Lenovo Xeon E5-2430 2.2GHz 15MB L3 processor
Today's Intel® Hyper-Threading Technology (Intel® HT Technology) delivers thread-level parallelism on each processor resulting in more efficient use of processor resources-higher processing throughput-and improved performance on the multi-threaded software of today and tomorrow.
Intel® Virtualization Technology (VT-x)
Increasing manageability, security, and flexibility in IT environments, virtualization technologies like hardware-assisted Intel® Virtualization Technology (Intel® VT) combined with software-based virtualization solutions provide maximum system utilization by consolidating multiple environments into a single server or PC. By abstracting the software away from the underlying hardware, a world of new usage models opens up that reduce costs, increase management efficiency, strengthen security, while making your computing infrastructure more resilient in the event of a disaster.
Intel® Virtualization Technology for Directed I/O (VT-d)
Intel® Virtualization Technology for Directed I/O (VT-d) extends Intel's Virtualization Technology (VT) roadmap by providing hardware assists for virtualization solution. VT-d continues from the existing support for IA-32 (VT-x) and Itanium® processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environment. These inherently helps IT managers reduce the overall total cost of ownership by reducing potential down time and increasing productive throughput by better utilization of the data center resources.
Intel® Trusted Execution Technology
Intel® Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel® processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. Intel Trusted Execution Technology provides hardware-based mechanisms that help protect against software-based attacks and protects the confidentiality and integrity of data stored or created on the client PC. It does this by enabling an environment where applications can run within their own space, protected from all other software on the system. These capabilities provide the protection mechanisms, rooted in hardware, that are necessary to provide trust in the application's execution environment. In turn, this can help to protect vital data and processes from being compromised by malicious software running on the platform.
Intel® 64 architecture delivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software. Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual and physical memory.
Enhanced Intel SpeedStep® Technology
Enhanced Intel SpeedStep® Technology is an advanced means of enabling very high performance while also meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep Technology switches both voltage and frequency in tandem between high and low levels in response to processor load.
Intel® Demand Based Switching
DBS is a power-management technology developed by Intel, in which the applied voltage and clock speed of a microprocessor are kept at the minimum necessary levels for optimal performance of required operations. A microprocessor equipped with DBS operates at a reduced voltage and clock speed until more processing power is required. This is achieved by monitoring the processor's use by application-level workloads, reducing the CPU speed when it is running idle while increasing it as the load increases. This technology was introduced as Intel SpeedStep® Technology in the server marketplace.
Intel® Flex Memory Access
Facilitates easier upgrades by allowing different memory sizes to be populated and remain in dual-channel mode.
Execute Disable Bit
Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks and prevent harmful software from executing and propagating on the server or network. Help protect your customers' business assets and reduce the need for costly virus-related repairs by building systems with built-in Intel Execute Disable Bit.
|Manufacturer Part Number||90Y5288|
We use a variety of courier companies to ensure we get your parcels to you in the most efficient and environmentally friendly way possible.
Once we have prepared your order for despatch, you will receive an email including your tracking number and link to track delivery.
Prices include VAT. Orders must be placed and funds cleared by 3:30pm.
Orders placed after 3:00pm, on a weekend or bank holiday will be processed on the next business day.
Our Carriers require a signature on delivery; please ensure someone will be available to sign. Alternatively they may leave a card with details of how to rearrange delivery or a request for collection from their depot. Any carrier charges for redelivery will be passed on to the purchaser. Refused deliveries will be charged the return delivery fee to our warehouse.
If the package does not appear to be in good condition then please refuse the delivery. If you are unable to check the contents of your delivery at the point of delivery then please sign for the parcel as "UNCHECKED" and report any damage to us with 48 hours. Failure to do so may affect any warranty claims that you make thereafter.
*Subject to stock location and availability. Customers must hold a pre-approved ‘same day’ registered account.
New sealed/unopened box with full manufacturers’ warranty. All accessories and documentation present.
Full manufacturer's warranty. Only essential accessories included. Bulk products are as new but have been re-boxed to cut down on packaging and shipping costs. Ideal when purchasing in quantities, less waste and less time un-boxing.
New Open Box
New and unused product. The product may be missing its original packaging, or the original packaging has been opened or is no longer sealed. Limited 1-year warranty unless specified otherwise. Maybe missing documentation.
New parts intended as field replacements. Will not usually come with any documentation or accessories but can be much cheaper than buying new retail products. Recommended when replacing like-for-like.
Re-manufactured by Hewlett Packard Enterprise. Offer the same reliability and performance, but at least 15% cheaper than buying new. Covered by the full same-as-new HPE warranty starting from the date of purchase – the same warranty offered with new HPE products.
Professionally cleaned, refurbished and soak tested by our certified in house experts. Disk drives are securely erased to US DoD 5220.22-M standards. Firmware is updated to the latest where applicable. We provide a 3 month warranty on refurbished servers and 90 days warranty on all other components.
These products are untested, obscure and require specific equipment to test. Sold as is, but we do offer a 30 day DOA warranty. See the product overview for item specifics.