Reading of temperature for the use of Thinkpad T510

Hi all

I have a question about the standard temperature / acceptable range for computers thinkpad t510 operation. My setup is currently my t510 is connected to an external monitor, speakers, keyboard and mouse. Therefore basically a desktop computer except using the innerds of the laptop as the "heart" of the system. My power manager put the CPU to adapt. The temperature readings that I get for the processor and the motherboard download the program called of Piriform Speccy are on average 60 to 61 degrees C. I wonder if it is within the normal temperature of operation for the laptop and if it is acceptable. What is the temperature not okay and why it is so high, it's that I use external references. Also, I even use heavy workload for the laptop and more for the web, browsing and listening to music and work on documents / spread sheet so basically, office work.

And finally, the problem of temperature would resolve if I would in the future to get a computer laptop w530 since these laptops are more "powerful"? Or is that evil and the temperature is normal.

Thanks in advance for answers

unit88888888 wrote:

The temperature readings that I get for the processor and the motherboard download the program called of Piriform Speccy are on average 60 to 61 degrees C. I wonder if it is within the normal temperature of operation for the laptop and if it is acceptable.

Yes ~ 60 ° C is quite normal. I would get concerned if temperature readings consistently exceeded 80 c or if the fan was constantly. Otherwise you will see the temperature fluctuates as activity processor and graphics vary.

Tags: ThinkPad Notebooks

Similar Questions

  • How will I know if I am being charged for the use of data on the mini2 ipad

    How will I know if I am to be charged or billed for usage on my ipad mini data 2?

    Hello

    You can be charged for the use of data on an ipad, if it has a SIM card

    Cellular data.

    If your home wifi is unlimited you will not be charged more.

    Unless your WiFi has a hat of data ie download limit.

    See you soon

    Brian

  • The function 'read' is available for the iPhone 6 too?

    The function 'read' is available for the iPhone 6 too? the iPhone 6 has the option that he read the information highlighted, but I don't know how to put in place on the new phone.

    Looks like you describe talk about selection. To activate that go to settings > general > accessibility > speech. -AJ

  • I need the scanner for hp officejet 4215 for the use of scan software

    I need the scanner software for hp officejet 4215 for the use of scan and when I press the scan button on the printer know any software to scan function.

    Hello

    Please use the following link:

    http://h10025.www1.HP.com/ewfrf/wc/softwareCategory?cc=us&LC=en&DLC=en&product=351106

    Kind regards.

  • not able to install the driver mx NIDAQ (for the use of USB-6008) in my laptop, NIDAQ902f0? any solution...

    I am not able to install driver of mx NIDAQ (for the use of USB-6008) in my laptop,... well NIDAQ902f0 want to give any suggestion...

    Following message comes when I run the Setup... (installation program downloaded from the website OR..)

    Runtime error:

    This application has requested to terminate in an unusual way.

    Please contact the application support is more information.

    Title of the dialog box is "Microsoft Visual C++ runtime library"

    Is the same when NIDAQmx 7.5 is tried to install from the CD that came with the USB-6008.

    Double post

  • Is it safe to use Safe Mod with networking for the use of the computer every day?

    Hi, my computer has problems to start normally and I was wondering, is it safe to use Safe Mod with networking for the use of the computer every day? I use the computer like 10 hours + every day. Is this correct and safe? Thank you

    Hello, Winston,

    It is actually for troubleshooting only.

    Networking Mode safe mode starts Windows in mode safe mode and includes the network drivers and services needed to access the Internet or other computers on your network.

    Some applications may not work properly or not at all if you use safe mode with networking for everyday computing.

    Wireless network adapter may not work when you use the Option "Safe Mode with network.

    http://support.Microsoft.com/kb/305616

    Safe mode disables most of the processes and services running. These services include the Windows Update service. »

  • Is the function of automatic update of Windows found in the use of control panel of your compensation for the use of the Internet from my ISP?

    Original title: Windows updates

    Is the function of automatic update of Windows found in the use of control panel of your compensation for the use of the Internet from my ISP? If so, how? In addition, how to hide an update, I don't want to? For example, I use (and I'm happy with) Windows Internet Explorer (v7), but receive reminders to update update to Internet Explorer v9, which I don't want.

