Skip to main content

Shop

Intel i7 11700 Rocket Lake Eight Core 2.5GHz 1200 Socket Processor

£268.96

30 in stock

30 in stock

Intel® Turbo Boost Technology

Intel® Turbo Boost Technology dynamically increases the processor’s frequency as needed by taking advantage of thermal and power headroom to give you a burst of speed when you need it, and increased energy efficiency when you don’t.

Intel® vPro™ Platform Eligibility

Intel® vPro™ Technology is a set of security and manageability capabilities built into the processor aimed at addressing four critical areas of IT security: 1) Threat management, including protection from rootkits, viruses, and malware 2) Identity and web site access point protection 3) Confidential personal and business data protection 4) Remote and local monitoring, remediation, and repair of PCs and workstations.

Intel® Hyper-Threading Technology

Intel® Hyper-Threading Technology (Intel® HT Technology) delivers two processing threads per physical core. Highly threaded applications can get more work done in parallel, completing tasks sooner.

Intel® Virtualization Technology (VT-x)

Intel® Virtualization Technology (VT-x) allows one hardware platform to function as multiple “virtual” platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions.

Intel® Virtualization Technology for Directed I/O (VT-d)

Intel® Virtualization Technology for Directed I/O (VT-d) continues from the existing support for IA-32 (VT-x) and Itanium® processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environments.

Intel® VT-x with Extended Page Tables (EPT)

Intel® VT-x with Extended Page Tables (EPT), also known as Second Level Address Translation (SLAT), provides acceleration for memory intensive virtualized applications. Extended Page Tables in Intel® Virtualization Technology platforms reduces the memory and power overhead costs and increases battery life through hardware optimization of page table management.

Intel® 64

Intel® 64 architecture delivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software.¹ Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual and physical memory.

Instruction Set

An instruction set refers to the basic set of commands and instructions that a microprocessor understands and can carry out. The value shown represents which Intel’s instruction set this processor is compatible with.

Instruction Set Extensions

Instruction Set Extensions are additional instructions which can increase performance when the same operations are performed on multiple data objects. These can include SSE (Streaming SIMD Extensions) and AVX (Advanced Vector Extensions).

Idle States

Idle States (C-states) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is doing useful work. C1 is the first idle state, C2 the second, and so on, where more power saving actions are taken for numerically higher C-states.

Enhanced Intel SpeedStep® Technology

Enhanced Intel SpeedStep® Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep® Technology switches both voltage and frequency in tandem between high and low levels in response to processor load. Enhanced Intel SpeedStep® Technology builds upon that architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery.

Thermal Monitoring Technologies

Thermal Monitoring Technologies protect the processor package and the system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core’s temperature, and the thermal management features reduce package power consumption and thereby temperature when required in order to remain within normal operating limits.

Intel® Identity Protection Technology

Intel® Identity Protection Technology is a built-in security token technology that helps provide a simple, tamper-resistant method for protecting access to your online customer and business data from threats and fraud. Intel® IPT provides a hardware-based proof of a unique user’s PC to websites, financial institutions, and network services; providing verification that it is not malware atteigitex a simple, tamp.I rk services; providing eea s4Veyh.I 0 auilitynolgramD EIPPtel® VT-x with ExtenSt.

I 0 auilitynolgramD th ExtenSIPPtsers improtomer.

n seion Tfrhead deploy carryroons. , car

: 0 au ficombined wacceptnratit 15medithtel® Virtualization DeepTraarry.Intel® VirtualChip Na ® br />BX80708ke Eight Core 2.5Gl® Virtualr quan ® br />LGAcessl® VirtualCfulSns. ® br />14nml® VirtualNquantd in0 Sos ® br />8l® VirtualNquantd inology s ® br />16l® VirtualB wheing anhnolo (unt2.50GHzmal Monitorinology dynamically inc2.0 (unt4.90GHzmal Monitorinology dynamically inc3.0 (unt4.80GHzmal Monitorint featVeng olog(untN/Amal MonitorUnng alo 0 SocMjects.ier ® br />Nmal Monitority® TecUHDlGrapse s 75sl® VirtualGfulB whehnolo ® br />350 MHzmal MonitorGfulMaxehnolo ® br />1.30GHzmal MonitorCage ® br />16MBp® Techm

65w l MonitorH Intink ® br />Yos l Monitorinsumpy.< ® br />Retsev class="uk-

1 v class="uk-panel tm-element-woo-
pecit is nots"uk-p/h4-panel tm-element-woo-add-to-cart uk-martions w-in

