor

Geen reviews beschikbaar Schrijf een review
Bekijk 1 andere uitvoering
Voeg toe aan vergelijker Prijs volgen

Prijzen

Prijzen bij bekende aanbieders

Hieronder vind je de meest recente nieuwprijzen bij onze directe partners, zodat je zeker weet dat je altijd een gloednieuw product met de beste garantie in huis haalt.

Amazon.be
  • 1-3 dagen
  • Check de website voor de levertijd|Gratis bezorgd > €20,-
€ 1.294,56 Gratis verzending
Login of registreer om de complete prijshistorie voor dit product te zien.
Prijshistorie inzien?

Login of registreer om de complete prijshistorie voor dit product te zien.

Registreren Inloggen

Reviews

We hebben voor dit product nog geen reviews

Help anderen en geef jouw mening over dit product. We verloten iedere maand onder alle reviewers 2 x € 250,-.

Schrijf een review

Specificaties

Algemeen

Toelichting type
-
Partnumber
BX80621E52640
Introductie model
2019
Op Kieskeurig sinds
May 2019
Releasedatum
February 2012
Socket/slot
LGA 2011 (Socket R)
Aantal cores
6
Graphics geïntegreerd
Nee

Algemene kenmerken

Eancode
0735858224031, 5032037019828, 6953041349680
Type/soort
processor

extra

gen_package_depth
140 mm
gen_package_height
117 mm
gen_package_width
44 mm

Inhoud en afmetingen

Gewicht verpakking
125 g

Toelichting specificaties

Intel® Xeon® Processor E5 Family\nThe Intel® Xeon® processor E5 family can boost server performance by up to 80% over previous-generation Intel® Xeon® processor–based servers.\n\nIntel® Integrated I/O on the Intel® Xeon® processor E5 family accelerates data availability to the processing cores, reducing latency by up to 30%.\n\nIntel® Xeon® processor E5 family processors intelligently deliver up to 70% more performance per watt, increasing computing power while maintaining maximum energy efficiency.\n\nIntel® Turbo Boost Technology\nIntel® Turbo Boost Technology dynamically increases the processor's frequency as needed by taking advantage of thermal and power headroom to give you a burst of speed when you need it, and increased energy efficiency when you don’t.\n\nIntel® vPro Technology\nIntel® vPro™ Technology is a set of security and manageability capabilities built into the processor aimed at addressing four critical areas of IT security: 1) Threat management, including protection from rootkits, viruses, and malware 2) Identity and web site access point protection 3) Confidential personal and business data protection 4) Remote and local monitoring, remediation, and repair of PCs and workstations.\n\nIntel® Hyper-Threading Technology\nIntel® Hyper-Threading Technology (Intel® HT Technology) delivers two processing threads per physical core. Highly threaded applications can get more work done in parallel, completing tasks sooner.\n\nIntel® Virtualization Technology (VT-x)\nIntel® Virtualization Technology (VT-x) allows one hardware platform to function as multiple “virtual” platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions.\n\nIntel® Virtualization Technology for Directed I/O (VT-d)\nIntel® Virtualization Technology for Directed I/O (VT-d) continues from the existing support for IA-32 (VT-x) and Itanium® processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environments.\n\nIntel® Trusted Execution Technology\nIntel® Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel® processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system.\n\nAES New Instructions\nAdvanced Encryption Standard New Instructions (AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, anthentication, random number generation, and authenticated encryption.\n\nIntel® 64\nIntel® 64 architecture delivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software.¹ Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual and physical memory.\n\nIdle States\nIdle States (C-states) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is doing useful work. C1 is the first idle state, C2 the second, and so on, where more power saving actions are taken for numerically higher C-states.\n\nEnhanced Intel SpeedStep® Technology\nEnhanced Intel SpeedStep® Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep® Technology switches both voltage and frequency in tandem between high and low levels in response to processor load. Enhanced Intel SpeedStep® Technology builds upon that architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery.\n\nIntel® Demand Based Switching\nIntel® Demand Based Switching is a power-management technology in which the applied voltage and clock speed of a microprocessor are kept at the minimum necessary levels until more processing power is required. This technology was introduced as Intel SpeedStep® Technology in the server marketplace.\n\nThermal Monitoring Technologies\nThermal Monitoring Technologies protect the processor package and the system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core's temperature, and the thermal management features reduce package power consumption and thereby temperature when required in order to remain within normal operating limits.\n\nIntel® Flex Memory Access\nIntel® Flex Memory Access facilitates easier upgrades by allowing different memory sizes to be populated and remain in dual-channel mode.\n\nExecute Disable Bit\nExecute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks and prevent harmful software from executing and propagating on the server or network.\n\nIntel® VT-x with Extended Page Tables (EPT)\nIntel® VT-x with Extended Page Tables (EPT), also known as Second Level Address Translation (SLAT), provides acceleration for memory intensive virtualized applications. Extended Page Tables in Intel® Virtualization Technology platforms reduces the memory and power overhead costs and increases battery life through hardware optimization of page table management.