OCR Core i7 8700K
Intel Core i7-8700K testing with a ASUS TUF Z370-PLUS GAMING (2001 BIOS) and ASUS Intel UHD 630 3GB on Ubuntu 20.04 via the Phoronix Test Suite.
Core i7 8700K
Processor: Intel Core i7-8700K @ 4.70GHz (6 Cores / 12 Threads), Motherboard: ASUS TUF Z370-PLUS GAMING (2001 BIOS), Chipset: Intel 8th Gen Core, Memory: 16GB, Disk: 128GB THNSN5128GPU7 TOSHIBA, Graphics: ASUS Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC887-VD, Monitor: DELL S2409W, Network: Intel I219-V
OS: Ubuntu 20.04, Kernel: 5.4.0-21-generic (x86_64), Desktop: GNOME Shell 3.36.0, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.6 Mesa 20.0.2, OpenCL: OpenCL 2.1, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
OCRMyPDF
OCRMyPDF is an optical character recognition (OCR) text layer to scanned PDF files, producing new PDFs with the text now selectable/searchable/copy-paste capable. OCRMyPDF leverages the Tesseract OCR engine and is written in Python. Learn more via the OpenBenchmarking.org test page.
Tesseract OCR
Tesseract-OCR is the open-source optical character recognition (OCR) engine for the conversion of text within images to raw text output. This test profile relies upon a system-supplied Tesseract installation. Learn more via the OpenBenchmarking.org test page.
Core i7 8700K
Processor: Intel Core i7-8700K @ 4.70GHz (6 Cores / 12 Threads), Motherboard: ASUS TUF Z370-PLUS GAMING (2001 BIOS), Chipset: Intel 8th Gen Core, Memory: 16GB, Disk: 128GB THNSN5128GPU7 TOSHIBA, Graphics: ASUS Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC887-VD, Monitor: DELL S2409W, Network: Intel I219-V
OS: Ubuntu 20.04, Kernel: 5.4.0-21-generic (x86_64), Desktop: GNOME Shell 3.36.0, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.6 Mesa 20.0.2, OpenCL: OpenCL 2.1, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 9 July 2020 17:57 by user phoronix.