File shadowing

File shadowing

There are several different technologies that use the term "file shadowing", but the intent of file shadowing within these technologies is to provide an exact copy (or mirror of a set of data).

For file shadowing to be effective, the shadow needs to exist in a separate physical location than the original data. Depending on the reasons behind the shadow operation, this location may be as close as a second harddrive in the same chassis or as far away as the other side of the globe.

References

* [http://www.freepatentsonline.com/5043876.html N-level file shadowing and recovery in a shared file system] , United States Patent 5043876
* [http://www.freepatentsonline.com/5276871.html Method of file shadowing among peer systems] , United States Patent 5276871
* [http://www.ibexpert.info/documentation/%20%209.%20IBExpert%20Services%20Menu/%20%202.%20Restore%20Database/%20%201.%20Database%20Shadow%20Files/15713.html Database Shadow Files]

External links

* [http://www.gnu.org/software/emacs/manual/html_node/File-Shadowing.html Instructions on how to shadow files] for Emacs
*Linux [http://tldp.org/HOWTO/Shadow-Password-HOWTO.html Shadow Password HOWTO]


Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • Shadowing — may refer to:* File shadowing, to provide an exact copy of or to mirror a set of data * Job shadowing, learning tasks by first hand observation of daily behavior * Projective shadowing, a process by which shadows are added to 3D computer… …   Wikipedia

  • Disk mirroring — In data storage, disk mirroring or RAID1 is the replication of logical disk volumes onto separate physical hard disks in real time to ensure continuous availability. A mirrored volume is a complete logical representation of separate volume copies …   Wikipedia

  • Common Lisp — Paradigm(s) Multi paradigm: procedural, functional, object oriented, meta, reflective, generic Appeared in 1984, 1994 for ANSI Common Lisp Developer ANSI X3J13 committee Typing discipline …   Wikipedia

  • Shadow password — In computing, Unix like operating systems use the shadow password database mechanism to increase the security level of passwords by preventing ordinary users from accessing encrypted password data.Unshadowed passwords On a system without shadowed …   Wikipedia

  • Quake engine — Infobox Software name = Quake engine caption = collapsible = author = developer = id Software released = latest release version = latest release date = latest preview version = latest preview date = frequently updated = programming language = C… …   Wikipedia

  • id Tech 4 — in Doom 3, the engine s parent game. Developer(s) id Software Written in C++ …   Wikipedia

  • Random-access memory — RAM redirects here. For other uses of the word, see Ram (disambiguation). Example of writable volatile random access memory: Synchronous Dynamic RAM modules, primarily used as main memory in personal computers, workstations, and servers …   Wikipedia

  • List of Xbox games compatible with Xbox 360 — This is a list of Xbox games that are compatible with the Xbox 360. Additionally, the manner in which compatibility is achieved and the software errors associated with it are discussed in brief. This list is final as Microsoft confirmed in… …   Wikipedia

  • Unix security — Unix security: maintaining a secure environment on Unix and Unix like operating systems is dependent on design concepts of these operating systems, but vigilance through user and administrative techniques is important to maintain security… …   Wikipedia

  • Microsoft Word — Microsoft Office Word Microsoft Office Word 2010 on Windows 7 …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”