Knowledge (XXG)

File copying

Source 📝

287:. Operating systems with specialized file copying APIs are usually able to tell the server to perform the copying locally, without sending file contents over the network, thus greatly improving performance. Those systems that have no comparable APIs, however, have to read the file contents over the network, and then send them back again, over the network. Sometimes, remote file copying is performed with a specialized command, like "NCOPY" in DOS clients for 36: 299:
since 1992, has built-in support for this. An even more complicated situation arises when one needs to copy files between two remote servers. The simple way is to read data from one server, and then to write the data to the second server.
419: 283:
This makes little difference with local files (those on the computer's hard drive), but provides an interesting situation when both the source and target files are located on a remote
212:
behind the shadow operation, this location may be as close as the BIOS chip to the RAM modules, a second harddrive in the same chassis, or as far away as the other side of the globe.
174:
are usually able to tell the server to perform the copying locally, without sending file contents over the network, thus greatly improving performance.
208:
of a set) of data. For shadowing to be effective, the shadow needs to exist in a separate physical location than the original data. Depending on the
462: 384: 269: 119: 628: 372: 860: 57: 100: 671: 329: 53: 72: 455: 280:), others (like Unix and DOS) fall back to simply reading the contents of the old file and writing it to the new file. 805: 604: 79: 514: 46: 812: 431: 616: 241: 155: 86: 817: 524: 509: 448: 387: 865: 68: 644: 832: 747: 681: 504: 721: 711: 661: 339: 716: 706: 599: 292: 839: 592: 368: 795: 688: 676: 654: 519: 221: 151: 785: 737: 135: 93: 204:, but the intent of shadowing within these technologies is to provide an exact copy (or 752: 698: 611: 561: 556: 288: 249: 233: 209: 205: 163: 854: 822: 764: 757: 587: 471: 364: 309: 253: 188: 167: 147: 143: 827: 800: 582: 536: 391: 257: 666: 551: 541: 499: 485: 413: 407: 284: 277: 35: 649: 17: 170:
methods of file copying. Operating systems may have specialized file-copying
27:
Operation which creates a new digital file with contents identical to another
742: 623: 546: 494: 489: 344: 334: 324: 319: 314: 225: 224:
include file copying provisions in the user interface, like the command, "
577: 531: 780: 296: 390:
on 1992-06-22, see COMCPY.C/DOSIF.ASM in the COMMAND.COM sources of
435: 440: 229: 444: 273: 245: 237: 171: 159: 154:
include file copying methods to users; operating systems with
29: 408:
N-level file shadowing and recovery in a shared file system
200:
There are several different technologies that use the term
365:"Caldera OpenDOS Machine Readable Source Kit (M.R.S) 7.01" 268:
Internally, however, while some systems have specialized
260:
applications, too, provide an easy way of copying files.
150:
which has the same content as an existing file. Computer
276:) for copying files (like CopyFile and CopyFileEx in 773: 730: 697: 637: 570: 478: 60:. Unsourced material may be challenged and removed. 192:which has the same content as an existing file. 456: 8: 414:Method of file shadowing among peer systems 463: 449: 441: 120:Learn how and when to remove this message 356: 7: 58:adding citations to reliable sources 432:Instructions on how to shadow files 310:Computer file § Moving methods 270:application programming interfaces 25: 386:(NB. Actually implemented since 34: 375:from the original on 2021-08-07 256:methods of file copying.  45:needs additional citations for 629:Hidden file / Hidden directory 416:, United States Patent 5276871 410:, United States Patent 5043876 1: 672:Filesystem Hierarchy Standard 330:List of file copying software 295:command in some versions of 806:Comparison of file managers 605:List of filename extensions 240:; operating systems with a 882: 813:File system fragmentation 185:is the creation of a new 156:graphical user interfaces 617:Extended file attributes 525:Proprietary file formats 242:graphical user interface 818:File-system permissions 861:Computer file systems 420:Database Shadow Files 833:File synchronization 682:Semantic file system 505:List of file formats 54:improve this article 662:Directory structure 340:NTFS junction point 146:that creates a new 600:Filename extension 248:, usually provide 162:) often providing 848: 847: 840:File verification 593:Filename mangling 520:Open file formats 222:operating systems 152:operating systems 130: 129: 122: 104: 16:(Redirected from 873: 796:Data compression 677:Grid file system 655:Temporary folder 645:Directory/folder 465: 458: 