Toggle navigation
MeasureThat.net
Create a benchmark
Tools
Feedback
FAQ
Register
Log In
sadfsadfasdfasdfasdf
(version: 0)
Compare the new ES6 spread operator with the traditional concat() method
Comparing performance of:
array find vs _.find vs all native1 vs all native indexof
Created:
4 years ago
by:
Guest
Jump to the latest result
HTML Preparation code:
<script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/lodash.js/4.17.11/lodash.core.js"></script> <script src='https://cdnjs.cloudflare.com/ajax/libs/lodash.js/4.17.5/lodash.min.js'></script>
Script Preparation code:
var atoms = [ { "id": "report--af2cb8e5-5d1c-4964-bfe1-75ebc90f8627", "pb_file": "oilrig.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "OILRIG", "industries": [ "communications", "education", "financial-services", "government-regional", "infrastructure", "insurance", "technology", "telecommunications" ], "regions": [ "AE", "IL", "SA" ], "malwares": [ "Clayslide", "Helminth", "ISMAgent", "ISMInjector", "OopsIE", "ThreeDollars" ] }, { "id": "report--708d589b-8d99-48fd-bbb6-2d47648f807f", "pb_file": "sofacy.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "SOFACY", "industries": [ "defence", "government-national", "government-regional", "healthcare" ], "regions": [ "AU", "CH", "ES", "GB", "KZ", "NO", "US", "ZA" ], "malwares": [ "Cannon", "Zebrocy" ] }, { "id": "report--a615392f-4e01-4cb9-8b6c-ef9862f87da5", "pb_file": "pickaxe.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "PICKAXE", "industries": [], "regions": [ "BR", "DZ", "EG", "ID", "PE", "PH", "TH", "TR", "VE", "VN" ], "malwares": [ "XMRIG" ] }, { "id": "report--5984c9a5-e4ba-48d5-98f9-81d2ecca6370", "pb_file": "patchwork.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "PATCHWORK", "industries": [ "defence" ], "regions": [ "PK" ], "malwares": [ "BADNEWS" ] }, { "id": "report--59afb48d-0f9c-434d-be6a-69515424b0c3", "pb_file": "darkhydrus.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "DARKHYDRUS", "industries": [ "education", "government-regional" ], "regions": [], "malwares": [ "Phishery" ] }, { "id": "report--c88a51b6-e28d-40bd-88c8-c14f2686d221", "pb_file": "reaper.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "REAPER", "industries": [ "entertainment", "financial-services", "government-local" ], "regions": [ "KR" ], "malwares": [ "DogCall", "Freenki", "PoohMilk", "ROKRAT" ] }, { "id": "report--186d2f1b-1b39-451b-9003-d23498cc09e3", "pb_file": "rancor.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "RANCOR", "industries": [ "government-local" ], "regions": [ "KH", "SG" ], "malwares": [ "DDKONG", "DUDELL", "KHRAT", "PLAINTEE" ] }, { "id": "report--c671b3a3-2964-40ae-a80a-382b6598ea43", "pb_file": "tick.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "TICK", "industries": [ "defence", "technology" ], "regions": [ "JP", "KR" ], "malwares": [ "HomamDownloader", "Muirim", "Symonloader" ] }, { "id": "report--071bdbfe-2933-4ad2-baf1-3d77d654a079", "pb_file": "dragonok.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "DRAGONOK", "industries": [ "education", "energy", "manufacturing", "technology" ], "regions": [ "JP", "RU", "TW" ], "malwares": [ "FormerFirstRAT", "IsSpace", "Sysget", "Sysget Version 2", "Sysget Version 3" ] }, { "id": "report--9d8ecf25-ca54-4516-b68d-3d165e6f816b", "pb_file": "menupass.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "MENUPASS", "industries": [ "education", "manufacturing", "pharmaceuticals" ], "regions": [ "JP", "US" ], "malwares": [ "ChChes" ] }, { "id": "report--64e83256-077b-41e7-a729-357ad21ce60c", "pb_file": "emissary-panda.