Test_OSpray
Intel Core i7-9700TE testing with a C OZE GM-1000 v0.0.01.001 (5.13 BIOS) and NVIDIA Quadro P2000 4GB on Ubuntu 18.04 via the Phoronix Test Suite.
Intel Core i7-9700TE
Processor: Intel Core i7-9700TE @ 3.80GHz (8 Cores), Motherboard: C OZE GM-1000 v0.0.01.001 (5.13 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 32GB, Disk: CIE M8 T405 512GB + Transcend 16GB, Graphics: NVIDIA Quadro P2000 4GB (1455/3003MHz), Audio: Realtek ALC888-VD, Monitor: ASUS PA238, Network: Intel I219-LM + 2 x Intel 10G X550T + Intel I210
OS: Ubuntu 18.04, Kernel: 5.0.0-23-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.4, Display Driver: NVIDIA 440.95.01, Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xb8
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling
OSPray
Intel OSPray is a portable ray-tracing engine for high-performance, high-fidenlity scientific visualizations. OSPray builds off Intel's Embree and Intel SPMD Program Compiler (ISPC) components as part of the oneAPI rendering toolkit. Learn more via the OpenBenchmarking.org test page.
Intel Core i7-9700TE
Processor: Intel Core i7-9700TE @ 3.80GHz (8 Cores), Motherboard: C OZE GM-1000 v0.0.01.001 (5.13 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 32GB, Disk: CIE M8 T405 512GB + Transcend 16GB, Graphics: NVIDIA Quadro P2000 4GB (1455/3003MHz), Audio: Realtek ALC888-VD, Monitor: ASUS PA238, Network: Intel I219-LM + 2 x Intel 10G X550T + Intel I210
OS: Ubuntu 18.04, Kernel: 5.0.0-23-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.4, Display Driver: NVIDIA 440.95.01, Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xb8
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling
Testing initiated at 13 September 2020 22:00 by user c oze.