- File shadowing
There are several different technologies that use the term "file shadowing", but the intent of file shadowing within these technologies is to provide an exact copy (or mirror of a set of data).
For file shadowing to be effective, the shadow needs to exist in a separate physical location than the original data. Depending on the reasons behind the shadow operation, this location may be as close as a second harddrive in the same chassis or as far away as the other side of the globe.
References
* [http://www.freepatentsonline.com/5043876.html N-level file shadowing and recovery in a shared file system] , United States Patent 5043876
* [http://www.freepatentsonline.com/5276871.html Method of file shadowing among peer systems] , United States Patent 5276871
* [http://www.ibexpert.info/documentation/%20%209.%20IBExpert%20Services%20Menu/%20%202.%20Restore%20Database/%20%201.%20Database%20Shadow%20Files/15713.html Database Shadow Files]External links
* [http://www.gnu.org/software/emacs/manual/html_node/File-Shadowing.html Instructions on how to shadow files] for
Emacs
*Linux [http://tldp.org/HOWTO/Shadow-Password-HOWTO.html Shadow Password HOWTO]
Wikimedia Foundation. 2010.