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "EMISSARY PANDA", "industries": [ "government-national" ], "regions": [], "malwares": [ "China Chopper", "HyperBro" ] }, { "id": "report--ff121304-29ad-476f-9659-9e79cc464cf6", "pb_file": "muddy-water.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "MUDDY WATER", "industries": [ "government-regional" ], "regions": [ "AE", "GE", "IL", "IN", "IQ", "PK", "SA", "TR", "US" ], "malwares": [ "POWERSTAT", "laZagne" ] }, { "id": "report--ac138246-23c7-4d83-ac03-d991444af59a", "pb_file": "chafer.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "CHAFER", "industries": [ "government-national" ], "regions": [ "TR" ], "malwares": [ "Mechaflounder" ] }, { "id": "report--abfa8e35-d096-4e77-bdc3-f7a9ad8c2ace", "pb_file": "rocke-group.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "ROCKE GROUP", "industries": [], "regions": [], "malwares": [ "CoinMiner", "Godlua", "XBash" ] }, { "id": "report--f36a1e63-90a1-4353-a1e7-f63c0608a422", "pb_file": "cobalt-gang.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "COBALT GANG", "industries": [ "financial-services" ], "regions": [], "malwares": [] }, { "id": "report--ed58bc33-f68d-4385-b555-17e81911277e", "pb_file": "cozyduke.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "COZYDUKE", "industries": [ "education", "government-national" ], "regions": [ "US" ], "malwares": [ "miniDionis" ] }, { "id": "report--42b0b7d0-1f78-463d-90e5-e69bafa85a38", "pb_file": "inception.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "INCEPTION", "industries": [ "government-national" ], "regions": [ "FR", "RU", "UA" ], "malwares": [ "POWERSHOWER" ] }, { "id": "report--ea9edd05-0c5a-454f-a266-b093515a8c9d", "pb_file": "gorgon-group.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "GORGON GROUP", "industries": [ "government-national" ], "regions": [ "ES", "GB", "RU", "US" ], "malwares": [ "NanoCoreRAT" ] }, { "id": "report--75faa9a4-d2c6-4fc1-83d0-d918edba9faa", "pb_file": "scarlet-mimic.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "SCARLET MIMIC", "industries": [ "defence", "government-national", "technology" ], "regions": [ "CN", "IN", "RU" ], "malwares": [ "CallMe", "FakeM", "Psylo" ] }, { "id": "report--0e80709c-a2c8-4b54-9769-562f1d0405ef", "pb_file": "th3bug.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "TH3BUG", "industries": [ "education", "financial-services", "manufacturing", "retail", "technology" ], "regions": [ "US" ], "malwares": [ "PoisonIvy" ] }, { "id": "report--6439e5d9-b8fc-4f65-91f1-e1f981731df9", "pb_file": "windshift.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "WINDSHIFT", "industries": [ "government-national" ], "regions": [], "malwares": [ "WINDTAIL.B" ] }, { "id": "report--85df8a85-dd04-4a63-8a9a-1e6323f52bcd", "pb_file": "pkplug.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "PKPLUG", "industries": [ "healthcare" ], "regions": [ "CN", "JP", "MM", "MN", "TW" ], "malwares": [ "9002", "Farseer", "Henbox", "PlugX", "PoisonIvy" ] }, { "id": "report--cfe5cbe7-bbe5-48e4-89df-d8c1f561df25", "pb_file": "konni.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "KONNI", "industries": [ "financial-services", "government-national", "government-regional" ], "regions": [ "KH", "KR", "RU", "US" ], "malwares": [ "CARROTBALL", "CARROTBAT", "NOKKI", "SYSCON" ] }, { "id": "report--d5c8bfcf-e2f7-4427-8fa8-6fbc05a8938e", "pb_file": "temp-xhunt.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "TEMP XHUNT", "industries": [ "government-national", "transportation" ], "regions": [ "KW" ], "malwares": [ "EYE", "Gon", "Hisoka", "Killua", "Netero", "Sakabota", "Snugy", "TriFive" ] }, { "id": "report--0f86dccd-29bd-46c6-83fd-e79ba040bf05", "pb_file": "maze-ransomware.