2 x Intel Xeon E5-2682 v4 Performance

Various open-source benchmarks by the Phoronix Test Suite v10.8.4.

HTML result view exported from: https://openbenchmarking.org/result/2211141-NE-2XINTELXE22&grr.

2 x Intel Xeon E5-2682 v4 PerformanceProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerDisplay DriverOpenGLCompilerFile-SystemScreen Resolution2 x Intel Xeon E5-2682 v42 x Intel Xeon E5-2682 v4 @ 3.00GHz (32 Cores / 64 Threads)HUANANZHI X99-F8D (5.11 BIOS)Intel Xeon E7 v4/Xeon256GB1024GB Samsung SSD 970 PRO 1TBNVIDIA GeForce RTX 3090 Ti 24GBRealtek ALC887-VDBenQ LCD2 x Realtek RTL8111/8168/8411Linuxmint 215.15.0-52-generic (x86_64)Cinnamon 5.4.12X Server 1.21.1.3NVIDIA 520.56.064.6.0GCC 11.3.0ext41920x1080OpenBenchmarking.org- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040- OpenJDK Runtime Environment (build 11.0.17+8-post-Ubuntu-1ubuntu222.04)- itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

2 x Intel Xeon E5-2682 v4 Performancebork: File Encryption Timesystemd-boot-kernel: Standard ErrorStandard Deviation2 x Intel Xeon E5-2682 v411.3290.050.74%OpenBenchmarking.org

Bork File Encrypter

File Encryption Time

OpenBenchmarking.orgSeconds, Fewer Is BetterBork File Encrypter 1.4File Encryption Time2 x Intel Xeon E5-2682 v43691215SE +/- 0.05, N = 311.33


Phoronix Test Suite v10.8.5