namd-test
Intel Core i5-6400 testing with a Dell 0XJ8C4 (2.6.1 BIOS) and Intel HD 530 on CentOS Linux 7 via the Phoronix Test Suite.
Intel Core i5-6400
Processor: Intel Core i5-6400 @ 3.30GHz (4 Cores), Motherboard: Dell 0XJ8C4 (2.6.1 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 2 x 4096 MB DDR4-2400MT/s IM44GU48N24-FFFHA0, Disk: 1000GB Seagate ST1000DM003-1ER1, Graphics: Intel HD 530 (950MHz), Audio: Realtek ALC3861, Network: Intel I219-V
OS: CentOS Linux 7, Kernel: 3.10.0-957.27.2.el7.x86_64 (x86_64), Display Driver: intel, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xcc
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Vulnerable IBPB
NAMD
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
Intel Core i5-6400
Processor: Intel Core i5-6400 @ 3.30GHz (4 Cores), Motherboard: Dell 0XJ8C4 (2.6.1 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 2 x 4096 MB DDR4-2400MT/s IM44GU48N24-FFFHA0, Disk: 1000GB Seagate ST1000DM003-1ER1, Graphics: Intel HD 530 (950MHz), Audio: Realtek ALC3861, Network: Intel I219-V
OS: CentOS Linux 7, Kernel: 3.10.0-957.27.2.el7.x86_64 (x86_64), Display Driver: intel, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xcc
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Vulnerable IBPB
Testing initiated at 15 March 2021 00:05 by user .