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "MAZE RANSOMWARE", "industries": [ "construction", "financial-services", "healthcare", "pharmaceuticals", "technology" ], "regions": [ "AU", "BR", "CN", "ES", "IT", "US" ], "malwares": [ "Maze" ] }, { "id": "report--393c1aa8-3e17-41b0-adb7-bbc2ede6c3a3", "pb_file": "hangover.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "HANGOVER", "industries": [ "defence", "government-national" ], "regions": [ "BD", "PK" ], "malwares": [ "BackConfig" ] }, { "id": "report--e06ff13e-810a-4f46-be1c-0ede839825d0", "pb_file": "temp-acidbox.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "TEMP ACIDBOX", "industries": [], "regions": [ "RU" ], "malwares": [] }, { "id": "report--def4456e-1b28-4686-a3e7-128d06b99895", "pb_file": "ekans-ransomware.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "EKANS RANSOMWARE", "industries": [ "automotive", "energy", "healthcare" ], "regions": [], "malwares": [ "EKANS" ] }, { "id": "report--7596f10d-e0f7-4a9c-b7e3-b76e2ea3a476", "pb_file": "wastedlocker-ransomware.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "WASTEDLOCKER RANSOMWARE", "industries": [ "energy", "engineering", "financial-services", "healthcare", "manufacturing", "pharmaceuticals", "retail", "technology", "transportation" ], "regions": [ "US" ], "malwares": [ "SocGholish", "WastedLocker" ] }, { "id": "report--fd15aae1-84df-4d71-ad89-c1c8eac28fc6", "pb_file": "teamtnt.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "TEAMTNT", "industries": [ "defence", "education", "financial-services", "healthcare", "retail", "technology" ], "regions": [], "malwares": [ "Peirates", "XMRIG" ] }, { "id": "report--3d690b19-f459-4a76-a5dd-b76d289251c5", "pb_file": "ryuk-ransomware.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "RYUK RANSOMWARE", "industries": [ "healthcare" ], "regions": [], "malwares": [ "Ryuk" ] }, { "id": "report--61813f09-8b0b-4080-bced-731b6c8281c4", "pb_file": "trickbot.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "TRICKBOT", "industries": [ "healthcare" ], "regions": [ "US" ], "malwares": [ "Trickbot" ] }, { "id": "report--fd8718e6-bf57-4bfe-8184-551e2d93d7c8", "pb_file": "egregor-ransomware.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "EGREGOR RANSOMWARE", "industries": [ "entertainment", "retail", "technology" ], "regions": [ "CL", "US" ], "malwares": [ "Egregor" ] }, { "id": "report--158e7478-d86b-45ac-93f2-9ab70eadfd68", "pb_file": "solarstorm.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "SOLARSTORM", "industries": [ "communications", "government-national", "technology", "telecommunications" ], "regions": [ "AE", "BE", "CA", "DE", "ES", "GB", "HK", "IL", "MX", "US" ], "malwares": [ "Bloodhound", "Rubeus", "SUNBURST", "TEARDROP" ] }, { "id": "report--acc78161-ef51-4349-a675-8d3e2f87b9ae", "pb_file": "ta551-shathak.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "TA551 SHATHAK", "industries": [], "regions": [ "DE", "IT", "JP", "US" ], "malwares": [ "IcedID", "Ursnif/Gozi ISFB", "Valak" ] }, { "id": "report--c0648594-fe95-42f3-bbe1-5460444e159a", "pb_file": "bendybear.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "BENDYBEAR", "industries": [ "government-national" ], "regions": [ "TW" ], "malwares": [ "BendyBear" ] }, { "id": "report--6709b342-a101-4365-b55f-47e69db38ef0", "pb_file": "zero-day-microsoft-exchange-vulnerabilities.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "ZERO-DAY-MICROSOFT-EXCHANGE-VULNERABILITIES", "industries": [ "education", "financial-services", "government-local", "healthcare" ], "regions": [ "AE", "BD", "BR", "CA", "GB", "IL", "IT", "KR", "KZ", "MX", "PK", "RU", "SI", "TR", "US", "UZ", "ZA" ], "malwares": [ "China Chopper" ] }, { "id": "report--44db0986-9e10-4d15-a3b1-9260ab52d613", "pb_file": "dearcry.