Cisco Intel Xeon E5-2690 v2 processor 3 GHz 25 MB L3

Cisco Intel Xeon E5-2690 v2. Processor family: Intel® Xeon® E5 V2 Family, Processor socket: LGA 2011 (Socket R), Processor lithography: 22 nm. Memory channels: Quad-channel, Maximum internal memory supported by processor: 768 GB, Memory types supported by processor: DDR3-SDRAM. Market segment: Server, PCI Express configurations: 1x4, 1x8, 1x16, Supported instruction sets: AVX. Intel® Virtualization Technology (Intel® VT): VT-d, VT-x
Manufacturer: Cisco
SKU: 10598463
Manufacturer part number: UCS-CPU-E52690B
Vendor: Synnex
MSRP: $6,103.00
$2,755.07
Ship to
*
*
Shipping Method
Name
Estimated Delivery
Price
No shipping options
ECC Memory Supported ECC Memory Supported indicates processor support for Error-Correcting Code memory. ECC memory is a type of system memory that can detect and correct common kinds of internal data corruption. Note that ECC memory support requires both processor and chipset support. Intel Virtualization Technology (VT-x) Intel Virtualization Technology (VT-x) allows one hardware platform to function as multiple “virtual” platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions. Intel Virtualization Technology for Directed I/O (VT-d) Intel Virtualization Technology for Directed I/O (VT-d) continues from the existing support for IA-32 (VT-x) and Itanium processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environments. Intel VT-x with Extended Page Tables (EPT) Intel VT-x with Extended Page Tables (EPT), also known as Second Level Address Translation (SLAT), provides acceleration for memory intensive virtualized applications. Extended Page Tables in Intel Virtualization Technology platforms reduces the memory and power overhead costs and increases battery life through hardware optimization of page table management. Intel 64 Intel 64 architecture delivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software. Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual and physical memory. Idle States Idle States (C-states) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is doing useful work. C1 is the first idle state, C2 the second, and so on, where more power saving actions are taken for numerically higher C-states. Enhanced Intel SpeedStep Technology Enhanced Intel SpeedStep Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep Technology switches both voltage and frequency in tandem between high and low levels in response to processor load. Enhanced Intel SpeedStep Technology builds upon that architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery. Thermal Monitoring Technologies Thermal Monitoring Technologies protect the processor package and the system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core's temperature, and the thermal management features reduce package power consumption and thereby temperature when required in order to remain within normal operating limits AES New Instructions Advanced Encryption Standard New Instructions (AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption. Secure Key Intel Secure Key consists of a digital random number generator that creates truly random numbers to strengthen encryption algorithms. Trusted Execution Technology Intel Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system. Execute Disable Bit Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks and prevent harmful software from executing and propagating on the server or network.
ECC Memory Supported ECC Memory Supported indicates processor support for Error-Correcting Code memory. ECC memory is a type of system memory that can detect and correct common kinds of internal data corruption. Note that ECC memory support requires both processor and chipset support. Intel Virtualization Technology (VT-x) Intel Virtualization Technology (VT-x) allows one hardware platform to function as multiple “virtual” platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions. Intel Virtualization Technology for Directed I/O (VT-d) Intel Virtualization Technology for Directed I/O (VT-d) continues from the existing support for IA-32 (VT-x) and Itanium processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environments. Intel VT-x with Extended Page Tables (EPT) Intel VT-x with Extended Page Tables (EPT), also known as Second Level Address Translation (SLAT), provides acceleration for memory intensive virtualized applications. Extended Page Tables in Intel Virtualization Technology platforms reduces the memory and power overhead costs and increases battery life through hardware optimization of page table management. Intel 64 Intel 64 architecture delivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software. Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual and physical memory. Idle States Idle States (C-states) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is doing useful work. C1 is the first idle state, C2 the second, and so on, where more power saving actions are taken for numerically higher C-states. Enhanced Intel SpeedStep Technology Enhanced Intel SpeedStep Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep Technology switches both voltage and frequency in tandem between high and low levels in response to processor load. Enhanced Intel SpeedStep Technology builds upon that architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery. Thermal Monitoring Technologies Thermal Monitoring Technologies protect the processor package and the system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core's temperature, and the thermal management features reduce package power consumption and thereby temperature when required in order to remain within normal operating limits AES New Instructions Advanced Encryption Standard New Instructions (AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption. Secure Key Intel Secure Key consists of a digital random number generator that creates truly random numbers to strengthen encryption algorithms. Trusted Execution Technology Intel Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system. Execute Disable Bit Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks and prevent harmful software from executing and propagating on the server or network.
