MPN CD8067303328000-RFB
Varenr. W128055874
Lager
Intel® AES New Instructions (Intel® AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.
Intel® VT-x with Extended Page Tables (EPT), also known as Second Level Address Translation (SLAT), provides acceleration for memory intensive virtualized a...
G077159
No
Yes
5A992C
Desktop
48
3.0
3.0
S4S
AVX/AVX 2.0/AVX-512/SSE4.2
No
8542310001
Yes
768 GB
Hexa-channel
2666 MHz
DDR4-SDRAM
89 °C
786432 MB
768 GB
0,4 kg
No
PC
No
120490
2,7 GHz
3,7 GHz
24,75 MB
L3
Skylake
18
Intel® Xeon® Gold
1st Generation Intel® Xeon® Scalable
14 nm
Intel
6150
64-bit
LGA 3647 (Socket P)
36
H0
165 Watt
2
Yes
Yes
Yes
Yes
Yes
1.00
No
Yes
Yes
Yes
Yes
Yes
No
Yes
Yes
2.0
Yes
Yes
0,3 kg
1.00
1.00
1.00
63903513
Q3'17
768 GB
2666 MHz
1.00
3
Intel Xeon Gold Intel Xeon Gold Processor
25344 KB
Intel Xeon Processors
Processor
Launched
DDR4-SDRAM
1 År
76mm x 56.5mm mm
Intel® AES New Instructions (Intel® AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.
Intel® VT-x with Extended Page Tables (EPT), also known as Second Level Address Translation (SLAT), provides acceleration for memory intensive virtualized applications. Extended Page Tables in Intel® Virtualization Technology platforms reduces the memory and power overhead costs and increases battery life through hardware optimization of page table management.
Intel® vPro™ Technology is a set of security and manageability capabilities built into the processor aimed at addressing four critical areas of IT security: 1) Threat management, including protection from rootkits, viruses, and malware 2) Identity and web site access point protection 3) Confidential personal and business data protection 4) Remote and local monitoring, remediation, and repair of PCs and workstations.
*Produktdata ovenfor leveres af Icecat. EET kan ikke holdes ansvarlig for fejl i forbindelse hertil.