MPN CD8067303562100
Preces Nr. W126171564
EAN / UPC 8592978099862
Krājumi
Intel® AES New Instructions (Intel® AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.
Intel® Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel® processors and chipsets that enhance the digital...
G077159
No
Yes
5A992C
Server
48
3.0
3.0
2S
SSE4.2, AVX, AVX 2.0, AVX-512
No
8542310001
Yes
768 GB
Hexa-channel
2400
DDR4-SDRAM
76 °C
786432 MB
768 GB
0,4 kg
No
UPI
Server/workstation
No
123551
2,6 GHz
3 GHz
8,25 MB
L3
SR3GN
Skylake
4
Intel Xeon Silver
1st Generation Intel® Xeon® Scalable
14 nm
Intel
4112
64-bit
LGA 3647 (Socket P)
8
U0
85 Watt
1
Yes
Yes
Yes
Yes
Yes
1.00
No
Yes
Yes
Yes
Yes
Yes
No
Yes
Yes
2.0
Yes
Yes
0,3 kg
1.00
1.00
63903513
Q3'17
768 GB
2400 MHz
1.00
2
Intel Xeon Silver Intel Xeon Silver Processor
8448 KB
Intel Xeon Processors
Processor
Launched
DDR4-SDRAM
1 Gads (-i)
76mm x 56.5mm mm
Intel® AES New Instructions (Intel® AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.
Intel® Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel® processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system.
Intel® vPro™ Technology is a set of security and manageability capabilities built into the processor aimed at addressing four critical areas of IT security: 1) Threat management, including protection from rootkits, viruses, and malware 2) Identity and web site access point protection 3) Confidential personal and business data protection 4) Remote and local monitoring, remediation, and repair of PCs and workstations.
*Iepriekš minētos datus par produktu sniedz Icecat. EET nevar būt atbildīgs par kļūdām saistībā ar to.