Products specifications
Attribute nameAttribute value
Component forServer/workstation
ECCY
Memory channelsQuad-channel
Processor familyIntel® Xeon® E5 V2 Family
Processor modelE5-2690V2
Processor boost frequency3.6 GHz
Processor cores10
Processor threads20
Processor cache25 MB
Bus typeQPI
CPU configuration (max)2
PCI Express configurations1x4, 1x8, 1x16
PCI Express slots version3.0
Processor cache typeL3
Processor lithography22 nm
Processor operating modes32-bit, 64-bit
Processor socketLGA 2011 (Socket R)
Scalability2S
Thermal Design Power (TDP)130 W
Maximum internal memory supported by processor768 GB
Memory bandwidth supported by processor (max)59.7 GB/s
Enhanced Intel SpeedStep TechnologyY
Execute Disable BitY
Idle StatesY
Intel Trusted Execution TechnologyY
Intel Virtualization Technology (VT-x)Y
Intel Virtualization Technology for Directed I/O (VT-d)Y
Intel VT-x with Extended Page Tables (EPT)Y
Intel® AES New Instructions (Intel® AES-NI)Y
Intel® Hyper Threading Technology (Intel® HT Technology)Y
Intel® Secure KeyY
Intel® Smart CacheY
Intel® Turbo Boost Technology2.0
Number of QPI links2
Thermal Monitoring TechnologiesY
Memory types supported by processorDDR3-SDRAM
On-board graphics cardN
Intel Demand Based SwitchingY
Supported instruction setsAVX
System bus rate8 GT/s
Memory clock speeds supported by processor800,1066,1333,1600,1866 MHz
Tcase88 °C
Processor base frequency3 GHz
Intel® vPro™ Platform EligibilityY
Intel® Virtualization Technology (Intel® VT)VT-d, VT-x
Market segmentServer
VID Voltage Range0.65 - 1.3 V
*
*
*
Products specifications
Attribute nameAttribute value
Component forServer/workstation
ECCY
Memory channelsQuad-channel
Processor familyIntel® Xeon® E5 V2 Family
Processor modelE5-2690V2
Processor boost frequency3.6 GHz
Processor cores10
Processor threads20
Processor cache25 MB
Bus typeQPI
CPU configuration (max)2
PCI Express configurations1x4, 1x8, 1x16
PCI Express slots version3.0
Processor cache typeL3
Processor lithography22 nm
Processor operating modes32-bit, 64-bit
Processor socketLGA 2011 (Socket R)
Scalability2S
Thermal Design Power (TDP)130 W
Maximum internal memory supported by processor768 GB
Memory bandwidth supported by processor (max)59.7 GB/s
Enhanced Intel SpeedStep TechnologyY
Execute Disable BitY
Idle StatesY
Intel Trusted Execution TechnologyY
Intel Virtualization Technology (VT-x)Y
Intel Virtualization Technology for Directed I/O (VT-d)Y
Intel VT-x with Extended Page Tables (EPT)Y
Intel® AES New Instructions (Intel® AES-NI)Y
Intel® Hyper Threading Technology (Intel® HT Technology)Y
Intel® Secure KeyY
Intel® Smart CacheY
Intel® Turbo Boost Technology2.0
Number of QPI links2
Thermal Monitoring TechnologiesY
Memory types supported by processorDDR3-SDRAM
On-board graphics cardN
Intel Demand Based SwitchingY
Supported instruction setsAVX
System bus rate8 GT/s
Memory clock speeds supported by processor800,1066,1333,1600,1866 MHz
Tcase88 °C
Processor base frequency3 GHz
Intel® vPro™ Platform EligibilityY
Intel® Virtualization Technology (Intel® VT)VT-d, VT-x
Market segmentServer
VID Voltage Range0.65 - 1.3 V