Test de GZIP Compression
Test de prueba de GZIP Compression
Primer test de GZIP Compression
Processor: AMD E-350D APU @ 1.60GHz (2 Cores), Motherboard: Gigabyte E350N WIN8 (F3 BIOS), Chipset: AMD 14h Root Complex, Memory: 3584MB, Disk: 200GB SAMSUNG SP2004C, Graphics: Gigabyte AMD Radeon HD 6310 384MB, Audio: AMD Wrestler HDMI Audio, Monitor: 2D FHD LG TV, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.15.0-46-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.13, Compiler: GCC 9.4.0, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x5000119
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Gzip Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
Primer test de GZIP Compression
Processor: AMD E-350D APU @ 1.60GHz (2 Cores), Motherboard: Gigabyte E350N WIN8 (F3 BIOS), Chipset: AMD 14h Root Complex, Memory: 3584MB, Disk: 200GB SAMSUNG SP2004C, Graphics: Gigabyte AMD Radeon HD 6310 384MB, Audio: AMD Wrestler HDMI Audio, Monitor: 2D FHD LG TV, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.15.0-46-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.13, Compiler: GCC 9.4.0, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x5000119
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 August 2022 21:39 by user zuriel.