Orders placed after 4PM on weekdays will not ship until the next business day. Orders placed after 12pm Fridays will not ship until the following Monday.
Faster shipping methods may be available; just upgrade during checkout.
*Some exclusions apply.
Enter new zip code to refresh estimated delivery time.
The Xeon E5-1650 v3 3.5 GHz Processor from Intel is the third generation of the Xeon product line that is now built using Haswell architecture. As with many Haswell technologies, this processor comes with similar features such as Intel Turbo Boost 2.0 and Hyper-Threading. With Intel Turbo Boost Technology 2.0, the maximum clock rate this processor can achieve is 3.8 GHz. However, unlike most desktop Haswell products this Xeon processor offers greater performance. It features 6 cores with 12 threads in a FCLGA2011 socket and has 15MB of level 3 cache. Having 6 cores allows the processor to run multiple programs at the same time without slowing down the system. This makes it well suited for use in servers and workstation systems working in different applications and environments such as data centers or cloud-based services. When compared to previous generations of Xeon processors, this Xeon processor provides AVX 2.0 extensions, which doubles the instruction set to 256-bits and delivers up to 1.9x performance gains. In addition, this Xeon processor supports DDR4 memory for improving the performance of memory intensive workloads and energy efficiency to enterprise systems.
ECC Memory Supported*
Error-Correcting Code memory is a type of system memory that can detect and correct common kinds of internal data corruption.
Intel Turbo Boost 2.0 Technology*
Intel Turbo Boost Technology increases the processor's frequency as needed, by taking advantage of thermal and power headroom to give you a burst of speed when you need it, and increased energy efficiency when you don't.
Intel vPro Technology
Intel vPro Technology is a set of security and manageability capabilities built into the processor, aimed at addressing four critical areas of IT security:threat management (including protection from rootkits, viruses, and malware), Identity and web site access point protection, Confidential personal and business data protection, and remote and local monitoring, remediation, and repair of PCs and workstations.
Intel Hyper-Threading Technology*
Intel Hyper-Threading Technology delivers two processing threads per physical core. Highly threaded applications can get more work done in parallel, completing tasks sooner.
Intel Virtualization Technology (VT-x)*
Intel Virtualization Technology allows one hardware platform to function as multiple "virtual" platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions.
Intel Virtualization Technology for Directed I/O (VT-d)*
Intel Virtualization Technology for Directed I/O continues from the existing support for IA-32 (VT-x) and Itanium processor (VT-i) virtualization, adding new support for I/O-device virtualization. Intel VT-d can help end users improve the security and reliability of systems, and also improve performance of I/O devices in virtualized environments.
Intel VT-x with Extended Page Tables (EPT)*
Intel VT-x with Extended Page Tables, also known as Second Level Address Translation (SLAT), provides acceleration for memory-intensive virtualized applications. Extended Page Tables in Intel Virtualization Technology platforms reduce the memory and power overhead costs, and increase battery life through hardware optimization of page table management.
Intel 64 architecture delivers 64-bit computing on server, workstation, desktop, and mobile platforms when combined with supporting software. Intel 64 architecture improves performance by allowing systems to address more than 4GB of both virtual and physical memory.
Idle States (C-states) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is doing useful work. C1 is the first idle state, C2 the second, and so on, where more power saving actions are taken for numerically higher C-states.
Enhanced Intel SpeedStep Technology
Enhanced Intel SpeedStep Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep Technology switches both voltage and frequency in tandem between high and low levels in response to processor load. Enhanced Intel SpeedStep Technology builds upon that architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery.
Intel Demand-Based Switching
Intel Demand-Based Switching is a power-management technology in which the applied voltage and clock speed of a microprocessor are kept at the minimum necessary levels until more processing power is required. This technology was introduced as Intel SpeedStep Technology in the server marketplace.
Thermal Monitoring Technologies
Thermal Monitoring Technologies protect the processor package and the system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core's temperature, and the thermal management features reduce package power consumption and thereby temperature, when required in order to remain within normal operating limits.
Intel Identity Protection Technology
Intel Identity Protection Technology is a built-in security token technology that helps provide a simple, tamper-resistant method for protecting access to your online customer and business data from threats and fraud. Intel IPT provides a hardware-based proof of a unique user's PC to websites, financial institutions, and network services; providing verification that it is not malware attempting to login. Intel IPT can be a key component in two-factor authentication solutions to protect your information at websites and business log-ins.
AES New Instructions
Advanced Encryption Standard New Instructions (AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, such as applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.
Intel Secure Key consists of a digital random number generator that creates truly random numbers to strengthen encryption algorithms.
OS Guard improves security by strengthening malware protection, and provides hardware-based protection for your server operating system.
Trusted Execution Technology*
Intel Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel processors and chipsets that enhance the digital office platform with security capabilities, such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system.
Execute Disable Bit*
Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks, and prevent harmful software from executing and propagating on the server or network.
Note:*These features may not be available on all computing systems.