Computers > Components > CPUs / Processors
Not currently available
NEC Intel Xeon E5-2650 2GHz 20MB L3 processor
Share your images
NEC Intel Xeon E5-2650 2GHz 20MB L3 processor
(sign in to rate)
We have no sources for this product at present.
If you add this to your wishlist we will let you know should it become available to order.
Intel® Turbo Boost Technology dynamically increases the processor's
frequency as needed by taking advantage of thermal and power
headroom to give you a burst of speed when you need it, and
increased energy efficiency when you don’t.
Intel® vPro™ Technology is a set of security and manageability
capabilities built into the processor aimed at addressing four
critical areas of IT security: 1) Threat management, including
protection from rootkits, viruses, and malware 2) Identity and web
site access point protection 3) Confidential personal and business
data protection 4) Remote and local monitoring, remediation, and
repair of PCs and workstations.
Intel® Hyper-Threading Technology (Intel® HT Technology) delivers
two processing threads per physical core. Highly threaded
applications can get more work done in parallel, completing tasks
Intel® Virtualization Technology (VT-x) allows one hardware
platform to function as multiple “virtual” platforms. It offers
improved manageability by limiting downtime and maintaining
productivity by isolating computing activities into separate
Intel® Virtualization Technology for Directed I/O (VT-d) continues
from the existing support for IA-32 (VT-x) and Itanium® processor
(VT-i) virtualization adding new support for I/O-device
virtualization. Intel VT-d can help end users improve security and
reliability of the systems and also improve performance of I/O
devices in virtualized environments.
Intel® Trusted Execution Technology for safer computing is a
versatile set of hardware extensions to Intel® processors and
chipsets that enhance the digital office platform with security
capabilities such as measured launch and protected execution. It
enables an environment where applications can run within their own
space, protected from all other software on the system.
Advanced Encryption Standard New Instructions (AES-NI) are a set of
instructions that enable fast and secure data encryption and
decryption. AES-NI are valuable for a wide range of cryptographic
applications, for example: applications that perform bulk
encryption/decryption, anthentication, random number generation,
and authenticated encryption.
Intel® 64 architecture delivers 64-bit computing on server,
workstation, desktop and mobile platforms when combined with
supporting software. Intel 64 architecture improves performance by
allowing systems to address more than 4 GB of both virtual and
Idle States (C-states) are used to save power when the processor is
idle. C0 is the operational state, meaning that the CPU is doing
useful work. C1 is the first idle state, C2 the second, and so on,
where more power saving actions are taken for numerically higher
Enhanced Intel SpeedStep® Technology is an advanced means of
enabling high performance while meeting the power-conservation
needs of mobile systems. Conventional Intel SpeedStep® Technology
switches both voltage and frequency in tandem between high and low
levels in response to processor load. Enhanced Intel SpeedStep®
Technology builds upon that architecture using design strategies
such as Separation between Voltage and Frequency Changes, and Clock
Partitioning and Recovery.
Intel® Demand Based Switching is a power-management technology in
which the applied voltage and clock speed of a microprocessor are
kept at the minimum necessary levels until more processing power is
required. This technology was introduced as Intel SpeedStep®
Technology in the server marketplace.
Thermal Monitoring Technologies protect the processor package and
the system from thermal failure through several thermal management
features. An on-die Digital Thermal Sensor (DTS) detects the core's
temperature, and the thermal management features reduce package
power consumption and thereby temperature when required in order to
remain within normal operating limits.
Intel® Flex Memory Access facilitates easier upgrades by allowing
different memory sizes to be populated and remain in dual-channel
Execute Disable Bit is a hardware-based security feature that can
reduce exposure to viruses and malicious-code attacks and prevent
harmful software from executing and propagating on the server or
Intel® VT-x with Extended Page Tables (EPT), also known as Second
Level Address Translation (SLAT), provides acceleration for memory
intensive virtualized applications. Extended Page Tables in Intel®
Virtualization Technology platforms reduces the memory and power
overhead costs and increases battery life through hardware
optimization of page table management.
CPUs / Processors
Intel® Xeon® E5 Family
LGA 2011 (Socket R)
|Base Clock Speed:
|ECC Supported By Processor:
|Integrated Memory Controller Speed:
|Max Turbo Speed:
|Maximum Internal Memory Supported By Processor:
|Memory Channels Supported By Processor:
|Memory Types Supported By Processor:
|Number of Threads:
|Processor Cache Type:
|Processor Operating Modes:
|Intel Virtualization Technology (VT-X):
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!