||This article is written like a personal reflection or opinion essay that states a Wikipedia editor's personal feelings about a topic. (January 2017) (Learn how and when to remove this template message)|
||This article includes a list of references, related reading or external links, but its sources remain unclear because it lacks inline citations. (January 2017) (Learn how and when to remove this template message)|
There are several different technologies that use the term file shadowing, but the intent of file shadowing within these technologies is to provide an exact copy (or mirror of a set) of data.
For file shadowing to be effective, the shadow needs to exist in a separate physical location than the original data. Depending on the reasons behind the shadow operation, this location may be as close as a second harddrive in the same chassis or as far away as the other side of the globe.
- N-level file shadowing and recovery in a shared file system, United States Patent 5043876
- Method of file shadowing among peer systems, United States Patent 5276871
- Database Shadow Files
|This computer-storage-related article is a stub. You can help Wikipedia by expanding it.|