Boston Value Series 380 G8 review
Boston delivers Supermicro’s first Xeon E5-2600 rack server with a keen focus on high performance network storage applications. It’s good value and in this review, Dave Mitchell takes a closer look at the features on offer.
In this review, we bring you a very early look at one of its first storage servers equipped with these new modules.
Supplied to us by Boston Ltd, the Value Series 380 G8 is an all-Supermicro package that aims to combine the power of the new Xeon E5 processors with plenty of memory and a high storage capacity.
It doesn't need much imagination to work out which HP server Boston is aiming this system at, but it will be a while before we can compare it to the eighth generation ProLiant DL380 HP told us it doesn't expect this model to be available until April, at the earliest.
Built around a Supermicro X9DRi-LN4F+ motherboard, the VS 380 G8 supports all Xeon E5-2600 server processors and the price includes a tasty pair of 2.6GHz E5-2670 Xeons that are in the upper levels of the main eight-core group of Xeon E5 processors. They have 20MB L3 cache, run at the maximum QPI speed of 8GT/sec, and support both Hyper-Threading and the new Turbo Boost 2.0.
The 8-core E5-2670 Xeons are kept cool with large passive heatsinks and three hot-swap fans in front.
Turbo Boost 2.0. allows processor cores to be speeded up briefly beyond their TDP rating. During idle periods, the system accumulates a thermal budget and in times of increased activity this is used to boost core performance for up to 25 seconds.
The Value Series 380 G8 can be packed to the gills with memory, as the motherboard has 24 DIMM sockets and supports up to 768GB as long as both CPU sockets are populated.
The system reviewed came with 32GB of memory spread across eight 4GB DIMMs and Boston also offers a choice of standard 1.5V and low-voltage 1.35V DIMMs.
In This Article
The essential guide to cloud-based backup and disaster recovery
Support business continuity by building a holistic emergency planDownload now
Trends in modern data protection
A comprehensive view of the data protection landscapeDownload now
How do vulnerabilities get into software?
90% of security incidents result from exploits against defects in softwareDownload now
Delivering the future of work - now
The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.Download now