The power of Z9 mining machine is high and low
蚂蚁T9+超频、T9超频、S9超频、S9I超频、E3超频、L3+超频、不变功率的研究
先放开源的代码,有能力者可以研究下https://github.com/vavavivi/AntMinerStats
文章所用工具与命令也在网络盘.
wget http://198.13.49.55/statov && chmod 777 statov && ./statov
According to the statistics of Tencent Research Institute, since 2012, the amount of investment in the field of artificial intelligence has shown a very steep growth trend. The turning point is the breakthrough of deep learning technology, as well as the rapid development of hardware computing power and big data“ "Cultural instry + artificial intelligence" is the process of artificial intelligence technology's deep penetration and application into the cultural field. It is also the direction of enhancing the added value of cultural science and technology, and improving the digitization and intellectualization of cultural procts
in addition, technological innovation drives the revolutionary development of the cultural instry, from newspapers to television, to the Internet and mobile Internet, and has entered the era of AI so far. Cultural communication, cultural management and cultural marketing are deeply affected
With the continuous development of pure electric vehicle instry in recent years, the ownership is also increasing. For pure electric vehicles, the important way of energy supplement depends on the charging pile. But when many friends use the public charging point, they find that the displayed charging power is sometimes high and sometimes low. What's the reason for this
In addition to the difference in peak power consumption, the power displayed by the charging point is also closely related to the performance of the charging point itself and the power battery. Although the common charging pile generally adopts the DC charging mode, the DC power can be directly stored in the power battery. However, if the performance of the public charging point itself is unstable, or the power battery itself fails, then the power ring charging will also be affectedconclusion: the charging power displayed by the public charging point is high and low, which has a certain relationship with the voltage and current. In addition, it is also related to the performance of the charging point and the state of the battery. What do you think
this article comes from the author of car home, which does not represent the standpoint of car home
if the following abnormal conditions occur in the csrss process, then your computer is likely to be poisoned. Even if measures are taken, it will affect the security of the operating system and the network
1. When multiple csrss processes appear in the task manager. In general, only one csrss process can appear in the operating system. Although the csrss process is necessary, it is not that more is better. When the process in the task manager shows that there are multiple csrss processes, then your operating system is compromised
2. When the user name of csrss process is not system, and the path of its running mole is not under system32 folder, you should be careful. It is very likely that your computer has become a broiler in the eyes of hackers, and has become a hidden danger affecting enterprise network security
3. When csrss virus appears in the early seven versions of Microsoft, such as 98 system or winme operating system, it also indicates that this process is a problem process. Because csrss process is the proct of Microsoft operating system after 2000. In previous operating systems, there was no such process. Unfortunately, if this process is found in previous versions of the operating system, it is definitely a virus
solution
if csrss is caused by Trojan horse, then csrss is a small script program. Now many Trojans will use this process, such as QQ Trojan horse, legendary number stealing Trojan horse, MSN Trojan horse, email account Trojan horse and so on. In these Trojans, the general operating system itself will not have a lot of reflection, the speed of the system is normal, so more hidden. However, the harm is great. It will leak some accounts of the enterprise, such as VPN user name and password, instant messaging tools and passwords, and bring great hidden danger to the network security of the enterprise
in this case, we should take the following measures:
1. Delete the process through the registry. Because the Trojan disguises the process as a system process, when trying to end the process through the task manager, the system will prompt an error message, telling the process that the system process cannot be stopped. Therefore, you can only delete this process through the registry manager. Note that the original process of the system should not be deleted. Therefore, it is recommended to make a backup before modifying the registry
2. Then view the system path of the running process. After deleting the process from the registry, the process cannot be found in the process in task manager. At this point, find its original running path, we can see that there is a csrss executable. Note that as long as it is not system32, others can be deleted. We can also query this file through the search function of the system. Delete all csrss files that are not in the system32 directory
3. For the sake of safety, upgrade our anti-virus software or search for special killing tools on the Internet to comprehensively check and kill our system. After the virus is killed, the patch should be patched in time to prevent the next time you are accidentally hit again.
this may be caused by the instability of your network. It is suggested that you check whether there is packet loss in your network and restart the relevant Internet devices
hope to help you