287:. Operating systems with specialized file copying APIs are usually able to tell the server to perform the copying locally, without sending file contents over the network, thus greatly improving performance. Those systems that have no comparable APIs, however, have to read the file contents over the network, and then send them back again, over the network. Sometimes, remote file copying is performed with a specialized command, like "NCOPY" in DOS clients for
36:
299:
since 1992, has built-in support for this. An even more complicated situation arises when one needs to copy files between two remote servers. The simple way is to read data from one server, and then to write the data to the second server.
419:
283:
This makes little difference with local files (those on the computer's hard drive), but provides an interesting situation when both the source and target files are located on a remote
212:
behind the shadow operation, this location may be as close as the BIOS chip to the RAM modules, a second harddrive in the same chassis, or as far away as the other side of the globe.
174:
are usually able to tell the server to perform the copying locally, without sending file contents over the network, thus greatly improving performance.
208:
of a set) of data. For shadowing to be effective, the shadow needs to exist in a separate physical location than the original data. Depending on the
462:
384:
269:
119:
628:
372:
860:
57:
100:
671:
329:
53:
72:
455:
280:), others (like Unix and DOS) fall back to simply reading the contents of the old file and writing it to the new file.
805:
604:
79:
514:
46:
812:
431:
616:
241:
155:
86:
817:
524:
509:
448:
387:
865:
68:
644:
832:
747:
681:
504:
721:
711:
661:
339:
716:
706:
599:
292:
839:
592:
368:
795:
688:
676:
654:
519:
221:
151:
785:
737:
135:
93:
204:, but the intent of shadowing within these technologies is to provide an exact copy (or
752:
698:
611:
561:
556:
288:
249:
233:
209:
205:
163:
854:
822:
764:
757:
587:
471:
364:
309:
253:
188:
167:
147:
143:
827:
800:
582:
536:
391:
257:
666:
551:
541:
499:
485:
413:
407:
284:
277:
35:
649:
17:
170:
methods of file copying. Operating systems may have specialized file-copying
27:
Operation which creates a new digital file with contents identical to another
742:
623:
546:
494:
489:
344:
334:
324:
319:
314:
225:
224:
include file copying provisions in the user interface, like the command, "
577:
531:
780:
296:
390:
on 1992-06-22, see COMCPY.C/DOSIF.ASM in the COMMAND.COM sources of
435:
440:
229:
444:
273:
245:
237:
171:
159:
154:
include file copying methods to users; operating systems with
29:
408:
N-level file shadowing and recovery in a shared file system
200:
There are several different technologies that use the term
365:"Caldera OpenDOS Machine Readable Source Kit (M.R.S) 7.01"
268:
Internally, however, while some systems have specialized
260:
applications, too, provide an easy way of copying files.
150:
which has the same content as an existing file. Computer
276:) for copying files (like CopyFile and CopyFileEx in
773:
730:
697:
637:
570:
478:
60:. Unsourced material may be challenged and removed.
192:which has the same content as an existing file.
456:
8:
414:Method of file shadowing among peer systems
463:
449:
441:
120:Learn how and when to remove this message
356:
7:
58:adding citations to reliable sources
432:Instructions on how to shadow files
310:Computer file § Moving methods
270:application programming interfaces
25:
386:(NB. Actually implemented since
34:
375:from the original on 2021-08-07
256:methods of file copying.
45:needs additional citations for
629:Hidden file / Hidden directory
416:, United States Patent 5276871
410:, United States Patent 5043876
1:
672:Filesystem Hierarchy Standard
330:List of file copying software
295:command in some versions of
806:Comparison of file managers
605:List of filename extensions
240:; operating systems with a
882:
813:File system fragmentation
185:is the creation of a new
156:graphical user interfaces
617:Extended file attributes
525:Proprietary file formats
242:graphical user interface
818:File-system permissions
861:Computer file systems
420:Database Shadow Files
833:File synchronization
682:Semantic file system
505:List of file formats
54:improve this article
662:Directory structure
340:NTFS junction point
146:that creates a new
600:Filename extension
248:, usually provide
162:) often providing
848:
847:
840:File verification
593:Filename mangling
520:Open file formats
222:operating systems
