Orders placed after 4PM on weekdays will not ship until the next business day. Orders placed after 11AM Fridays will not ship until the following Monday.
Faster shipping methods may be available; just upgrade during checkout.
*Some exclusions apply.
Enjoy Extended Returns thru Feb 1, 2017!
You have until Feb 1, 2017 to return or exchange items purchased between Nov 1, 2016 and Jan 1, 2017. All other standard return policy conditions apply.
Enter new zip code to refresh estimated delivery time.
The ML350 Gen9 Intel Xeon E5-2620 v3 Processor Kit from HP is designed for the HP ProLiant ML350 Generation9 (Gen9) server. The kit utilizes an Intel Xeon E5 2620 v3 processor that has a base clock speed of 2.4 GHz and comes with features such as Intel Turbo Boost 2.0, which allows the processor to reach a maximum frequency of 3.2 GHz. Additionally, this processor features six cores with twelve threads in a FCLGA2011-3 socket and has 15MB of Intel Smart Cache memory. Having six cores allows the processor to run multiple programs simultaneously without slowing down the system, while the twelve threads allow applications to complete tasks sooner y working in parallel. This processor also supports up to 768GB of DDR4-1600/1866 MHz RAM, and it has AVX 2.0 Extensions, AES New Instructions, 22nm semiconductor technology, and a system bus of 8 GT/s.
The HP ProLiant ML350 Generation9 (Gen9) is a 2P server that delivers performance, availability, expandability, reliability, and servicability, making it a strong choice for remote offices, growing businesses, and data centers.
HP ProLiant ML350 Generation9
This processor is compatible with the HP ProLiant ML350 Generation9 server
Intel Turbo Boost Technology 2.0
Intel Turbo Boost Technology 2.0 helps increases the processor's frequency as needed by taking advantage of thermal and power headroom to give you a burst of speed when you need it, and increased energy efficiency when you don't. The maximum turbo frequency for this processor is 3.2 GHz
Intel vPro Technology
Intel vPro Technology is a set of security and manageability capabilities built into the processor aimed at addressing four critical areas of IT security: 1) Threat management, including protection from rootkits, viruses, and malware 2) Identity and web site access point protection 3) Confidential personal and business data protection 4) Remote and local monitoring, remediation, and repair of PCs and workstations
Intel Hyper-Threading Technology
Intel Hyper-Threading Technology (Intel HT Technology) delivers two processing threads per physical core. Highly threaded applications can get more work done in parallel, completing tasks sooner
Intel Virtualization Technology (VT-x)
Intel Virtualization Technology for Directed I/O (VT-d)
Intel Virtualization Technology for Directed I/O (VT-d) continues from the existing support for IA-32 (VT-x) and Itanium processor (VT-i) virtualization adding support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environments
Intel VT-x with Extended Page Tables (EPT)
Intel VT-x with Extended Page Tables (EPT), also known as Second Level Address Translation (SLAT), provides acceleration for memory intensive virtualized applications. Extended Page Tables in Intel Virtualization Technology platforms reduces the memory and power overhead costs and increases battery life through hardware optimization of page table management
Intel 64 architecture delivers 64-bit computing on server, workstation, desktop, and mobile platforms when combined with supporting software. Intel 64 architecture improves performance by allowing systems to address more than 4GB of both virtual and physical memory
Idle States (C-states) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is doing useful work. C1 is the first idle state, C2 the second, and so on, where more power saving actions are taken for numerically higher C-states
Enhanced Intel SpeedStep Technology
Enhanced Intel SpeedStep Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep Technology switches both voltage and frequency in tandem between high and low levels in response to the processor load. Enhanced Intel SpeedStep Technology builds upon that architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery
Intel Demand Based Switching
Intel Demand Based Switching is a power-management technology in which the applied voltage and clock speed of a microprocessor are kept at the minimum necessary levels until more processing power is required. This technology was introduced as Intel SpeedStep Technology in the server marketplace
Thermal Mounting Technologies
Thermal Monitoring Technologies help protect the processor package and the system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core's temperature, and the thermal management features reduce package power consumption and thereby temperature when required in order to remain within normal operating limits
Intel Data Protection Technology
AES New Instructions
Advanced Encryption Standard New Instructions (AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption
Intel Secure Key consists of a digital random number generator that creates truly random numbers to strengthen encryption algorithms
Intel Platform Protection Technology
Trusted Execution Technology
Intel Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel processors and chipsets that help enhance the digital office platform with security capabilities such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system
Execute Disable Bit
Execute Disable Bit is a hardware-based security feature that can help reduce exposure to viruses and malicious-code attacks and prevent harmful software from executing and propagating on the server or network