What are hiutil and mdworker? - they're maxing out the CPU!!
So I upgraded this afternoon to Lion on my 13" macbook air from the App Store; first of all the reboot crashed, then a hard off and back on sorted that out.
Now hiutil (and sometimes mdworker) are trashing the CPU constantly at 90-100% (and making the fan go crazy with it)
Anyone have any idea what these threads are?
My MBA is now unusable because of these!!
Cheers, Simmo
mdworker is the Spotlight indexer. Spotlight is a bit wonky in Lion (as it was in SL 10.6.0)…be patient; it might not be fixed until 10.7.2 or so. If you don't use Spotlight, consider turning it off in SysPrefs. It'll cut that process.
hiutil seems to be a low-level process for Help pages. It's probably indexing those (to get the snappy search results from the Help menu).
hiutil(1) Mac OS X Manual Page
Similar Messages
-
I am being asked for a password on my exchange account -- what is that and how do I find out the password?
That is your mail account (or one of them anyway) and you need to get it from your Exchange administrator.
-
0.41GB of my iPod Touch 4G's capacity is taken up by something callked 'Others'. What are 'Others' and will it be o.k to delete them? If so how do I go about doing it as there is no trace of a file on either iTunes or my iPod?
Other content is typically miscellaneous data used by applications you have installed - could be save data (e.g. for games), or documents you've created. There's no easy way to determine precisely what it is, but the only way to clear it is to either delete it from within the respective application, or remove the associated application altogether - neither of which are typically practical.
-
I tested compatibilty and it says it's not compatible ( no details provided)
Many thanks b Noir
This is a copy of ONEof the keys in the registry I changed as told by Apple support today. I also have changed others as instructed by GEAR software support to manually delete GEAR drivers (that I had installed but couldn't delete some of the others they mentioned from Windows system 32. Then some bright spark at work told me I need the Gear drivers so I downloaded the software and installed again.
Sorry, just this minute went to insert image and it is giving me a message saying this sort of content is not allowed?.
The most recent key I altered is in: HKey _local _machine. System\class - 4D36E965-E325-11CEBFC1-08002BE10318. Upper Filter data: Upper filter NTIDrvr SiRem GEARAspiWDN.
The GEARsoftware info about manually deleting GEAR drive is from:
http://www.gearsoftware.com/wiki/index.php?title=DRIVERS:_Windows_-_Updating%2C_ removing%2C_64_bit_versions%2C_etc
I hope you can help -
What can I do about WSdaemon maxing out the cpu?
Activity monitor shows WSdaemon using unto 120% cpu usage, my fan is running almost constantly. This used to happen while watching films but now whenever I surf the net.
Anyone got a solution?See here: https://community.webroot.com/t5/Webroot-SecureAnywhere-Complete/Is-Webroot-Secu re-Compatible-with-OSX-Mavericks/td-p/64245
But I'd just uninstall it as it is most likely completely useless. -
What are ROWID and ROWNUM? Are they stored in database and where?
Hi All,
can anybody please answer this question
What are ROWID and ROWNUM? Are they stored in database and where?
Thanks,
SriniROWID can be thought of as a pointer to the physical location (on disk) of the (table) row.
From a ROWID value, Oracle can extract the file, block-within-that-file and offset-of-the-row-within-that-block. Using these, Oracle can directly access a disk block to retrieve a row.
ROWNUM is a just sequence number of a row within a result set of a query.
As said by other repliers, both are not stored. They are 'constructed' when you reference them inside a query. -
In preferences- saved passwords for Chrome://weave (Mozilla Services password) and Mozilla Services Encription Passphrase) what are these and are they needed?
They are only needed for firefox sync.
-
What are high and low values in sharepoint 2013 user permissions?
So I hit this api:
http://win-a3q7ml82p8f/sharepoint_site/_api/web/roledefinitions/
And got the different high and low values. But I am not clear with what they mean:
For eg:
High: 176, Low: 138612833
and
High: 176, Low: 138612801
So for different values of Low how does it change the permissions?
For 176 its binary is 10110000. So looking at this table here: http://www.dctmcontent.com/sharepoint/Articles/Permissions%20and%20Mask%20Values.aspx
I can understand that 176 would mean the following set of permissions:
DeleteVersions
OpenItems
ApproveItems
But what's confusing me is, that user has OpenItems permissions but not ViewListItems permission? Am I wrong in understanding this?
Also how does the value of Low change the overall user permissions?
Note: I looked at this answer: http://social.msdn.microsoft.com/Forums/sharepoint/en-US/9d6df168-e8f5-4323-8c34-0646c03eff68/rest-api-what-are-high-and-low-in-effectivebasepermissions-and-getusereffectivepermissions?forum=sharepointdevelopment
But honestly I cant understand what that means. Can someone help please?check this blog may explain you...
http://jamestsai.net/Blog/post/Understand-SharePoint-Permissions---Part-1-SPBasePermissions-in-Hex2c-Decimal-and-Binary---The-Basics.aspx
Please remember to mark your question as answered &Vote helpful,if this solves/helps your problem. ****************************************************************************************** Thanks -WS MCITP(SharePoint 2010, 2013) Blog: http://wscheema.com/blog -
What are valid and invalid email address characters
What are valid and invalid email address characters in Exchange 2010, for example can you have Conan.O'[email protected] is there a document that shows the valid and invalid sysmbols?
