Search Results

Search found 10536 results on 422 pages for 'cpu usage'.

Page 174/422 | < Previous Page | 170 171 172 173 174 175 176 177 178 179 180 181  | Next Page >

  • Forcibly Uninstalling Eclipse 3.5 Plugins

    - by Chris S
    How do you forcibly uninstall Eclipse 3.5 plugins without using Eclipse? I made the mistake of installing Google's Android SDK, and now when I try to check for updates via the "Check For Updates" or "Install New Software", some Android process runs, consumes all my CPU, takes up 3 gigs of memory, and crashes Eclipse. I can't even get to the uninstall dialog before Google's plugin kills everything.

    Read the article

  • Innotop and Monit to kill thread using too much resources

    - by pocesar
    Instead of restarting the whole MYSQL process, sometimes I just want to kill the offending thread instead of making everything go down. Usually the spike in CPU is when a bot is crawling the first pages of pagination of my site (over 70.000 paginated results, 45 items per page). Is there a way I could do this automatically using monit and innotop? I couldn't find relevant information on Google, that's why I'm asking here. If these two tools aren't par to the task, which ones should I use?

    Read the article

  • Enable ReadyBoost on a second internal HDD?

    - by kd304
    I have two SATA HDDs in my desktop PC (one for daily activity, one for storage and backup). I can finely use ReadyBoost with pendrives, but I wonder, Is there a way I could use my underutilized second HDD to participate in the cacheing mechanism (same concept as having two CPU cores crunch things in parallel: have two HDDs fetch data in parallel)? Clearly speaking: I want to enable ReadyBoost on my separate D: drive.

    Read the article

  • Leopard Macbook very slow after waking up from sleep / cron?

    - by yairchu
    Problem: Occasionally, my Macbook becomes very slow after waking up from sleep I open Activity Monitor and notice some processes like makewhatis are taking 100% CPU I kill the process[es] and then everything works fine again Questions: My guess is that these processes are cron jobs. Is that correct? Is it ok to kill them? Is there a way to make this problem not happen? Is this fixed on Snow Leopard? I'm using Leopard (10.5.8) on a MacBook5,1

    Read the article

  • Is a 2006 Mac Mini’s processor upgradeable to a Core 2 Duo?

    - by chiurox
    I have a Mac Mini with Core Solo 1.5GHz, 512mb RAM, 60gb HDD, etc... I know, it's very old but since it's lying around here, I wanted to bump it up for general usage and some experimental iPhone development. Also, Snow Leopard can't be installed as it doesn't have enough RAM. I browsed around but I'm not sure if this Mac Mini's motherboard accepts a Core2Duo (at least a 2.0GHz). If anyone could inform me which generation of Core2Duo it still accepts, I'd be grateful.

    Read the article

  • Using Twitter to accept messages for a web app

    - by Jon
    I'd like my web app to be able to accept direct messages via twitter. My app won't be sending our any spam, in fact it won't send out any messages at all. It will essentially be a bot controlled account as I would only access the account via an API to check for direct messages. Is this kind of usage permitted within twitter's t & c? Thanks.

    Read the article

  • Bacula optimization/profiling tools

    - by pufferfish
    I'm trying to get an idea of where the bottlenecks are in our backup system. Are there tools available for profiling this? If not, any pointers to a home grown method would also help. I guess most of the info would be in the bacula logs, but I'd also like to see things like what gets saturated during despooling: disk, CPU or network? This feels like a problem most bacula admins would have encountered.

    Read the article

  • What is the difference between "load" and "fetch"?

    - by DragonLord
    I often encounter the words load and fetch in contexts where data are being read from some source, and they seem to have slightly different meanings. What's the difference? I've done some research and couldn't find any specific technical difference in general usage. While the term fetch can refer to one stage in CPU instruction execution, I've seen it used in contexts not related to CPUs, and I'm looking for an answer that is not specific to CPUs.

    Read the article

  • Generating wildcard SSL certificate

    - by Xiè Jìléi
    I can make a single SSL certificate for several different domain names: www1.example.com www2.example.com www3.example.com But *.example.com doesn't work. How can I make a single SSL certificate for all sub domains within .example.com? P.S. Here is the extension part of the generated certificate: X509v3 extensions: X509v3 Basic Constraints: CA:FALSE X509v3 Key Usage: Digital Signature, Non Repudiation, Key Encipherment X509v3 Subject Alternative Name: DNS:*.example.com It's simply not matched by any sub-domain under example.com by the browser.

    Read the article

  • Not able to connect to game using "Game Ranger"

    - by Daud
    Every time the game is about to start it says that I have lost my connection to EA's servers with the following message: Make sure your network adapter and network cable is plugged in. Although my connection works perfectly but when it comes to online gaming it messes up everything. My System specifications: Intel(R) Core(TM) i5-2410M CPU @ 2.30GHz 4096MB RAM Windows 7 Ultimate 64-bit Internet connection of 2Mbps Can you help me to sort it out?

    Read the article

  • Where is the used memory in Task Manager & Resource Monitor coming from?

