OCR Core i7 8700K
Intel Core i7-8700K testing with a ASUS TUF Z370-PLUS GAMING (2001 BIOS) and ASUS Intel UHD 630 3GB on Ubuntu 20.04 via the Phoronix Test Suite.
Core i7 8700K
Processor: Intel Core i7-8700K @ 4.70GHz (6 Cores / 12 Threads), Motherboard: ASUS TUF Z370-PLUS GAMING (2001 BIOS), Chipset: Intel 8th Gen Core, Memory: 16GB, Disk: 128GB THNSN5128GPU7 TOSHIBA, Graphics: ASUS Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC887-VD, Monitor: DELL S2409W, Network: Intel I219-V
OS: Ubuntu 20.04, Kernel: 5.4.0-21-generic (x86_64), Desktop: GNOME Shell 3.36.0, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.6 Mesa 20.0.2, OpenCL: OpenCL 2.1, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Tesseract OCR
Tesseract-OCR is the open-source optical character recognition (OCR) engine for the conversion of text within images to raw text output. This test profile relies upon a system-supplied Tesseract installation. Learn more via the OpenBenchmarking.org test page.
OCRMyPDF
OCRMyPDF is an optical character recognition (OCR) text layer to scanned PDF files, producing new PDFs with the text now selectable/searchable/copy-paste capable. OCRMyPDF leverages the Tesseract OCR engine and is written in Python. Learn more via the OpenBenchmarking.org test page.
Core i7 8700K
Processor: Intel Core i7-8700K @ 4.70GHz (6 Cores / 12 Threads), Motherboard: ASUS TUF Z370-PLUS GAMING (2001 BIOS), Chipset: Intel 8th Gen Core, Memory: 16GB, Disk: 128GB THNSN5128GPU7 TOSHIBA, Graphics: ASUS Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC887-VD, Monitor: DELL S2409W, Network: Intel I219-V
OS: Ubuntu 20.04, Kernel: 5.4.0-21-generic (x86_64), Desktop: GNOME Shell 3.36.0, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.6 Mesa 20.0.2, OpenCL: OpenCL 2.1, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 9 July 2020 17:57 by user phoronix.