Hi
The format of email addresses is
local-part@domain where the local-part may be up to 64 characters long and the
domain name may have a
maximum of 253 characters - but the maximum 256 characters length of a forward or reverse path restricts the entire email address to be no more than 254 characters.<sup id="cite_ref-0">[1]</sup>
The formal definitions are in RFC 5322 (sections 3.2.3
and 3.4.1) and RFC 5321 - with a more readable form given in
the informational RFC 3696<sup id="cite_ref-1">[2]</sup>
and the associated errata.
Local part
The local-part of the email address may use any of these
ASCII characters
RFC 5322 Section
3.2.3:
Uppercase and lowercase English letters (a–z, A–Z) (ASCII: 65-90, 97-122)
Digits
0 to
9 (ASCII: 48-57)
Characters
!#$%&'*+-/=?^_`{|}~ (ASCII: 33, 35-39, 42, 43, 45, 47, 61, 63, 94-96, 123-126)
Character
. (dot, period, full stop) (ASCII: 46) provided that it is not the first or last character, and
provided also that it does not appear two or more times consecutively (e.g. [email protected] is not allowed.).
Special characters are allowed with restrictions. They are:
o
Space and
"(),:;<>@[\] (ASCII: 32, 34, 40, 41, 44, 58, 59, 60, 62, 64, 91-93)
The restrictions for special characters are that they must only be used when contained between quotation marks, and that 3 of them (The
space, backslash \ and
quotation mark " (ASCII: 32, 92, 34)) must also be preceded by a backslash
\ (e.g.
A quoted string may exist as a dot separated entity within the local-part, or it may exist when the outermost quotes are the outermost characters of the local-part
(e.g. abc."defghi"[email protected] or
"abcdefghixyz"@example.com are allowed. Conversely,
abc"defghi"[email protected] is not; neither is
abc\"def\"[email protected]). Quoted strings and characters however, are not commonly used.
RFC 5321 also
warns that "a host that expects to receive mail SHOULD avoid defining mailboxes where the Local-part requires (or uses) the Quoted-string form".
The local-part "postmaster" is treated specially - it is case-insensitive, and should be forwarded to the server's administrator. Technically all other local-parts
are case sensitive, therefore [email protected] and [email protected] specify different mailboxes. However most organizations treat uppercase and lowercase letters as equivalent, and also do not allow use of the technically valid characters
(space, ? and ^). Organizations are free to restrict the forms of their own email addresses as desired, e.g.,
Windows Live Hotmail,
for example, only allows creation of email addresses using alphanumerics, dot (.), underscore (_)
and hyphen (-).<sup id="cite_ref-2">[3]</sup>
Systems that send mail must be capable of handling outgoing mail for all valid addresses. Contrary to the relevant standards, some defective systems treat certain
legitimate addresses as invalid and fail to handle mail to these addresses. Hotmail, for example, refuses to send mail to any address containing any of the following standards-permissible characters:
!#$%*/?^`{|}~
Domain part
The domain name part of an email address has to conform to strict guidelines: it must match the requirements for a
hostname,
consisting of letters, digits, hyphens and dots. In addition, the domain part may be an
IP address
literal, surrounded by square braces, such as jsmith@[192.168.2.1], although this is rarely seen except
in email spam.
Examples
Valid email addresses
<tt>[email protected]</tt>
<tt>[email protected]</tt>
<tt>[email protected]</tt>
<tt>much."more\ unusual"@example.com</tt>
<tt>very.unusual."@"[email protected]</tt>
<tt>very."(),:;<>[]".VERY."very@\\\ \"very"[email protected]</tt>
Invalid email addresses
<tt>Abc.example.com</tt> (an @ character must separate the local and domain parts)
<tt>[email protected]</tt> (character dot(.) is last in local part)
<tt>[email protected]</tt> (character dot(.) is double)
<tt>A@b@[email protected]</tt> (only one @ is allowed outside quotation marks)
<tt>a"b(c)d,e:f;g<h>i[j\k][email protected]</tt> (none of the special characters in this local part
is allowed outside quotation marks)
<tt>just"not"[email protected]</tt> (quoted strings must be dot separated, or the only element making
up the local-part)
<tt>this is"not\[email protected]</tt> (spaces, quotes, and backslashes may only exist when within
quoted strings and preceded by a slash)
<tt>this\ still\"not\\[email protected]</tt> (even if escaped (preceded by a backslash), spaces, quotes,
and backslashes must still be contained by quotes)
Terence Yu
TechNet Community Support -
What are advantage and disadvantage for Physical Standy and Logical Standby
HI,
What are advantage and disadvantage for Physical Standy and Logical Standby configuration?
