Technical details | |
Supported memory types | DDR3 |
Product type | Processor |
Processor cache | 12288 KB |
Processor core voltage | 0.750-1.350 V |
Status | Discontinued |
Launch date | Q1'11 |
Product name | Intel Xeon X5690 (12M Cache, 3.46 GHz, 6.40 GT/s Intel QPI) |
Born on date | Q1'11 |
Bus type units | GT/s |
Bus bandwidth | 6.4 |
Maximum memory | 288 GB |
Processor brand name | Intel Xeon |
Last change | 63903513 |
Product family | Intel Xeon Processor 5000 Sequence |
Bus speed | 6.4 GT/s |
Processor | |
Processor model | X5690 |
Processor manufacturer | Intel |
Processor front side bus | 1333 MHz |
Processor lithography | 32 nm |
Processor family | Intel Xeon |
Box | ![]() |
Processor socket | LGA 1366 |
Stepping | B1 |
Processor cores | 6 |
Processor code | SLBVX |
CPU multiplier (bus/core ratio) | 26 |
VID Voltage Range | 0.75 - 1.35 V |
System bus rate | 6.4 GT/s |
Processor threads | 12 |
Processor operating modes | 64-bit |
Processor boost frequency | 3.73 GHz |
Component for | Server/workstation |
Processor cache | 12 MB |
Bus type | QPI |
Number of QPI links | 2 |
Thermal Design Power (TDP) | 130 W |
Processor codename | Westmere EP |
Processor cache type | Smart Cache |
Processor series | Intel Xeon 5600 Series |
Memory bandwidth supported by processor (max) | 32 GB/s |
Processor ARK ID | 52576 |
Cooler included | ![]() |
Processor base frequency | 3.46 GHz |
Memory | |
ECC | ![]() |
Memory channels | Triple-channel |
Maximum internal memory supported by processor | 288 GB |
Memory types supported by processor | DDR3-SDRAM |
Memory clock speeds supported by processor | 800,1066,1333 MHz |
Weight & dimensions | |
Processor package size | 42.5mm x 45mm |
Operational conditions | |
Tcase | 78.5 °C |
Packaging data | |
Package type | Retail box |
Other features | |
Maximum internal memory | 288 GB |
Intel® Virtualization Technology (Intel® VT) | VT-d, VT-x |
Cache memory | 12 MB |
Graphics | |
On-board graphics card | ![]() |
Processor special features | |
Intel® Hyper Threading Technology (Intel® HT Technology) | ![]() |
Intel® Turbo Boost Technology | 1.0 |
Intel® AES New Instructions (Intel® AES-NI) | ![]() |
Enhanced Intel SpeedStep Technology | ![]() |
Intel Trusted Execution Technology | ![]() |
Intel Enhanced Halt State | ![]() |
Intel VT-x with Extended Page Tables (EPT) | ![]() |
Intel Demand Based Switching | ![]() |
Intel 64 | ![]() |
Intel Virtualization Technology for Directed I/O (VT-d) | ![]() |
Intel Virtualization Technology (VT-x) | ![]() |
Features | |
Supported instruction sets | SSE4.2 |
Execute Disable Bit | ![]() |
Idle States | ![]() |
Thermal Monitoring Technologies | ![]() |
Physical Address Extension (PAE) | 40 bit |
CPU configuration (max) | 2 |
Embedded options available | ![]() |
Market segment | Server |
Export Control Classification Number (ECCN) | 5A992C |
Commodity Classification Automated Tracking System (CCATS) | G077159 |
Logistics data | |
Harmonized System (HS) code | 8542310001 |
EAN | 7330381789366 |
Source: Icecat.biz |
Intel® Turbo Boost Technology
Intel® Turbo Boost Technology dynamically increases the processor's frequency as needed by taking advantage of thermal and power headroom to give you a burst of speed when you need it, and increased energy efficiency when you don’t.
Intel® Hyper-Threading Technology
Intel® Hyper-Threading Technology (Intel® HT Technology) delivers two processing threads per physical core. Highly threaded applications can get more work done in parallel, completing tasks sooner.
Intel® Virtualization Technology (VT-x)
Intel® Virtualization Technology (VT-x) allows one hardware platform to function as multiple “virtual” platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions.
Intel® Trusted Execution Technology
Intel® Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel® processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system.
AES New Instructions
Advanced Encryption Standard New Instructions (AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, anthentication, random number generation, and authenticated encryption.
Intel® 64
Intel® 64 architecture delivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software.¹ Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual and physical memory.
Idle States
Idle States (C-states) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is doing useful work. C1 is the first idle state, C2 the second, and so on, where more power saving actions are taken for numerically higher C-states.
Enhanced Intel SpeedStep® Technology
Enhanced Intel SpeedStep® Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep® Technology switches both voltage and frequency in tandem between high and low levels in response to processor load. Enhanced Intel SpeedStep® Technology builds upon that architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery.
Intel® Demand Based Switching
Intel® Demand Based Switching is a power-management technology in which the applied voltage and clock speed of a microprocessor are kept at the minimum necessary levels until more processing power is required. This technology was introduced as Intel SpeedStep® Technology in the server marketplace.
Execute Disable Bit
Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks and prevent harmful software from executing and propagating on the server or network.
Estimated delivery: No delivery info
Today: Closed (1 May)
Estimated delivery: No delivery info
Today: Closed (May Day)
Estimated delivery: No delivery info
Today: Closed (May Day)
Estimated delivery: No delivery info
Today: Closed
Estimated delivery: No delivery info
Today: Closed (May Day)
Estimated delivery time: No delivery info
Estimated delivery time: No delivery info
Estimated delivery time: No delivery info
Estimated delivery time: No delivery info
Estimated delivery time: No delivery info
Estimated delivery time: No delivery info