451: 442: 395: 388:DR DOS "Panther" 383: 381: 380: 361: 125: 118: 114: 111: 105: 103: 62: 38: 30: 21: 881: 880: 876: 875: 874: 872: 871: 870: 851: 850: 849: 844: 786:File comparison 769: 738:File descriptor 726: 693: 633: 566: 510:File signatures 474: 469: 428: 404: 402:Further reading 399: 398: 378: 376: 363: 362: 358: 353: 306: 266: 218: 198: 180: 136:file management 126: 115: 109: 106: 63: 61: 51: 39: 28: 23: 22: 15: 12: 11: 5: 879: 877: 869: 868: 863: 853: 852: 846: 845: 843: 842: 837: 836: 835: 830: 820: 815: 810: 809: 808: 798: 793: 788: 783: 777: 775: 771: 770: 768: 767: 762: 761: 760: 755: 745: 740: 734: 732: 728: 727: 725: 724: 719: 714: 709: 703: 701: 695: 694: 692: 691: 686: 685: 684: 679: 674: 664: 659: 658: 657: 652: 641: 639: 635: 634: 632: 631: 626: 621: 620: 619: 612:File attribute 609: 608: 607: 597: 596: 595: 590: 585: 574: 572: 568: 567: 565: 564: 562:Zero-byte file 559: 557:Temporary file 554: 549: 544: 539: 534: 529: 528: 527: 522: 517: 512: 507: 497: 492: 482: 480: 476: 475: 472:Computer files 470: 468: 467: 460: 453: 445: 439: 438: 427: 426:External links 424: 423: 422: 417: 411: 403: 400: 397: 396: 355: 354: 352: 349: 348: 347: 342: 337: 332: 327: 322: 317: 312: 305: 302: 289:Novell NetWare 265: 264:Implementation 262: 250:copy-and-paste 217: 214: 197: 194: 179: 176: 164:copy-and-paste 144:file operation 128: 127: 69:"File copying" 42: 40: 33: 26: 24: 18:File shadowing 14: 13: 10: 9: 6: 4: 3: 2: 878: 867: 866:Copyright law 864: 862: 859: 858: 856: 841: 838: 834: 831: 829: 826: 825: 824: 823:File transfer 821: 819: 816: 814: 811: 807: 804: 803: 802: 799: 797: 794: 792: 789: 787: 784: 782: 779: 778: 776: 772: 766: 765:Symbolic link 763: 759: 756: 754: 751: 750: 749: 746: 744: 741: 739: 736: 735: 733: 729: 723: 720: 718: 715: 713: 710: 708: 705: 704: 702: 700: 696: 690: 687: 683: 680: 678: 675: 673: 670: 669: 668: 665: 663: 660: 656: 653: 651: 648: 647: 646: 643: 642: 640: 636: 630: 627: 625: 622: 618: 615: 614: 613: 610: 606: 603: 602: 601: 598: 594: 591: 589: 588:Long filename 586: 584: 581: 580: 579: 576: 575: 573: 569: 563: 560: 558: 555: 553: 550: 548: 545: 543: 540: 538: 535: 533: 530: 526: 523: 521: 518: 516: 513: 511: 508: 506: 503: 502: 501: 498: 496: 493: 491: 487: 484: 483: 481: 477: 473: 466: 461: 459: 454: 452: 447: 446: 443: 437: 433: 430: 429: 425: 421: 418: 415: 412: 409: 406: 405: 401: 393: 389: 385: 374: 370: 369:Caldera, Inc. 366: 360: 357: 350: 346: 343: 341: 338: 336: 333: 331: 328: 326: 323: 321: 318: 316: 313: 311: 308: 307: 303: 301: 298: 294: 290: 286: 281: 279: 275: 271: 263: 261: 259: 255: 254:drag-and-drop 251: 247: 243: 239: 235: 231: 227: 223: 220:All computer 215: 213: 211: 207: 203: 195: 193: 191: 190: 184: 177: 175: 173: 169: 168:drag-and-drop 165: 161: 157: 153: 149: 145: 141: 137: 132: 124: 121: 113: 110:December 2009 102: 99: 95: 92: 88: 85: 81: 78: 74: 71: –  70: 66: 65:Find sources: 59: 55: 49: 48: 43:This article 41: 37: 32: 31: 19: 828:File sharing 801:File manager 791:File copying 790: 638:Organisation 583:8.3 filename 537:Sidecar file 515:Magic number 392:OpenDOS 7.01 377:. Retrieved 371:1997-05-01. 359: 282: 267: 258:File manager 219: 201: 199: 186: 183:File copying 182: 181: 139: 133: 131: 116: 107: 97: 90: 83: 76: 64: 52:Please help 47:verification 44: 667:File system 552:System file 542:Sparse file 500:File format 486:Binary file 285:file server 278:Windows API 178:Description 134:In digital 855:Categories 774:Management 699:Operations 650:NTFS links 571:Properties 379:2022-01-02 351:References 80:newspapers 743:Hard link 624:File size 547:Swap file 495:Data file 490:text file 345:Zero copy 335:ln (Unix) 325:Hard copy 320:Soft copy 315:Core dump 202:shadowing 748:Shortcut 578:Filename 532:Metafile 373:Archived 304:See also 731:Linking 210:reasons 140:copying 94:scholar 781:Backup 758:Shadow 297:DR-DOS 291:. The 206:mirror 196:Shadow 96:  89:  82:  75:  67:  753:Alias 722:Write 712:Close 479:Types 436:Emacs 244:, or 236:" in 232:and " 228:" in 187:copy 142:is a 101:JSTOR 87:books 717:Read 707:Open 689:Path 434:for 293:COPY 274:APIs 234:COPY 230:Unix 189:file 172:APIs 160:GUIs 148:file 73:news 252:or 246:GUI 238:DOS 216:Use 166:or 56:by 857:: 488:/ 394:.) 367:. 226:cp 138:, 464:e 457:t 450:v 382:. 272:( 158:( 123:) 117:( 112:) 108:( 98:· 91:· 84:· 77:· 50:. 20:)

Index

File shadowing

verification
improve this article
adding citations to reliable sources
"File copying"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
file management
file operation
file
operating systems
graphical user interfaces
GUIs
copy-and-paste
drag-and-drop
APIs
file
mirror
reasons
operating systems
cp
Unix
COPY
DOS
graphical user interface

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.