Orders placed after 4PM on weekdays will not ship until the next business day. Orders placed after 11AM Fridays will not ship until the following Monday.
Faster shipping methods may be available; just upgrade during checkout.
*Some exclusions apply.
Enjoy Extended Returns thru Feb 1, 2017!
You have until Feb 1, 2017 to return or exchange items purchased between Nov 1, 2016 and Jan 1, 2017. All other standard return policy conditions apply.
Enter new zip code to refresh estimated delivery time.
The Intel Xeon E5-2687 v3 3.1 GHz Processor delivers performance to your workstation or server by offering ten cores and a cache size of 25MB. Hyper-Threading technology doubles the amount of processes of the cores, which allows the processor to run multiple programs simultaneously without slowing down the system. Armed with this many cores and amount of cache, it is well suited for use in different applications and environments such as data centers or financial services. Furthermore, it operates in a range of 3.1 to 3.5 GHz to deliver processing power when needed, thanks to Intel Turbo Boost Technology 2.0.
This Xeon v3 processor utilizes Haswell architecture that provides energy savings and supports DDR4 memory. This type of memory also consumes less power and provides performance during memory intensive workloads to enterprise systems. For setup, you would install this processor onto a server motherboard that features a LGA2011-3 socket. When compared to previous versions of the Xeon processors, this processor features an AVX 2.0 extension that doubles the instruction set to 256-bits and provides up to 1.9x performance gains.
ECC Memory Support
ECC memory is a type of system memory that can detect and correct common kinds of internal data corruption. Note that ECC memory requires both processor and chipset support.
Intel Turbo Boost 2.0 Technology*
Intel Turbo Boost Technology dynamically increases the processor's frequency as needed, by taking advantage of thermal and power headroom to give you a burst of speed when you need it, and increased energy efficiency when you don't.
Intel vPro Technology*
Intel vPro Technology is a set of security and manageability capabilities built into the processor, aimed at addressing four critical areas of IT security: threat management (including protection from rootkits, viruses, and malware), identity and web site access point protection, confidential personal and business data protection, and remote and local monitoring, remediation, and repair of PCs and workstations.
Intel Hyper-Threading Technology*
Intel Hyper-Threading Technology delivers two processing threads per physical core. Highly threaded applications can get more work done in parallel, completing tasks sooner.
Intel Virtualization Technology (VT-x)*
Intel Virtualization Technology allows one hardware platform to function as multiple "virtual" platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions.
Intel Virtualization Technology for Directed I/O (VT-d)*
Intel Virtualization Technology for Directed I/O continues from the existing support for IA-32 (VT-x) and Itanium processor (VT-i) virtualization, adding new support for I/O-device virtualization. Intel VT-d can help end users improve the security and reliability of the systems, and also improve performance of I/O devices in virtualized environments.*
Intel VT-x with Extended Page Tables (EPT)*
Intel VT-x with Extended Page Tables, also known as Second Level Address Translation (SLAT), provides acceleration for memory-intensive virtualized applications. Extended Page Tables in Intel Virtualization Technology platforms reduce the memory and power overhead costs, and increase battery life through hardware optimization of page table management.
Intel 64 architecture delivers 64-bit computing on server, workstation, desktop, and mobile platforms when combined with supporting software. Intel 64 architecture improves performance by allowing systems to address more than 4GB of both virtual and physical memory.
Idle States (C-states) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is doing useful work. C1 is the first idle state, C2 the second, and so on, where more power saving actions are taken for numerically higher C-states.
Enhanced Intel SpeedStep Technology
Enhanced Intel SpeedStep Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep Technology switches both voltage and frequency in tandem between high and low levels in response to processor load. Enhanced Intel SpeedStep Technology builds upon that architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery.
Intel Demand-Based Switching
Intel Demand-Based Switching is a power-management technology in which the applied voltage and clock speed of a microprocessor are kept at the minimum necessary levels until more processing power is required. This technology was introduced as Intel SpeedStep Technology in the server marketplace.
Thermal Monitoring Technologies
Thermal Monitoring Technologies protect the processor package and the system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core's temperature, and the thermal management features reduce package power consumption (and thereby temperature, when required) in order to remain within normal operating limits.
AES New Instructions
Advanced Encryption Standard New Instructions (AES-NI) is a set of instructions that enable fast and secure data encryption and decryption. AES-NI is valuable for a wide range of cryptographic applications, such as applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.
OS Guard improves security by strengthening malware protection and provides hardware-based protection for your server operating system.
Intel Secure Key consists of a digital random number generator that creates truly random numbers to strengthen encryption algorithms.
Trusted Execution Technology*
Intel Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel processors and chipsets that enhance the digital office platform with security capabilities, such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system.
Execute Disable Bit*
Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks, and prevent harmful software from executing and propagating on the server or network.
Note:*These features may not be available on all computing systems.