Solved

Power Usage spike with an AS/400

Posted on 2014-09-04
4
194 Views
Last Modified: 2015-05-04
We have an old (14 year old) AS/400 S20 system that since moved to a new location, has started to use 3 times the amount of power (AC) than at the previous address.... It does not make sense but then again, I don't know AS/400's very well..

Can anybody tell me if there is some logical reason why this could happen?

Any info would be welcome..

Cheers,
Chris
0
Comment
Question by:Chris Ripoll
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 8

Expert Comment

by:Wilder_Admin
ID: 40302888
Does not make any sense to search the mistake on your AS/400 machine. Its a infrastructure problem. Maybe old electrical installation. Its depending on your AC frequence but 3 times can not be. Maybe wrong messured.
0
 
LVL 1

Accepted Solution

by:
Chris Ripoll earned 0 total points
ID: 40303338
As I understand it, this machine has a build-in UPS system with two battery packs. The system will not start if any of the batteries are in a discharged state or have failed. This tells me there is room for something to go wrong. This power usage spike started at about the same time that we had a major battery failure and the battery was at the verge of exploding.

My question is could the charging system inside the 400 be in a faulty state thus consuming excessive power? Are there any simple tests that can be done to very that it is working correctly?

Cheers,
0
 
LVL 8

Expert Comment

by:Wilder_Admin
ID: 40305235
Hi chrisrip,

a ups can only be testetd by an elecrtical guy. He is opening and testing directly.
0
 
LVL 1

Author Closing Comment

by:Chris Ripoll
ID: 40757796
This was the case. Charging system was faulty thus always charging batteries and killing then in the process.
0

Featured Post

Are You Headed to Black Hat USA 2017?

Getting ready for Black Hat next week? Kick things off with the WatchGuard Badge Challenge and test your puzzle and cipher skills. Do you have what it takes to earn our limited edition Firebox Badge? Get started today - https://crimsonthorn.net

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question