loader
718055-L21 HP Intel Xeon E5-2690 v2 3.00GHz 10-Core CPU (SR1A5)

718055-L21 HP Intel Xeon E5-2690 v2 3.00GHz 10-Core CPU (SR1A5)

R13,189.35 Inc VAT

** Mobicred Installment Price per unit **


  • Shipping Weight: 0.5kg
  • Manufactured by: HP
  • Model: 718055-L21
  • Availability :In Stock
  • Units in Stock : 4
Description

HP Intel Xeon E5-2690 v2 3.0GHz 25MB Cache 10-Core Processor HPN: 718055-L21

  • Brand: HP
  • Manufacturer: Intel
  • Part #: 718055-L21

Specs:-

Product

HP Intel Xeon E5-2690v2 3.0GHz Ten-Core CPU

Number of Cores 10
Number of Threads 20
Clock Speed 3 GHz
Maximum Turbo Frequency 3.6 GHz
Intel Smart Cache 25 MB
Intel QPI Speed 8 GT/s
Number of QPI Links 2
Instruction Set 64-bit
Instruction Set Extensions Intel AVX
Lithography 22 nm
Scalability 2S only
Maximum TDP 130 W
Embedded Options Available No
VID Voltage Range 0.65 - 1.30 V

Memory

Maximum Memory Size 768 GB (depended upon the memory type)
Memory Types DDR3-800/1066/1333/1600/1866
Maximum Memory Bandwidth 59.7 GB/s
Physical Address Extensions 46-bit
ECC Memory Support Yes*

Expansion Options

PCIe Revision 3.0
PCIe Configurations x4, x8, x16*
PCIe Lanes Maximum: 40
Condition New; boxed units
Warranty 1 (one) year Tekmart warranty

Key points to note on these 718055-L21 HP Processors:-

The Intel Xeon E5-2690v2 3 GHz Processor for Z820 Workstations from HP features 10 cores and 20 threads and can be installed in a FCLGA2011 socket.

This processer comes equipped with 25MB cache. Ypu can connect a variety of peripherals to a PC equipped with this processor as it supports PCIe revision 3.0 in x16, x8, and x4 configurations. In addition, this processor includes Enhanced Intel SpeedStep Technology, Thermal Monitoring Technologies, and more.

ECC Memory Supported

ECC memory is a type of system memory that can detect and correct common kinds of internal data corruption. Note that ECC memory requires both processor and chipset support.

Intel Turbo Boost 2.0 Technology

Intel Turbo Boost Technology dynamically increases the processor's frequency as needed, by taking advantage of thermal and power headroom to give you a burst of speed when you need it, and increased energy efficiency when you don't.

Intel vPro Technology

Intel vPro Technology is a set of security and manageability capabilities built into the processor, aimed at addressing four critical areas of IT security: threat management (including protection from rootkits, viruses, and malware), identity and web site access point protection, confidential personal and business data protection, and remote and local monitoring, remediation, and repair of PCs and workstations.

Intel Hyper-Threading Technology

Intel Hyper-Threading Technology delivers two processing threads per physical core. Highly threaded applications can get more work done in parallel, completing tasks sooner.

Intel Virtualization Technology (VT-x)

Intel Virtualization Technology allows one hardware platform to function as multiple "virtual" platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions.

Intel Virtualization Technology for Directed I/O (VT-d)

Intel Virtualization Technology for Directed I/O continues from the existing support for IA-32 (VT-x) and Itanium processor (VT-i) virtualization, adding new support for I/O-device virtualization. Intel VT-d can help end users improve the security and reliability of the systems, and also improve performance of I/O devices in virtualized environments.

Intel VT-x with Extended Page Tables (EPT)

Intel VT-x with Extended Page Tables, also known as Second Level Address Translation (SLAT), provides acceleration for memory-intensive virtualized applications. Extended Page Tables in Intel Virtualization Technology platforms reduce the memory and power overhead costs, and increase battery life through hardware optimization of page table management.

Intel 64

Intel 64 architecture delivers 64-bit computing on server, workstation, desktop, and mobile platforms when combined with supporting software. Intel 64 architecture improves performance by allowing systems to address more than 4GB of both virtual and physical memory.

Idle States

Idle States (C-states) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is performing useful tasks. C1 is the first idle state, C2 the second, and so on, where more power saving actions are taken for numerically higher C-states.

Enhanced Intel SpeedStep Technology

Enhanced Intel SpeedStep Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep Technology switches both voltage and frequency in tandem between high and low levels in response to processor load.

Enhanced Intel SpeedStep Technology builds upon that architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery.

Intel Demand-Based Switching

Intel Demand-Based Switching is a power-management technology in which the applied voltage and clock speed of a microprocessor are kept at the minimum necessary levels until more processing power is required. This technology was introduced as Intel SpeedStep Technology in the server marketplace.

Thermal Monitoring Technologies

Thermal Monitoring Technologies protect the processor package and the system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core's temperature, and the thermal management features reduce package power consumption (and thereby temperature, when required) in order to remain within normal operating limits.

AES New Instructions

Advanced Encryption Standard New Instructions (AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, such as applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.

Secure Key

Intel Secure Key consists of a digital random number generator that creates truly random numbers to strengthen encryption algorithms.

Trusted Execution Technology

Intel Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel processors and chipsets that enhance the digital office platform with security capabilities, such as measured launch and protected execution.

It enables an environment where applications can run within their own space, protected from all other software on the system.

Execute Disable Bit

Execute Disable Bit is a hardware-based security feature that can reduce exposure to Genuine HPviruses and malicious-code attacks, and prevent harmful software from executing and propagating on the server or network.

Reviews (1)

by Mohammed Y.

These processors upgraded the e5-2600 v1 series CPUs we are using on our Z820 Workstations. The performance change is immediate. The hatching, crosshatching and scribbling rendering on our architectural drawings is great. Great buy!

Comments


Categories

Manufacturers

Wish List

Log In to be able to add this product to your Wish List.

View more


Cart