Thanks
KenLogical standby database
The key advantage for logical standby databases is that they're opened read/write, even while they're in
applied mode. That is, they can be used to generate reports and the like. It is indeed a fully functional
database. Also, additional indexes, materialized views and so on can be created.
However (this being a disadvantage) not all datatypes are supported.
Oracle (or more exactly the log apply services) uses the primary database's redo log, transforms them into
SQL statements and replays them on the logical standby database.
Physical standby database
A physical standby database is a byte for byte exact copy of the primary database. This also means that
rowids stay the same in a physical standby database environment.
Oracle (or more exactly the log apply services) uses the primary database's redo log to recover the
physical database.
A physical standby database might be opened read only; however, the received logs are in this case not
applied. When the logs are applied, the database is not accessible (it is then in a managed recovery state).
Regards, -
What are Validation and simulator
can any one explain what are Validation and Simulators are ???
what is there importance and how they work in SAP ??
Regards,
MilindkumarAre you referring to validation rules and simulations? Whereby validations allow the checking of values and combinations of data as they are being entered in SAP. Because the data is validated before it is posted, only correct information enters the system. For example if you have a cost center X that should not post to account Y. You create a validation that checks to see if cost center X is entered whether the account is Y. If the account is Y the validation will stop the entry from being made.
Simulations normally are when data is checked for accuracy or verfied before posting. Simulations usually allow the verification of data by displaying that entries that will post or will be created only after the post button or process occurs. -
My question today: What are strengths and weaknesses of the
sap.m.Shell
and
sap.m.App
as container for an application wrapper?
I currently use non of them, but I see the advantages.
SAP best practise is to use one of them or nest them as shell > app. What are strengths and weaknesses of the approaches?We prefer to say, the tender mercies of the Fetch block.
You'll notice the "wfm info" cluster as an output of the Fetch
VI. This cluster has gain and offset members- use these to scale
your binary data to floating point voltage representation.
As you point out, the numbers won't be exactly what you expect given
the vertical range and the device resolution. There are a few
reasons for this. First, we don't use the absolute full scale of
the ADC for the maximum input voltage. There are a couple of
codes of headroom at the top and bottom. This allows your input
signal to slightly exceed the specified vertical range without clipping
(you'll get a warning from the driver). Second, these gain and
offset numbers take into account calibration information for your
device. Using these numbers will correct for small deviations
from the ideal offset and gain.
So if you use the gain and offset numbers from the driver, your
measurements will be more accurate than if you assume 0 offset and
perfect gain. They will be most accurate if you make sure to
perform a self-calibration once the device is in your system and at the
temperature that your tests will be run. -
I have random excel files on my desktop that cannot be deleted. What are these and how can I trash them?
They appear as mounted DMG files.If you right click on them mdo they have an Eject entry?
Have you set the OS to Show All Files with a terminal command? If so take that off for now.
Look in your Home folder (Users/UserName) and then the Desktop subfolder under it. Do you see all these files/folders/drives? -
WHAT are tokens and how it is issued and how it is viewed and solved by who
WHAT are tokens and how it is issued and how it is viewed and solved by who
points will be awardedHi Jagrut,
If you are talking of support token then,
TOKENs are nothing but the issues faced in the actual live system(Production).
So the end user who is facing will raise it, it will be assigned to the production support team and they will solve it.
Regards,
Atish -
Hi all, Since I updated to Mavericks I am having trouble with Safari showing all the buttons/clickable options, but they are gray and will not work. Specifically, the Trash Can/Delete and the "Move to" folder button simply do not work. Any ideas?
Please post a screenshot that shows what you mean. Be careful not to include any private information.
Start a reply to this message. Click the camera icon in the toolbar of the editing window and select the image file to upload it. You can also include text in the reply.
Maybe you are looking for
-
I can't get Pages 5.01 to open Pages files from iCloud, although they open in iCloud Pages without difficulty. I am using the most up to date version of Mavericks and Pages and can log into iCloud without any problems. Is this just a glitch? The fi
-
Sharing i-tunes on different computers
I want to share my I Tunes library at home with my work computer how do i do that?
-
Gui_download WRITE_FIELD_SEPARATOR = 'X' .
Hi! I am using the fucntion gui_download with the option WRITE_FIELD_SEPARATOR = 'X' ., i am trying to get the same file with the open dataset, i have tried with open dataset in text mode and concatenating the fields with cL_ABAP_CHAR_UTILITIES=>HORI
-
Pictures in iWeb albums disappeared after change location of original files
I created many albums in iWeb by dragging albums from iPhoto. But then I noticed some pictures from my iWeb albums disappeared after the original pictures got removed to another location (or deleted). How can I tell iWeb to make a copy of the picture
-
Does iTunes match include films
Hi Sorry for the Doh query but here goes. Location UK and see music / tv programmes / apps /books can all be re downloaded for some reason film are not displayed. I'm sure I read something saying film could be downlaoded like other purchase's - was t