test.txt
2 x Intel Xeon E5-2650 v2 testing with a Supermicro X9DRW v0123456789 (3.3 BIOS) and Matrox G200eR2 on CentOS Linux 7 via the Phoronix Test Suite.
1
Processor: 2 x Intel Xeon E5-2650 v2 @ 3.40GHz (16 Cores / 32 Threads), Motherboard: Supermicro X9DRW v0123456789 (3.3 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 8 x 16384 MB DDR3-1866MHz HMT42GR7AFR4C-RD, Disk: 2 x 1000GB Seagate ST1000NC001-1DY1, Graphics: Matrox G200eR2, Network: 2 x Intel I350 + 2 x Intel 82599ES 10-Gigabit SFI/SFP+
OS: CentOS Linux 7, Kernel: 3.10.0-957.27.2.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB
NAMD
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
1
Processor: 2 x Intel Xeon E5-2650 v2 @ 3.40GHz (16 Cores / 32 Threads), Motherboard: Supermicro X9DRW v0123456789 (3.3 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 8 x 16384 MB DDR3-1866MHz HMT42GR7AFR4C-RD, Disk: 2 x 1000GB Seagate ST1000NC001-1DY1, Graphics: Matrox G200eR2, Network: 2 x Intel I350 + 2 x Intel 82599ES 10-Gigabit SFI/SFP+
OS: CentOS Linux 7, Kernel: 3.10.0-957.27.2.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB
Testing initiated at 7 March 2020 18:19 by user root.