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "DEARCRY", "industries": [], "regions": [ "AU", "CA", "US" ], "malwares": [ "DEARCRY" ] }, { "id": "report--70d827ca-ec87-423a-8ad5-b5eb94f86ae2", "pb_file": "clop-ransomware.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "CLOP RANSOMWARE", "industries": [ "aerospace", "automotive", "education", "energy", "engineering", "financial-services", "healthcare", "manufacturing", "pharmaceuticals", "retail", "technology", "telecommunications", "transportation" ], "regions": [ "AU", "DK", "GB", "IN", "MX", "SG", "TR", "US" ], "malwares": [ "Clop" ] }, { "id": "report--5d071ccc-4030-49a0-94f5-ac68488f4c4f", "pb_file": "darkside-ransomware.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "DARKSIDE RANSOMWARE", "industries": [ "energy", "entertainment", "financial-services", "manufacturing", "retail", "technology", "utilities" ], "regions": [ "DE", "ES", "FR", "GB", "IT", "QA", "US", "ZA" ], "malwares": [ "Darkside" ] }, { "id": "report--be4f89e6-5df0-4e33-8173-c2566264552c", "pb_file": "prometheus-ransomware.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "PROMETHEUS RANSOMWARE", "industries": [ "agriculture", "energy", "financial-services", "government-regional", "healthcare", "insurance", "manufacturing", "transportation", "utilities" ], "regions": [ "AT", "BR", "CH", "CL", "FR", "GB", "GH", "IN", "IT", "MX", "MY", "PE", "SV", "US" ], "malwares": [ "Prometheus" ] }, { "id": "report--ef0b4ddc-97ae-4094-a18c-d93d3eca1455", "pb_file": "conti-ransomware.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "CONTI RANSOMWARE", "industries": [ "construction", "education", "energy", "entertainment", "financial-services", "government-public-services", "healthcare", "hospitality-leisure", "manufacturing", "mining", "non-profit", "pharmaceuticals", "retail", "technology", "telecommunications", "utilities" ], "regions": [ "AU", "BS", "CA", "CH", "DE", "ES", "FR", "GB", "IE", "IN", "IT", "JP", "MX", "NZ", "TW", "US" ], "malwares": [ "Conti" ] }, { "id": "report--9c560179-d00d-4835-a74f-c55b9be25276", "pb_file": "revil-ransomware.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "REVIL RANSOMWARE", "industries": [ "agriculture", "automotive", "energy", "financial-services", "healthcare", "hospitality-leisure", "manufacturing", "retail", "technology" ], "regions": [ "AR", "BR", "CA", "CL", "ES", "GB", "MX", "SE", "US", "ZA" ], "malwares": [ "REvil" ] }, { "id": "report--9d2263e3-41d8-4a29-8066-37bb5581ac25", "pb_file": "mespinoza-ransomware.json", "last_updated": "2021-08-18T00:00:00.000Z", "title": "MESPINOZA RANSOMWARE", "industries": [ "construction", "defence", "education", "engineering", "entertainment", "financial-services", "government-local", "hospitality-leisure", "manufacturing", "mining", "non-profit", "pharmaceuticals", "retail", "technology", "telecommunications", "transportation", "utilities" ], "regions": [ "AR", "AU", "BE", "BR", "CA", "CH", "CO", "DE", "DK", "ES", "FR", "GB", "IE", "IL", "IT", "KE", "MX", "NL", "NO", "PT", "RO", "SA", "SK", "US", "ZA" ], "malwares": [ "Gasket", "MagicSocks", "Mespinoza" ] }, { "id": "report--178b7328-66f7-49bd-a205-14511dd14b08", "pb_file": "hive-ransomware.json", "last_updated": "2021-08-24T08:54:43.305Z", "title": "HIVE RANSOMWARE", "industries": [ "aerospace", "communications", "construction", "education", "financial-services", "hospitality-leisure", "non-profit", "retail", "technology", "transportation" ], "regions": [ "GB", "IN", "PE", "US" ], "malwares": [ "Hive" ] }, { "id": "report--c67a9b09-e3a1-407c-942c-d0bea138be04", "pb_file": "hellokitty-ransomware.json", "last_updated": "2021-08-24T08:58:13.728Z", "title": "HELLOKITTY