6.23.2011
5.29.2011
Intel Centrino Advance-N 6200 driver
Wireless LAN of my Lenovo is unstable.
Therefore, I installed a new driver.
The Lenovo condition is good for the moment :)
5.15.2011
"TOP" command
[1raw] Statistics
current time / working time / login user / working jobs before 1min(ave) / 5min / 15min
>>It can read mean number (Load avarage) of the job awaiting practice as CPU utilization .
less than 1 -> comfortable(there is no waiting process)
more than 3 -> good
more than 5 -> some burden
more than 10 -> severe
more than 20 -> abnormal
*case 1 CPU
[2raw] number of process
number of total processes / waiting processes / working processes / zombie processes / stoped processes
[3raw] Utilization
us -> utilization of user process
sy -> utilization of system process
ni -> utilization of priority process
id -> rate of system idol
wa -> waiting time of file IO
hi -> use time in the hardware IRQ
si -> use time in the software IRQ
[4raw] Utilization of memory
total -> total size
used -> used size
free -> free size
buffers -> buffer cache size
[5raw] Utilization fo swap
total -> total size
used -> used size
free -> free size
cached -> cache file size
[List]
PID -> process id
USER -> user of process
PR -> priority
NI -> Nice level of task
*The negative nice level means a high priority.
VIRT -> virtual memory size that a task uses.
RES -> physical memory size which is not performed the swap that a task uses of
SHR -> Shared memory size(kb) which a process uses
S -> State of the process
S: sleep
T: stop
D: impossible IRQ (sleep)
N: nice value adds it
< : nice value subtracks it
R: executing
Z: zombie
W: swap out
%CPU -> CPU utilization
%MEM -> memory utilization
TIME+ -> execute time of the process(s)
COMMAND -> command name
*It can read Load avarage of the TOP command as CPU utilization , but am not suitable for graphs such as MRTG because numerical value may exceed 1.
*From a value of /proc/stat , It can calculate CPU utilization instead.
#cat /proc/stat
Result indication[user/nice/system/idle/iowait/irq/softirq/steal]
*I display time (Tick number ) that a CPU used since the OS starts according to a user when I execute the command mentioned above.
I carry it out repeatedly and can calculate CPU utilization when I divide the difference share by the total for the difference.
*CPU utilization = (user1 - user2) / (user1-user2 + nice1-nice2 + system1-system2 + idle1-idle2) which user used
4.17.2011
Bellman&Symfon alarm clock with bed shaker function
◆ Alarm clock with vibrating bed shaker of Berman
For an alarm clock, I am slightly expensive, but am a convenient tool preventing a late riser.
I put a bed shaker by the pillow and wake you up by an errand, vibration and a flash bulb, three methods of the alarm.
As far as, for me who have a slight hearing loss, I am very reliable.
I can install the bed shaker to two.
The vibration depends on a way of the setting, but can considerably strongly take in it. I sandwich it between a pillow and mattresses and, in the case of me, use it.
You can see the state that a bed shaker at the time of the alarm rumbling vibrates on the next video.
It is the image that the appearance is simple, and is very cute against the horror of the function. Any people regardless of age or sex is held up. It becomes easy to turn it when I cover the knob part with a supporting knob.
A terminal for external equipment connection appears when I remove a back back lid.
I sound alarm at the time of the receipt when I connect a telephone wire how and can link with the fire alarm with a trigger terminal.
The volume of the alarm is biggest, and 80db, the frequency are explained with 500-1000Hz. Of course a snooze function is with it.
The power supply uses the AC power, but a charge pond is reliable at the time of the blackout because the internal organs are considered to be it.
Because a demerit was an analog watch, the precision of the alarm time was rougher than digital, but, in the case of me, was not worried because I set it slightly early.
3.27.2011
Norton Mobile Security & Android2.2 (Galaxy S)
I install Norton mobile security released in 3/25 in Galaxy S.
I try weakness accessed in the file of a terminal discovered in Mr. Thomas Cannon illegally.
There is not any reaction in Norton. (2,980 yen)
Subscribe to:
Posts (Atom)