    - by Sam Adams
    On a Windows 7, the working set memory usage plus private memory does not add up to the total used memory in Task Manager and Windows 7 Resource Monitor. How do you find out where the used memory is coming from? The cached memory can't be part of it because sometimes the total cache is greater than the total in use. The commit memory plus the working set also doesn't add up to the total in use - but even that shouldn't be significant if it did, since commit is virtual.

    Read the article

  • can someone explain IOSTAT ouput?

    - by user37197
    i'am having IBM server with Redhat 5 ElsmP connected to the IBM Storage over iSCSI (in sdb ) can someone explain this output from iostat command avg-cpu: %user %nice %system %iowait %steal %idle 12.79 0.01 4.53 72.22 0.00 10.45 Device: tps Blk_read/s Blk_wrtn/s Blk_read Blk_wrtn sda 95.63 48.88 240.95 485589164 2393706728 sdb 29.20 350.49 402.08 3481983365 3994494696 move large file to sdb very slowly,it seem normaly?

    Read the article

  • Excel 2007 save import steps on csv file?

    - by Chris Marisic
    I have a csv file that constantly needs opened into Excel and then have the data copied over to a separate workbook. I find the process of having to click through all of the dialogs, setting the text identifier, setting the columns to all be text extremely tedious. In many actions with data like this in regards to MSSQL or Access the program will ask you if you wish to save these steps however Excel doesn't readily ask that. Is there any way to get a comparable usage with Excel?

    Read the article

  • Windows 2003 Domain controller

    - by user40766
    I have a win 2K3 domain controller that has sudddenly started logging about 60 events a second. All events are ID 538, 540 and 576 All events pertain to Security Audit of the machine itself logging in successfully. a typical entry is Event Id 540 Successful Network Logon: User Name: <machinename>$ Any pointers to how I can diagnose this? CPU and memory are normal on the machine.

    Read the article

  • Improve file transfer speed between Windows PCs and servers

    - by Geotarget
    I've setup a server which I've connected to multiple PCs in my workplace. Sadly, data transfer speeds are at max 3 MB/sec per connection which works out slow for file transfers, especially when transferring large files. I'm using Windows filesharing and the server is a Windows Server 2008 (2 Ghz CPU, 1 GB RAM) and the client PCs mostly running Windows 7. How can I detect bottlenecks in my network and improve file sharing speed within the network?

    Read the article

  • iPhone: how to test that a 3Gs is what it says it is?

    - by Mike
    I'm about to buy a second hand iPhone. It's supposedly a 3Gs; hardly used and de-blocked. Is there any way of checking this through the handset before I give over my money? I recently sold my Nokia W72 and the guy I sold it too put in a code and it showed him my usage details? Any advice given is greatly appreciated. Thanks Mike.

    Read the article

  • How do I determine if my server is AMT capable for remotely turning on or rebooting a frozen computer

    - by RDK45
    I just finished reading the subject post (http://superuser.com/questions/319859/remotely-turning-on-or-rebooting-a-frozen-computer) and have further questions. I very interested in remote access to my server, in particular restarting it when it is in a stalled or blue-screen state.. How can I determine if my server is AMT enabled? It has a GIGABYTE GA-Z68MA-D2H-B3 Motherboard and Intel Core i5-2500K CPU. Thanks....RDK45

    Read the article

  • KVM-Guest does not boot: qemudParsePCIDeviceStrs

    - by markus
    I have a Server running Ubuntu 10.10 Server-Edition kvm, and libvirt (both ubuntu-native packages) HDD-Partitioning was done with LVM. Then I created some VMs with Virt-Manager and assigned LVM-Volumes to the VMs. Now the VMs do not boot. Virt-Manager shows a CPU-Usage of 100% for this Guest and the VNC-Connection states Booting from Hard Disk The VM-specific logfiles do not show any abnormality only syslog shows a warning warning : qemudParsePCIDeviceStrs:1422 : Unexpected exit status '1', qemu probably failed What can I do to find the error?

    Read the article

  • Tunneling traffic through a proxy using SSH - what does the proxy server see?

    - by nilu
    If I am accessing information (in a browser or via bittorent) through an SSH tunnel, what info will then be possible to obtain on the SSH/proxy server itself? As far as I have understood, the information between the proxy server and my computer is encrypted, but is it not possible for the SSH server admin to obtain info about the traffic? The SSH session requires my credentials, so my guess would be that the server admin would be able to obtain any information about my network usage.

    Read the article

  • Why do my VMware Images get so large?

    - by stevebot
    Hi, I have a Centos VMware Image that I have recreated a couple times, and I notice that after a while it gets pretty large. It starts out at 8 GBs when I make it, and a week or two later it is 25GB and then a month later it is a whole 50GB or so. I am not installing anything crazy on it, and my disk usage on the VM is pretty low. Is there an option that could be affecting the size of these VMs?

    Read the article

< Previous Page | 170 171 172 173 174 175 176 177 178 179 180 181  | Next Page >