2 x Intel Xeon E5-2682 v4 Performance

Various open-source benchmarks by the Phoronix Test Suite v10.8.4.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2211141-NE-2XINTELXE22
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
2 x Intel Xeon E5-2682 v4
November 14 2022
  1 Minute
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


2 x Intel Xeon E5-2682 v4 PerformanceOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2682 v4 @ 3.00GHz (32 Cores / 64 Threads)HUANANZHI X99-F8D (5.11 BIOS)Intel Xeon E7 v4/Xeon256GB1024GB Samsung SSD 970 PRO 1TBNVIDIA GeForce RTX 3090 Ti 24GBRealtek ALC887-VDBenQ LCD2 x Realtek RTL8111/8168/8411Linuxmint 215.15.0-52-generic (x86_64)Cinnamon 5.4.12X Server 1.21.1.3NVIDIA 520.56.064.6.0GCC 11.3.0ext41920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerDisplay DriverOpenGLCompilerFile-SystemScreen Resolution2 X Intel Xeon E5-2682 V4 Performance BenchmarksSystem Logs- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040- OpenJDK Runtime Environment (build 11.0.17+8-post-Ubuntu-1ubuntu222.04)- itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

Bork File Encrypter

Bork is a small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage. This test measures the amount of time it takes to encrypt a sample file. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSeconds, Fewer Is BetterBork File Encrypter 1.4File Encryption Time2 x Intel Xeon E5-2682 v43691215SE +/- 0.05, N = 311.33

Systemd Kernel Boot Time

This test uses systemd-analyze to report the kernel boot time. Learn more via the OpenBenchmarking.org test page.

2 x Intel Xeon E5-2682 v4: The test run did not produce a result.