152:operating systems
130:
129:
122:
104:
16:(Redirected from
873:
796:Data compression
677:Grid file system
655:Temporary folder
645:Directory/folder
465:
458:
451:
442:
395:
388:DR DOS "Panther"
383:
381:
380:
361:
125:
118:
114:
111:
105:
103:
62:
38:
30:
21:
881:
880:
876:
875:
874:
872:
871:
870:
851:
850:
849:
844:
786:File comparison
769:
738:File descriptor
726:
693:
633:
566:
510:File signatures
474:
469:
428:
404:
402:Further reading
399:
398:
378:
376:
363:
362:
358:
353:
306:
266:
218:
198:
180:
136:file management
126:
115:
109:
106:
63:
61:
51:
39:
28:
23:
22:
15:
12:
11:
5:
879:
877:
869:
868:
863:
853:
852:
846:
845:
843:
842:
837:
836:
835:
830:
820:
815:
810:
809:
808:
798:
793:
788:
783:
777:
775:
771:
770:
768:
767:
762:
761:
760:
755:
745:
740:
734:
732:
728:
727:
725:
724:
719:
714:
709:
703:
701:
695:
694:
692:
691:
686:
685:
684:
679:
674:
664:
659:
658:
657:
652:
641:
639:
635:
634:
632:
631:
626:
621:
620:
619:
612:File attribute
609:
608:
607:
597:
596:
595:
590:
585:
574:
572:
568:
567:
565:
564:
562:Zero-byte file
559:
557:Temporary file
554:
549:
544:
539:
534:
529:
528:
527:
522:
517:
512:
507:
497:
492:
482:
480:
476:
475:
472:Computer files
470:
468:
467:
460:
453:
445:
439:
438:
427:
426:External links
424:
423:
422:
417:
411:
403:
400:
397:
396:
355:
354:
352:
349:
348:
347:
342:
337:
332:
327:
322:
317:
312:
305:
302:
289:Novell NetWare
265:
264:Implementation
262:
250:copy-and-paste
217:
214:
197:
194:
179:
176:
164:copy-and-paste
144:file operation
128:
127:
69:"File copying"
42:
40:
33:
26:
24:
18:File shadowing
14:
13:
10:
9:
6:
4:
3:
2:
878:
867:
866:Copyright law
864:
862:
859:
858:
856:
841:
838:
834:
831:
829:
826:
825:
824:
823:File transfer
821:
819:
816:
814:
811:
807:
804:
803:
802:
799:
797:
794:
792:
789:
787:
784:
782:
779:
778:
776:
772:
766:
765:Symbolic link
763:
759:
756:
754:
751:
750:
749:
746:
744:
741:
739:
736:
735:
733:
729:
723:
720:
718:
715:
713:
710:
708:
705:
704:
702:
700:
696:
690:
687:
683:
680:
678:
675:
673:
670:
669:
668:
665:
663:
660:
656:
653:
651:
648:
647:
646:
643:
642:
640:
636:
630:
627:
625:
622:
618:
615:
614:
613:
610:
606:
603:
602:
601:
598:
594:
591:
589:
588:Long filename
586:
584:
581:
580:
579:
576:
575:
573:
569:
563:
560:
558:
555:
553:
550:
548:
545:
543:
540:
538:
535:
533:
530:
526:
523:
521:
518:
516:
513:
511:
508:
506:
503:
502:
501:
498:
496:
493:
491:
487:
484:
483:
481:
477:
473:
466:
461:
459:
454:
452:
447:
446:
443:
437:
433:
430:
429:
425:
421:
418:
415:
412:
409:
406:
405:
401:
393:
389:
385:
374:
370:
369:Caldera, Inc.
366:
360:
357:
350:
346:
343:
341:
338:
336:
333:
331:
328:
326:
323:
321:
318:
316:
313:
311:
308:
307:
303:
301:
298:
294:
290:
286:
281:
279:
275:
271:
263:
261:
259:
255:
254:drag-and-drop
251:
247:
243:
239:
235:
231:
227:
223:
220:All computer
215:
213:
211:
207:
203:
195:
193:
191:
190:
184:
177:
175:
173:
169:
168:drag-and-drop
165:
161:
157:
153:
149:
145:
141:
137:
132:
124:
121:
113:
110:December 2009
102:
99:
95:
92:
88:
85:
81:
78:
74:
71: –
70:
66:
65:Find sources:
59:
55:
49:
48:
43:This article
41:
37:
32:
31:
19:
828:File sharing
801:File manager
791:File copying
790:
638:Organisation
583:8.3 filename
537:Sidecar file
515:Magic number
392:OpenDOS 7.01
377:. Retrieved
371:1997-05-01.
359:
282:
267:
258:File manager
219:
201:
199:
186:
183:File copying
182:
181:
139:
133:
131:
116:
107:
97:
90:
83:
76:
64:
52:Please help
47:verification
44:
667:File system
552:System file
542:Sparse file
500:File format
486:Binary file
285:file server
278:Windows API
178:Description
134:In digital
855:Categories
774:Management
699:Operations
650:NTFS links
571:Properties
379:2022-01-02
351:References
80:newspapers
743:Hard link
624:File size
547:Swap file
495:Data file
490:text file
345:Zero copy
335:ln (Unix)
325:Hard copy
320:Soft copy
315:Core dump
202:shadowing
748:Shortcut
578:Filename
532:Metafile
373:Archived
304:See also
731:Linking
210:reasons
140:copying
94:scholar
781:Backup
758:Shadow
297:DR-DOS
291:. The
206:mirror
196:Shadow
96:
89:
82:
75:
67:
753:Alias
722:Write
712:Close
479:Types
436:Emacs
244:, or
236:" in
232:and "
228:" in
187:copy
142:is a
101:JSTOR
87:books
717:Read
707:Open
689:Path
434:for
293:COPY
274:APIs
234:COPY
230:Unix
189:file
172:APIs
160:GUIs
148:file
73:news
252:or
246:GUI
238:DOS
216:Use
166:or
56:by
857::
488:/
394:.)
367:.
226:cp
138:,
464:e
457:t
450:v
382:.
272:(
158:(
123:)
117:(
112:)
108:(
98:·
91:·
84:·
77:·
50:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.