test1

2 x Intel Xeon E5-2667 v3 testing with a HP ProLiant XL190r Gen9 and Matrox s MGA G200EH on Scientific 7.1 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 1507283-BE-TEST1617680
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
test1
July 28 2015
 
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


test1OpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2667 v3 @ 3.20GHz (32 Cores)HP ProLiant XL190r Gen9Intel Xeon E5 v3/Core16 x 16384 MB 2133MHz2 x 1000GB MM1000GBKALMatrox s MGA G200EHIntel I350 Gigabit ConnectionScientific 7.13.10.0-229.7.2.el7.x86_64 (x86_64)GCC 4.8.3 20140911xfs1280x1024ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen ResolutionTest1 BenchmarksSystem Logs- Scaling Governor: pcc-cpufreq conservative- SELinux: Enabled.

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: Blowfishtest13K6K9K12K15KSE +/- 22.75, N = 3118311. (CC) gcc options: -fopenmp -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: Traditional DEStest14M8M12M16M20MSE +/- 260099.40, N = 5171580001. (CC) gcc options: -fopenmp -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: MD5test140K80K120K160K200KSE +/- 3732.12, N = 31910991. (CC) gcc options: -fopenmp -lcrypt