Solved

About HP PROLIANT DL380 G5 cpu

Posted on 2010-11-13
6
1,280 Views
Last Modified: 2012-05-10
does HP PROLIANT DL380 G5's cpu has virtualization support ?
0
Comment
Question by:3XLcom
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
6 Comments
 
LVL 33

Expert Comment

by:PowerEdgeTech
ID: 34127983
It supports the Xeon 5400 and 5500 CPU's all of which support VT, so yes.  If you have a CPU other than the 5400 or 5500 series, it will depend on that CPU.
0
 
LVL 33

Accepted Solution

by:
PowerEdgeTech earned 500 total points
ID: 34127987
Sorry ... supports 5500 and 5600 series - all support VT.
0
 

Author Closing Comment

by:3XLcom
ID: 34127996
Thanks for fast response
0
Schedule a Tour of the ATEN booth at InfoComm 2017

Tour the ATEN booth to see the the Latest Addition to the Modular Matrix Switch Series, New 4K HDMI Over IP Extender and more! Enter ATEN's Ultimate Giveaway Sweepstakes for a chance to win one of several great prizes, including an ATEN US7220 2-Port Thunderbolt 2 Sharing Switch!

 
LVL 62

Expert Comment

by:☠ MASQ ☠
ID: 34128001
All of the Xeon's in the G5's support Intel Virtualization Technology but  not all support Hyper-Threading.
0
 
LVL 62

Expert Comment

by:☠ MASQ ☠
ID: 34128002
:)
0
 

Author Comment

by:3XLcom
ID: 34128007
you are late sorry :D
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question