amdepyc7502-namd-1
amdepyc7502-namd-1
amdepyc7502-namd-1
Processor: AMD EPYC 7502 32-Core @ 2.50GHz (32 Cores / 64 Threads), Motherboard: GIGABYTE MZ01-CE1-00 v01000100 (R15 BIOS), Chipset: AMD Device 1480, Memory: 2 x 16384 MB DDR4-2400MHz Samsung M393A2K40CB1-CRC, Disk: 1200GB INTEL SSDSC2BB01, Graphics: NVIDIA GV102 11GB, Audio: NVIDIA Device 10f7, Network: 2 x Intel I210
OS: Ubuntu 16.04, Kernel: 4.15.0-96-generic (x86_64), Display Server: X Server 1.19.6, Display Driver: modesetting 1.19.6, Compiler: GCC 5.4.0 20160609 + CUDA 10.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x8301025
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
NAMD
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
amdepyc7502-namd-1
Processor: AMD EPYC 7502 32-Core @ 2.50GHz (32 Cores / 64 Threads), Motherboard: GIGABYTE MZ01-CE1-00 v01000100 (R15 BIOS), Chipset: AMD Device 1480, Memory: 2 x 16384 MB DDR4-2400MHz Samsung M393A2K40CB1-CRC, Disk: 1200GB INTEL SSDSC2BB01, Graphics: NVIDIA GV102 11GB, Audio: NVIDIA Device 10f7, Network: 2 x Intel I210
OS: Ubuntu 16.04, Kernel: 4.15.0-96-generic (x86_64), Display Server: X Server 1.19.6, Display Driver: modesetting 1.19.6, Compiler: GCC 5.4.0 20160609 + CUDA 10.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x8301025
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 27 April 2020 20:12 by user root.