namd3470
4.1 GHz
namd3470
Processor: Intel Core i5-3470 @ 5.90GHz (4 Cores), Motherboard: ASUS P8P67 EVO (3602 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 8GB, Disk: 275GB Crucial_CT275MX3 + 2 x 1000GB Western Digital WD10EADS-00M, Graphics: AMD Radeon X600/X600 SE, Monitor: N173O6, Network: Intel 82579V
OS: Arch Linux, Kernel: 5.9.9-arch1-1 (x86_64), Compiler: GCC 10.2.0 + Clang 11.0.0Target: + LLVM 11.0.0, File-System: ext4, Screen Resolution: 1600x900
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x15
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
NAMD
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
namd3470
Processor: Intel Core i5-3470 @ 5.90GHz (4 Cores), Motherboard: ASUS P8P67 EVO (3602 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 8GB, Disk: 275GB Crucial_CT275MX3 + 2 x 1000GB Western Digital WD10EADS-00M, Graphics: AMD Radeon X600/X600 SE, Monitor: N173O6, Network: Intel 82579V
OS: Arch Linux, Kernel: 5.9.9-arch1-1 (x86_64), Compiler: GCC 10.2.0 + Clang 11.0.0Target: + LLVM 11.0.0, File-System: ext4, Screen Resolution: 1600x900
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x15
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 22 November 2020 13:05 by user paolo.