Every effort has been made to ensure the accuracy of all information contained herein. e-nitiative shall not be liable for any changes resulting in wrong product description, tax code and/or price. The shown information (specifications, prices, taxes) should be considered as an indication and can be changed at any moment and without any prior notice.
RS-DATA bvba
Onze lieve vrouw ten steenstraat 1
B-3300 Tienen
Belgium
Telephone : 016/820712
VAT : BE 466.551.192
ECC Memory Supported
ECC Memory Supported indicates processor support for Error-Correcting Code memory. ECC memory is a type of system memory that can detect and correct common kinds of internal data corruption. Note that ECC memory support requires both processor and chipset support.
IntelŪ Virtualization Technology for Directed I/O (VT-d)
IntelŪ Virtualization Technology for Directed I/O (VT-d) continues from the existing support for IA-32 (VT-x) and ItaniumŪ processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environments.
IntelŪ VT-x with Extended Page Tables (EPT)
IntelŪ VT-x with Extended Page Tables (EPT), also known as Second Level Address Translation (SLAT), provides acceleration for memory intensive virtualized applications. Extended Page Tables in IntelŪ Virtualization Technology platforms reduces the memory and power overhead costs and increases battery life through hardware optimization of page table management.
IntelŪ 64
IntelŪ 64 architecture delivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software. Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual and physical memory.
AES New Instructions
Advanced Encryption Standard New Instructions (AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.
Execute Disable Bit
Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks and prevent harmful software from executing and propagating on the server or network.
E5-2609V3
1.9 GHz
Intel Xeon E5 v3
6
LGA 2011-v3
Server/workstation
22 nm
6
6.4 GT/s
32-bit, 64-bit
3.2 GHz
15 MB
L3
85 W
0.65 - 1.3 V
QPI
2
51 GB/s
768 GB
DDR4-SDRAM
1600 MHz
Quad-channel
Y
N
Y
Y
Y
Server
40
3.0
AVX 2.0
2S
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
70.9 °C
VT-d,VT-x
HP DL80 Gen9