compresstest01
Running pts/john-the-ripper-1.5.1 via the Phoronix Test Suite.
HP DL testserver
Kernel Notes: hpsa.hpsa_allow_any=1
Processor Notes: Scaling Governor: pcc-cpufreq ondemand
compresstest01 john
Processor: 2 x Intel Xeon E5-2620 v3 @ 2.40GHz (24 Cores), Motherboard: HP ProLiant DL380 Gen9, Chipset: Intel Device 2f00, Memory: 8 x 16384 MB 2133MHz, Disk: 300GB LOGICAL VOLUME, Graphics: Matrox s MGA G200EH, Network: Broadcom NetXtreme BCM5719 Gigabit PCIe
OS: SUSE LINUX 11, Kernel: 3.0.76-0.11-default (x86_64), Desktop: GNOME 2.28.2, Compiler: GCC 4.3.4, File-System: ext3, Screen Resolution: 800x600
John The Ripper
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
Parallel BZIP2 Compression
HP DL testserver
Kernel Notes: hpsa.hpsa_allow_any=1
Processor Notes: Scaling Governor: pcc-cpufreq ondemand
Testing initiated at 21 January 2015 21:59 by user .
compresstest01 john
Processor: 2 x Intel Xeon E5-2620 v3 @ 2.40GHz (24 Cores), Motherboard: HP ProLiant DL380 Gen9, Chipset: Intel Device 2f00, Memory: 8 x 16384 MB 2133MHz, Disk: 300GB LOGICAL VOLUME, Graphics: Matrox s MGA G200EH, Network: Broadcom NetXtreme BCM5719 Gigabit PCIe
OS: SUSE LINUX 11, Kernel: 3.0.76-0.11-default (x86_64), Desktop: GNOME 2.28.2, Compiler: GCC 4.3.4, File-System: ext3, Screen Resolution: 800x600
Kernel Notes: hpsa.hpsa_allow_any=1
Processor Notes: Scaling Governor: pcc-cpufreq ondemand
Testing initiated at 21 January 2015 22:08 by user .