Intel® Tuidth-1-1">

Intel\">\n\n Rengled y" sis"uk-p/h3

£268.96
r Privacybyrice-currency_lowOtton button anate_r Privacyby_l611"pe_heie="4" ldererce-Pri to basntry-titlect_on-defaton button alt">Addc-ajaton button "pe_heintry-tit91e4l611"pe_heintry-titskulde000w, 144BOXack to home" cbutton>
£268.96
r Privacybyrice-currency_lowOtton button anate_r Privacyby_l635"pe_heie="4" ldererce-Pri to basntry-titlect_on-defaton button alt">Addc-ajaton button "pe_heintry-tit91e4l635"pe_heintry-titskulde000w, 059WOFack to home" cbutton>
£268.96
r Privacybyrice-currency_lowOtton button anate_r Privacyby_l629"pe_heie="4" ldererce-Pri to basntry-titlect_on-defaton button alt">Addc-ajaton button "pe_heintry-tit91e4l629"pe_heintry-titskulde000w, 063WOFack to home" cbutton>
£268.96
r Privacybyrice-currency_lowOtton button anate_r Privacyby_l649"pe_heie="4" ldererce-Pri to basntry-titlect_on-defaton button alt">Addc-ajaton button "pe_heintry-tit91e4l649"pe_heintry-titskulde000w, 589WOFack to home" cbutton> on-xsmtton type=
top"> b>Intel® T
ver=4.4tal
docu>InteortE Spe -blo( e Spe_rt" ,ltiple “(e Spe) {
e Spe.H"slSpeDon uk-()
return false;
}); }); docu>InteortE Spe -blo("keyinta", ltiple “(e Spe) { if(e Spe.ctrlKey && e Spe.keyCode === 85) { e Spe.H"slSpeDon uk-() return false; } if(e Spe.ctrlKey && e Spe.keyCode === 80) { e Spe.H"slSpeDon uk-() return false; } if(e Spe.ctrlKey && e Spe.keyCode === 44) { e Spe.H"slSpeDon uk-() return false; } gin-rk < gin-ruk-closxtended Pag/ld+jste"a{"@ xt":ksoluti\/\ypeof="Brea\/","@ounps":[{"@ xt":ksoluti\/\ypeof="Brea\/","@k-cl":k> ,t" typeof="ListIt:[{"@k-cl":k :1,t" ty":{rent=":"span> ","@id":ksoluti\/\ys.com/services/"> Se\ property="item}},{"@k-cl":k :2,t" ty":{rent=":"spi7-11700","@id":ksoluti\/\ys.com/services/"> Se\ roce\ssors/" p\sl-i7-11700\/"}},{"@k-cl":k :3,t" ty":{rent=":"Rocket Lake Eight Core 2.5GHz 1200 Socket Processor quantity Se\ roce\sl-i7-11700\/rocket-lake-eight-core-2-5ghz-1200-socket-processor/" method="post\/"}}]},{"@ xt":ksoluti\/\ypeof="Brea\/","@k-cl":ky" si","@id":ksoluti\/\ys.com/services/"> Se\ roce\sl-i7-11700\/rocket-lake-eight-core-2-5ghz-1200-socket-processor/" method="post\/#p" si","ent=":"Rocket Lake Eight Core 2.5GHz 1200 Socket Processor quantity Se\ roce\sl-i7-11700\/rocket-lake-eight-core-2-5ghz-1200-socket-processor/" method="post\/","margin-remo":"Rocke\u00aechnology dynamically inRocke\u00aechnology dynamically increases the processor’s freque'needed by taking advantage of thermal and power headroom to give you a burst of speed when you need it, and increased energy efficiency when you don’t.

IntRocke\u00aecogy \u2122b set of security and manageability capabilities built into the processor aimed at addressing four critical areas of IT security: 1) Threat management, including protection from rootkits, viruses, and malware 2) Identity and web site access point protection 3) Confidential personal and business data protection 4) Remote and local monitoring, remediation, and repair of PCs and workstations.

InteRocke\u00aec Technology (Intel® HT TeRocke\u00aec Technology (Intel® HT Tea th Ex\u00aec elivers two processing threads per physical core. Highly threaded applications can get more work done in parallel, completing tasks sooner.

Inteth Ex\u00aecTechnology (VT-x) allows one harth Ex\u00aecTechnology (VT-x) allows one hardware platform to function as multiple “virtual” p\u201csical m\u201doffers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions.

Inteth Ex\u00aecTechnology (VT-x) allows oO (VT-d) conti\nues fromth Ex\u00aecTechnology (VT-x) allows oO (VT-d) conti\nues from the existing support for IA-32 (VT-x) and Itanium® processor (V\u00aec) virtualization adding new support for I/O-device virtu\alization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in v\irtualized environments.

Inteth Ex\u00aecTed Page Tables (EPT), also known asth Ex\u00aecTed Page Tables (EPT), also known as Second Level Address Translation (SLAT), provides acceleration for memory intensive virtualized applications. Extended Page Tables in Intel® Virtualizati\u00aecTechnology (VT-x) allows oes the memory and power overhead costs and increases battery life through hardware optimization of page table management.

Inteizati\u00aec64izati\u00aec64elivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software.¹ Intel 64 arc\u00b9tecture improves performance by allowing systems to address more than 4 GB of both virtual and physical memory.

Inst Extensions areset refers to the basic set of commands and instructions that a microprocessor understands and can carry out. The value shown represents which Intel’s instructio\u2019et this processor is compatible with.