    Is there a way to prevent Windows Update for sending this reminder in the future?

    Geoff

    Hide and Yes will use you PSI data usage. It depends on how much the updates install you, on the amount of data it uses

  • Type of license for the use of Veritas Backup exec with the unit?

    Nobody knows the type of license (or order number) for the use of Veritas Backup exec with the unit?

    The customer is already using the product widely in their networks, which is the license includes?

    Thank you.

    HI -.

    We use Veritas for the backup device. You will need to contact your representative of Veritas for license information - it is not provided by Cisco. Since the unit running SQL (or MSDE 2000), you will need SQL Veritas agent to back up OPEN files. We do not use dirt, but only for the backup device before performing the upgrades. And we also to break the mirror set beforehand. http://www.Cisco.com/en/us/customer/products/SW/voicesw/ps2237/products_maintenance_guide_chapter09186a0080443809.html#wp1073824

    Ginger

  • Does anyone have a solution for the use of Bible Illustrator 3.0 MS8 and MS7

    Original title: program programs Application Applications compatibility.

    Does anyone have a solution for the use of Bible Illustrator 3.0 MS8 and MS7

    What are the requirements of system for this program?

    What version of Windows it says on the package, it was designed for?

    If its designed for an earlier version of Windows such as Windows 95 or Windows 98 or XP, then it is probably incompatible with Windows 8.

    If the product packaging indicates anything in the 1990s OR early 2000s, I am afraid that this is not something that is guaranteed to work with Windows 8.

    You can try the following average time.

    Point to the installation files where they are.

    Right-click on the configuration file, and then click "troubleshoot compatibility".

    Wait, it detects the problem.

    Click on the option "worked in an earlier version of Windows.

    Select Windows 7 RTM or better Windows Vista SP2

    Click next

    Click Start the program, wait, it installs

    When the installation is complete, click Finish and save the settings.

  • What is the main reason for the use of SERIALLY_REUSABLE in your package?

    Hi Experts,

    What is the main reason for the use of SERIALLY_REUSABLE in your package?

    At first glance, the most popular reason seems that some developers forget to close cursors. Therefore, it is a good way to close automatically when your code is stopped during the same session.

    Second, if your business rules require that package variables still need to put the SERIALLY_REUSABLE default values is good for this.

    So, what's your reason?

    Thanks in advance.

    From http://docs.oracle.com/database/121/LNPLS/packages.htm#LNPLS99924:

    After the unit of work (call Server) a SERIALLY_REUSABLE complete package, Oracle database performs the following operations:

    • Closes all open cursors.
    • No free memory (for example, memory for collection and long VARCHAR2 variables)
    • Returns the instantiation of the package to the collection of reusable instantiations kept for this package.

    Explicit cursors in SERIALLY_REUSABLE packages:

    http://docs.Oracle.com/database/121/LNPLS/packages.htm#LNPLS99923

    I would not support using SERIALLY_REUSABLE instead of programming and the cursor's lifecycle management practices.

    > What is the main reason for the use of SERIALLY_REUSABLE in your package?

    If your package uses large amounts of memory in the State, especially in a multiuser environment heavy wherever the memory usage adds up and memory will not clean until the session is closed and the State is not held beyond the call to the package, then there's your use case.

  • I bought my free membership of creative cloud and installation of office for the use of the Institution. But accidentally uninstalled and deleted the program files. Now I can't update my apps and have to pay for the installation of creative cloud

    I bought my free membership of creative cloud and installation of office for the use of the Institution. But accidentally uninstalled and deleted the program files. Now I can't update my apps and will pay for the installation of creative cloud. What should I do?

    Reinstall the cc desktop application, https://creative.adobe.com/products/creative-cloud

  • All of the fonts that come with Dreamweaver CS6 are licensed for the use of the web?

    All of the fonts that come with Dreamweaver CS6 are licensed for the use of the web?

