CCR staff members rapidly worked to secure the CCR servers as soon as security patches were released to address the Intel vulnerabilities nicknamed Meltdown and Spectre. After patching the development systems, our scientists quickly jumped into measurement mode where they worked to identify the possible effects on performance caused by the kernel patching. Popular scientific applications and HPC benchmarks were used in the testing. A
research paper on initial findings was written and then featured on
HPC Wire, a publication dedicated to the field of high performance computing. A larger scale analysis is being conducted since the production clusters have been patched.