Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How Much.....Cache?

Posted on 1997-03-29
4
Medium Priority
?
229 Views
Last Modified: 2010-04-12
How can I tell how much cache my most demanding
program uses? (the new TX chipsets are limited
to 64megs)
This question *IS* worth more points, but its all
I have right now.
0
Comment
Question by:koko032297
  • 2
  • 2
4 Comments
 
LVL 3

Accepted Solution

by:
nedell earned 180 total points
ID: 1008572
I think you need to rephrase your question.
which cache are you taalking about? should it be 64k?

any real activity is going to max out your cache real quick. thats what its intended for so if you are running any heavy apps it will be almost constantly in use and probably filled.
0
 

Author Comment

by:koko032297
ID: 1008573
"No L2 cache support of more than 64 MB RAM"
This is what I read in a motherboard review w/the new
TX chipset.
0
 

Author Comment

by:koko032297
ID: 1008574
Adjusted points to 63
0
 
LVL 3

Expert Comment

by:nedell
ID: 1008575
the Motherboard has a cache of whatever size (512k is a normal size). this is used to swap program info in and out of ram and is being used constantly as long as you are doing something. The 64MB referred to means that your motherboard will not allow you to use more than 64meg of ram on it. you may be able to add more than that but it wont be recognized or used.
to use up 64meg of ram you will have to have perhaps dozens of programs running at the same time.
0

Featured Post

Enhanced Intelligibility Without Cable Clutter

Challenge: The ESA office in Brussels wanted a reliable audio conference system for video conferences. Their requirement - No participant must be left out from the conference and the audio quality must not be compromised.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Stuck in voice control mode on your Amazon Firestick?  Here is how to turn it off!!!
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
How to fix incompatible JVM issue while installing Eclipse While installing Eclipse in windows, got one error like above and unable to proceed with the installation. This video describes how to successfully install Eclipse. How to solve incompa…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question