RANSOMWARE", "industries": [ "healthcare", "manufacturing", "pharmaceuticals" ], "regions": [ "DE", "IT", "NL", "US" ], "malwares": [ "Hello Kitty" ] }, { "id": "report--70f299df-402b-474a-bf7d-a7e5a7d1866c", "pb_file": "avoslocker-ransomware.json", "last_updated": "2021-08-24T09:17:51.756Z", "title": "AVOSLOCKER RANSOMWARE", "industries": [ "financial-services", "government-local", "transportation" ], "regions": [ "AE", "BE", "ES", "GB", "LB", "US" ], "malwares": [] }, { "id": "report--81ff21f8-6955-4b70-91dc-dce2608512ac", "pb_file": "lockbit20-ransomware.json", "last_updated": "2021-08-24T09:20:18.487Z", "title": "LOCKBIT20 RANSOMWARE", "industries": [ "automotive", "communications", "construction", "defence", "energy", "engineering", "financial-services", "government-local", "manufacturing", "non-profit", "retail", "technology", "transportation", "utilities" ], "regions": [ "AR", "AT", "AU", "BE", "BR", "CH", "DE", "GB", "IT", "MX", "MY", "RO", "US" ], "malwares": [ "Lockbit 2.0" ] } ] var q ='darkside';
Tests:
array find
// Native atoms.filter((atom) => _.flatMap(atom).join().toLowerCase().includes(q.toLowerCase()))
_.find
atoms.filter((atom) => _.flatMap(atom).join().toLowerCase().indexOf(q.toLowerCase())!=-1 )
all native1
atoms.filter(atom => Object.values(atom).flat().join().toLowerCase().includes(q.toLowerCase()))
all native indexof
atoms.filter(atom => Object.values(atom).flat().join().toLowerCase().indexOf(q.toLowerCase()) !=-1)
Rendered benchmark preparation results:
Suite status:
<idle, ready to run>
Run tests (4)
Previous results
Fork
Test case name
Result
array find
_.find
all native1
all native indexof
Fastest:
N/A
Slowest:
N/A
Latest run results:
No previous run results
This benchmark does not have any results yet. Be the first one
to run it!
Autogenerated LLM Summary
(model
llama3.2:3b
, generated one year ago):
It appears that the provided text is related to benchmarking and testing of JavaScript functions, specifically those involving the Lodash library. The first part of the text contains an object with metadata about a ransomware attack, including information about the malware, industries affected, and regions impacted. However, this data seems unrelated to the benchmarking context. The second part of the text consists of three test cases for benchmarking JavaScript functions: 1. `atoms.filter((atom) => _.flatMap(atom).join().toLowerCase().includes(q.toLowerCase()))` 2. `atoms.filter((atom) => _.flatMap(atom).join().toLowerCase().indexOf(q.toLowerCase())!=-1 )` 3. `atoms.filter(atom => Object.values(atom).flat().join().toLowerCase().includes(q.toLowerCase()))` 4. `atoms.filter(atom => Object.values(atom).flat().join().toLowerCase().indexOf(q.toLowerCase()) !=-1)` ( duplicate) These test cases appear to be comparing the performance of different JavaScript functions that use Lodash's `flatMap`, `join`, and `indexOf` methods. The latest benchmark result is also provided, which shows the execution rate per second for each test case on a mobile device running Safari 14. The results are: * `array find`: 15528.3203125 executions/second * `_.find`: 15477.12890625 executions/second * `all native1`: 12300.171875 executions/second * `all native indexof`: 12195.3095703125 executions/second Overall, the text seems to be discussing benchmarking and testing of JavaScript functions using Lodash, with a focus on comparing the performance of different approaches.
Related benchmarks:
array find vs _.find [1000 itens]
concat vs spread operator vs push 200
array find vs some fork Gabriel
array find vs some 23
arr.find vs arr.some
Comments
Confirm delete:
Do you really want to delete benchmark?