Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Data Centers

Gallery: Intel Xeon 5600 – your next server upgrade?

By Andy Smith March 15, 2010, 6:36 AM PDT

Image
1
of 5

Gallery: Intel Xeon 5600 – your next server upgrade?

Intel says its new Intel Xeon processor 5600 series is the company’s most secure datacenter processor ever. It delivers two new security features, Intel Advanced Encryption Standard New Instructions, and Intelu00ae Trusted Execution Technology, that enable faster encryption and decryption performance for more secure transactions and virtualized environments. For more on the Xeon 5600 chips, read Larry Dignan’s blog

Credit: Intel

Gallery: Intel Xeon 5600 – your next server upgrade?

Boyd Davis, director of marketing of Intel’s Data Canter Group, holds up an Intel Xeon 5600 processor.

Credit: Intel

Gallery: Intel Xeon 5600 – your next server upgrade?

Intelu00ae Xeon processor 5600 series die is 248 mm2 with 1.17 billion transistors.

Credit: Intel

Gallery: Intel Xeon 5600 – your next server upgrade?

Color photograph of a portion of a Intel Xeon processor 5600 series wafer.

Credit: Intel

Gallery: Intel Xeon 5600 – your next server upgrade?

A portion of a Intelu00ae Xeon processor 5600 series wafer.

Credit: Intel

  • Data Centers
  • Account Information

    Share with Your Friends

    Gallery: Intel Xeon 5600 – your next server upgrade?

    Your email has been sent

Share: Gallery: Intel Xeon 5600 - your next server upgrade?
Image of Andy Smith
By Andy Smith
  • Account Information

    Contact Andy Smith

    Your message has been sent

  • |
  • See all of Andy's content

TechRepublic Premium

  • TechRepublic Premium

    Office relocation checklist

    PURPOSE New office launches and site relocations run the range from straightforward to overly complex. For intricate, sophisticated new office deployments and larger site moves, TechRepublic Premium’s Office relocation checklist can help plan, monitor and execute such projects. From the checklist: LIST REQUIRED OF EQUIPMENT AND SERVICES Begin by creating a simple list of required ...

    Downloads
    Published:  May 25, 2023, 4:00 PM EDT Modified:  May 26, 2023, 11:17 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Onboarding and offboarding IT staff checklist

    PURPOSE Onboarding and offboarding employees requires careful attention. Otherwise, team members may receive insufficient permissions to perform their jobs or continue to have access long after their employment’s termination. Given the stakes, the problem is even worse when managing IT staff permissions, so it’s imperative that your company adopts a system to ensure consistency. Employees, ...

    Downloads
    Published:  May 24, 2023, 4:00 PM EDT Modified:  May 25, 2023, 9:19 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    10 must-know Firefox tips

    PURPOSE TechRepublic Premium presents 10 tips for the Firefox open-source browser. Even if you only follow some of these, you’ll find your browser experience to be much improved. From the article: 1. USE CAUTION WITH ADD-ONS AND THEMES This is one of the first tips I always offer. I’ve seen web browsers with so many ...

    Downloads
    Published:  May 23, 2023, 4:00 PM EDT Modified:  May 24, 2023, 6:46 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Bring your own device policy

    PURPOSE The purpose of this Bring your own device policy from TechRepublic Premium is to provide requirements for BYOD usage and establish the steps that both users and the IT department should follow to initialize, support and remove devices from company access. These requirements must be followed as documented in order to protect company systems ...

    Downloads
    Published:  May 22, 2023, 4:00 PM EDT Modified:  May 23, 2023, 7:26 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice