|Processorfamilj||Intel® Xeon® E5 familjen|
|Processor antal trådar||16|
|Processorns cache||20 MB|
|Antal QPI länkar||1|
|Minnestyper som stöds av processorn||DDR3-SDRAM|
|Minnesklockfrekvens som stöds av processorn||1600 MHz|
|Minneskanaler som stöds av processorn||Tredubbel|
|Processor med ECC-stöd|
|Intel® Virtualization Technology (Intel® VT)||VT-x|
|Intel® Hyper Threading Technology (Intel® HT Technology)|
|Intel® Turbo Boost Technology|
|Intel® AES nya instruktioner (Intel® AES-NI)|
|Enhanced Intel Speedstep Technology|
|Intel® Trusted Execution Technology|
|Intel® Virtualization Technology for Directed I/O (VT-d)|
|Intel Virtualization Technology (VT-x)|
|PCI Express-kortplatser version||3.0|
|Värmeavledningseffekt (TDP)||70 W|
Intel® Hyper-Threading Technology
Today's Intel® Hyper-Threading Technology (Intel® HT Technology) delivers thread-level parallelism on each processor resulting in more efficient use of processor resources—higher processing throughput—and improved performance on the multi-threaded software of today and tomorrow.
Intel® Virtualization Technology (VT-x)
Increasing manageability, security, and flexibility in IT environments, virtualization technologies like hardware-assisted Intel® Virtualization Technology (Intel® VT) combined with software-based virtualization solutions provide maximum system utilization by consolidating multiple environments into a single server or PC. By abstracting the software away from the underlying hardware, a world of new usage models opens up that reduce costs, increase management efficiency, strengthen security, while making your computing infrastructure more resilient in the event of a disaster.
Intel® Trusted Execution Technology
Intel® Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel® processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. Intel Trusted Execution Technology provides hardware-based mechanisms that help protect against software-based attacks and protects the confidentiality and integrity of data stored or created on the client PC. It does this by enabling an environment where applications can run within their own space, protected from all other software on the system. These capabilities provide the protection mechanisms, rooted in hardware, that are necessary to provide trust in the application's execution environment. In turn, this can help to protect vital data and processes from being compromised by malicious software running on the platform.
Intel® 64 architecture delivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software. Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual and physical memory.
Enhanced Intel SpeedStep® Technology
Enhanced Intel SpeedStep® Technology is an advanced means of enabling very high performance while also meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep Technology switches both voltage and frequency in tandem between high and low levels in response to processor load.