1060-3g
ethan
test
Processor: Intel Xeon Gold 6126 (4 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 8192 MB DRAM, Disk: 537GB Virtual disk, Graphics: VMware SVGA II 3GB, Network: VMware VMXNET3
OS: Ubuntu 16.04, Kernel: 4.4.0-177-generic (x86_64), Display Server: X Server 1.18.4, Display Driver: modesetting 1.18.4, Compiler: GCC 5.4.0 20160609 + CUDA 10.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Processor Notes: CPU Microcode: 0x200004d
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT disabled
NAMD CUDA
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. This version of the NAMD test profile uses CUDA GPU acceleration. Learn more via the OpenBenchmarking.org test page.
test
Processor: Intel Xeon Gold 6126 (4 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 8192 MB DRAM, Disk: 537GB Virtual disk, Graphics: VMware SVGA II 3GB, Network: VMware VMXNET3
OS: Ubuntu 16.04, Kernel: 4.4.0-177-generic (x86_64), Display Server: X Server 1.18.4, Display Driver: modesetting 1.18.4, Compiler: GCC 5.4.0 20160609 + CUDA 10.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Processor Notes: CPU Microcode: 0x200004d
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT disabled
Testing initiated at 23 April 2020 23:58 by user root.