demo1.txt
my demo
demo1
Processor: 20 x Intel Xeon Gold 6230 (20 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (0.0.0 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 48GB, Disk: 30GB, Graphics: NVIDIA Quadro RTX 6000/8000 47GB, Audio: NVIDIA TU102 HD Audio, Network: Red Hat Virtio device
OS: Debian 10, Kernel: 4.19.0-17-amd64 (x86_64), Display Server: X Server, Display Driver: NVIDIA, Compiler: GCC 8.3.0 + CUDA 11.4, File-System: ext4, System Layer: qemu
Kernel Notes: scsi_mod.use_blk_mq=Y - Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1
Python Notes: Python 3.7.3
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Tensorflow
This is a benchmark of the Tensorflow deep learning framework using the CIFAR10 data set. Learn more via the OpenBenchmarking.org test page.
demo1
Processor: 20 x Intel Xeon Gold 6230 (20 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (0.0.0 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 48GB, Disk: 30GB, Graphics: NVIDIA Quadro RTX 6000/8000 47GB, Audio: NVIDIA TU102 HD Audio, Network: Red Hat Virtio device
OS: Debian 10, Kernel: 4.19.0-17-amd64 (x86_64), Display Server: X Server, Display Driver: NVIDIA, Compiler: GCC 8.3.0 + CUDA 11.4, File-System: ext4, System Layer: qemu
Kernel Notes: scsi_mod.use_blk_mq=Y - Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1
Python Notes: Python 3.7.3
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 August 2021 06:29 by user debian.