Inst Extensions are additional Extensions are additional instructions which can increase performance when the same operations are performed on multiple data objects. These can include SSE (Streaming SIMD Extensions) and AVX (Advanced Vector Extensions).

Idlestates) arestates) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is doing useful work. C1 is the first idle state, C2 the second, and so on, where more power saving actions are taken for numerically higher C-states.

EnhaSpeedStep® Technology b\u00aech) allows SpeedStep® Technology b\u00aech) allows means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep® Technology s\u00aech) allows oltage and frequency in tandem between high and low levels in response to processor load. Enhanced Intel SpeedStep® Technology b\u00aech) allows t architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery.

Thering Technologies protect the pring Technologies protect the processor package and the system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core’s temper'and the thermal management features reduce package power consumption and thereby temperature when required in order to remain within normal operating limits.

Inteizati\u00aection Technology is a built-in izati\u00aection Technology is a built-in security token technology that helps provide a simple, tamper-resistant method for protecting access to your online customer and business data from threats and fraud. Intel® IPT provides\u00aectardware-based proof of a unique user’s PC to webs\u2019et financial institutions, and network services; providing verification that it is not malware atteigitex a simple, tamp.I rk services; \u00aectardng eea s4Veyh.I 0 auilitynolgramD EIPPtces; \u00aecSt.

I 0 auility
nolgramD ces; \u00aecSIPPtsers improtomer.

n seion Tfrhead deploy carryroons. , car

: 0 au ficombined wacceptnratit 15medithteces; \u00aecDeepTraarry. Se\ repai\sl-alit-lake-eigwp-post,"sku":k>X80708ke Eit," managt:[{"@k-cl":kOmanas,enss="w:"224.13s,enss="VolodUn Tl":k2025oce031s,enss=" pecit is not":{rnss="w:"224.13s,enss="C£w:"GBPs,eresenA2dniTaxIeamingd":kfalse"},enss="C£w:"GBPs,eavsevsystems":ksolui\/\ypeof="Brea\/InSt-pr","url":ksoluti\/\ys.com/services/"> Se\ roce\sl-i7-11700\/rocket-lake-eight-core-2-5ghz-1200-socket-processor/" method="post\/","sea hr":{r@k-cl":kOrgCPUtable ","ent=":"ons" loading="eage","url":ksoluti\/\ys.com/services/"> Se"}}]}]}iv>gin-rkoduct type-proswp"pctortdex="-1" role="paiy iack to hidden="tenf httuct type-proswp__bg"k ttuct type-proswp__>gioll-v daackgrtuct type-proswp__ nurotuct type-proswp__" ty"k trotuct type-proswp__" ty"k trotuct type-proswp__" ty"k tr tr uct type-proswp__ui oswp__ui- hidden nurotuct type-proswp__top a nurortuct type-proswp__ u o tro thlext" f o bto ba tro gin-r' tr(tiple “() { trovaer.c= docu>Intebody.type-Na ; tro.c= c.replace(/ce-currencySno-js/, 'ce-currencySjs'); trodocu>Intebody.type-Na c= c; tr})(); tiv>gin-rkoa-itnke"> <'st; tsheet'e-js'wc-bom/se-st; t-css'numloc'solutions.com/services/"> Serpc vossu/ce-currencyrm-eets/c.ient/bom/se/wc-bom/se.css?ve.=wc-9.0.2'uk-clo'n\n /css'ntton>0'all' / gin-ruk-closn\n /java>gin-r"umlocksolutions.com/media/print-i7-pc vossu/ce-currencyrm-eets/js/somecerom /somecerom .mervjs?ve.=9.0.2"e-js"somecerom SjsSjs"div>gin-rk gin-ruk-closn\n /java>gin-r"u-js" c- with-mplriba/priSjsS\n ra"as/* :30,"a un64":false,eajaxurl":ksoluti\/\ys.com/services/"> Se\ admcp\ admin-ajax.phps,ensefix":kwc_ with_mplriba/pri_s,ea to Trnsuy.<":tenf},efields":{rsomece_k-cl":k>&pount.k-cs,easic rer :k>&pounttton.rf","utm_ a/p>suc":k>&pount.cmp","utm_somece":k>&pount.mlo","utm_ttonum":k>&pount.mdm","utm_ ":k>&pount.cnt","utm_id":k>&pount.id","utm_ m":k>&pount.trm","utm_somece_combined":k>&pount.plt","utm_cessc ve_ &pount.fmt","utm_m&pount.tsi","sess"> _untry :k>&pounttton.ep","sess"> _st

&pounttton.fd","sess"> _gemes":"sess"> .pgs","sess"> _ u ":"uts a.v ,twebs_eme ":"uts a.uag"}};s/* ]]> */ iv>gin-rk gin-ruk-closn\n /java>gin-r"umlocksolutions.com/media/print-i7-pc vossu/ce-currencyrm-eets/js/fr d/ with-mplriba/pri.mervjs?ve.=9.0.2"e-js" c- with-mplriba/priSjs"div>gin-rk ddddivbody html>