CCR staff members rapidly worked to secure the CCR servers as soon as security patches were released to address the vulnerabilities nicknamed Meltdown and Spectre. [See our initial notice about these vulnerabilities] After patching, our scientists quickly jumped into measurement mode where they worked to identify the possible effects on performance caused by the kernel patching done. A research paper on initial findings is available here
HPC Wire has featured the results and the paper in this article
More analysis is being conducted now that the production clusters have been patched.