    I also have Creative Suite 5, which I think is delivered with a set of Adobe Fonts. These are all licensed?

    A license?  Yes, but not necessarily for the web. Some licenses permit use on paper or images but not the web.

    For legal reasons don't assume that you can use any font you want on the web. Fonts are protected by the intellectual property laws in the same way that software is protected against illegal copy, modify or distribute. In other words, an owner of fonts can of course, saying "you can use my font, but you cannot change it, you can not reproduce and you may not distribute." On the web, which is a deal breaker, because you must be able to do all three.

    These font families are common to most Windows/Mac systems.

    Adobe Edge and TypeKit Web fonts are licensed for use on the web.

    Nancy O.

  • Can we ignore alarm for the use of the disc on the disc?

    Hello

    There is a data store of close to 2 TB, assigned to a cluster of servers ESXi 5.

    We performed P2V to a number of physical hosts and now only get about 80 GB of free space left.  And we get an alarm for the use of the disc on the disc.

    We wonder if it will be a problem to keep only 80 GB of free space on the disk (we will not add another VM in this datatsore more in the future).

    Your opinion is requested.

    Thank you

    Yes. Veeam - as well as other applications of image - based backup creates a temporary while backup it VMs. depending on the activity of the drive of the guest during this time the snapshot could develop and fill the instant capture data store. More you customers backup simultaneously more risk. Unfortunately there is no rule on the amount of space free disk is needed, but the 80 GB seem to be really low. With a 2 TB data store, I suggest that book you at least 10% (preferably more) for snapshots.

    In addition to this, you need to monitor the disk space on a case where something goes wrong with a backup and snapshot cannot be cleaned automatically!

    André

  • vSpere 5 Networking of best practices for the use of 4 to 1 GB NIC?

    Hello

    I'm looking for a networking of best practices for the use of 4-1 GB NIC with vSphere 5. I know there are a lot of good practice using 10 GB, but our current config does support only 1 GB. I need to include the management, vMotion, Virtual Machine (VM) and iSCSi. If there are others you would recommend, please let me know.

    I found a diagram that resembles what I need, but it's for 10 GB. I think it works...

    vSphere 5 - 10GbE SegmentedNetworks Ent Design v0_4.jpg(I had this pattern HERE - rights go to Paul Kelly)

    My next question is how much of a traffic load is each object take through the network, percentage wise?

    For example, 'Management' is very small and the only time where it is in use is during the installation of the agent. Then it uses 70%.

    I need the percentage of bandwidth, if possible.

    If anyone out there can help me, that would be so awesome.

    Thank you!

    -Erich

    Without knowing your environment, it would be impossible to give you an idea of the uses of bandwidth.

    That said if you had about 10-15 virtual machines per host with this configuration, you should be fine.

    Sent from my iPhone

  • What is the procedure for the use of two monitors?

    What is the procedure for the use of two monitors?

Maybe you are looking for

  • When entering the product key for Windows XP I receiver a mistake: the product id you entered is not valid.

    my old hard drive crashed completely gone I am trying to reinstall windows xp on the new drive same computer I have the same his invalid product key (I do not have the office yet) what should I do? is there a number I can call, and that does not cost

  • Spoil the Walkman application

    I have implemented a review with the new Walkman, the game of Google app update, but I feel very strongly about and wanted to address here also to make sure that my point of view gets. The worst mistake that could be made with the update of the app f

  • What is the ceip

    need help with the process running on my laptop, taking control of the laptop

  • BB10 Alpha connect no no DM on Mac

    Just picked up the BB10 peripheral Alpha to KW jam yesterday, but were unable to connect to DM on Mac to get the update. Everyone knows this? Error message: unable to connect with this device... bla blah blah blah the BlackBerry Desktop Software and

  • How can I judge an incoming or an outgoing call?

    Hi all. How can I judge an incoming or an outgoing call? I use PhoneCallLog phoneLog = (PhoneCallLog) logs.callAt (i, PhoneLogs.FOLDER_NORMAL_CALLS); phoneLog.getParticipant () .getName (); Can I get the name of the call but do not know if this is an