S26361-F4051-L114 - Fujitsu 2.20GHz 9.60GT/s UPI 13.75MB L3 Cache Socket LGA3647 Intel Xeon Silver 4114 10-Core Processor
Availabilty: In stock
Refurbished
4059595365779
Seeking a large quantity of S26361-F4051-L114, or have a target price in mind? Contact us at (855) 483-7810 or simply Request a Bulk Quote. Our sales team will promptly respond with a discounted price tailored to your needs.
PAYMENT
Fujitsu Xeon Silver 4114 processor 2.2 GHz 13.75 MB L3
Xeon Silver 4114 Processor (13.75M Cache, 2.20 GHz)
- Intel® Xeon® 4114 2.2 GHz
- 13.75 MB L3 LGA 3647 (Socket P)
- Processor cores: 10 14 nm 64-bit 85 W
- Maximum internal memory supported by processor: 768 GB DDR4-SDRAM
About Fujitsu Xeon Silver 4114, Intel® Xeon®, LGA 3647 (Socket P), 14 nm, 2.2 GHz, 64-bit, 1st Generation Intel® Xeon® Scalable
Fujitsu Xeon Silver 4114. Processor family: Intel® Xeon®, Processor socket: LGA 3647 (Socket P), Processor lithography: 14 nm. Memory channels: Hexa-channel, Maximum internal memory supported by processor: 768 GB, Memory types supported by processor: DDR4-SDRAM. Market segment: Server, Supported instruction sets: AVX, AVX 2.0, AVX-512, SSE4.2, Scalability: 2S. Processor package size: 76 x 56.5 mm
Intel® AES New Instructions (Intel® AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.Intel® Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel® processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system.
Intel® vPro™ Technology is a set of security and manageability capabilities built into the processor aimed at addressing four critical areas of IT security: 1) Threat management, including protection from rootkits, viruses, and malware 2) Identity and web site access point protection 3) Confidential personal and business data protection 4) Remote and local monitoring, remediation, and repair of PCs and workstations.
Quote
Contact

















