摘要:
Automatic file replication and scanning for malware in a sharing environment is based on detection of file system changes. Only one client of the multi-client environment needs to include malware protection software for all clients to benefit. A file replication service for each client monitors a shared directory, and synchronizes files across clients at the file system driver level. When a new file appears in the shared directory of a client system, through this driver, the new file automatically gets replicated. A malware protection component operates by monitoring the directory for new or modified files. File replication causes automatic malware scanning on the client that has protection. When the file has been cleaned and re-written to the directory, the replication service senses that the file has changed and replicates the cleaned file to the other clients. Thus, the replication behavior produces a multiparty file scanning and cleansing protection scheme.
摘要:
Automatic file replication and scanning for malware in a sharing environment is based on detection of file system changes. Only one client of the multi-client environment needs to include malware protection software for all clients to benefit. A file replication service for each client monitors a shared directory, and synchronizes files across clients at the file system driver level. When a new file appears in the shared directory of a client system, through this driver, the new file automatically gets replicated. A malware protection component operates by monitoring the directory for new or modified files. File replication causes automatic malware scanning on the client that has protection. When the file has been cleaned and re-written to the directory, the replication service senses that the file has changed and replicates the cleaned file to the other clients. Thus, the replication behavior produces a multiparty file scanning and cleansing protection scheme.
摘要:
A block based backup system may store backed up data from multiple clients by maintaining backup databases for each client, where each backup database may include blocks of data. The backup system may perform a de-duplication process by examining the databases to identify common blocks and moving the common blocks to a common database. The common blocks may be removed from the client backup databases and a pointer substituted for the data, thus compacting the client backup databases. The de-duplication operation may be performed at an opportunistic time, such as after the clients have completed any data transfer to the backup system.
摘要:
Aspects of the subject matter described herein relate to replicating initial content in resource replication systems. In aspects, each member participating in a replica group obtains a content set state from a directory service. The content set state indicates whether the member is allowed to synchronize resources with another member participating in the replica group. If the member is designated as a primary member, the member may replicate out resources to its downstream partners. If a member is not designated as a primary member, the member may not replicate out resources to its downstream partners until it has successfully synchronized resources with an upstream partner. Fence values may be set which control which resources win (and are replicated out) during synchronization.
摘要:
Aspects of the subject matter described herein relate to replicating resources across machines participating in a replica set. In aspects, a downstream machine requests that an upstream machine notify the downstream machine when updates to resources of the replica set occur. When such updates occur, the upstream machine notifies the downstream machine. In response thereto, the downstream machine requests resource meta-data and may include a limit as to how much resource meta-data may be sent. The upstream machine responds with the requested resource meta-data. Thereafter, the downstream machine determines which data associated with the updated resources to request and requests such data.
摘要:
A ghosting filter on a computing device receives a read command for a requested range of data of a ghosted file. The requested range is categorized into first segments present in the ghosted file, second segments pending to be reconstituted from an alternate location to the ghosted file, and third segments that are not first or second segments. Reconstitution of any third segments is initiated to convert same to second, pending segments, and the read command is responded to with the requested range of the data once all second segments are in fact reconstituted from the alternate location to the ghosted file and thus converted to first, pending segments.
摘要:
Files on a computing device are defined to include data and metadata relating to the data. Data from each file has been removed therefrom and stored at an alternate location and the file is in a reduced, ghosted form. Each of at least some ghosted files has been fully or partially reconstituted for use by retrieving the data thereof from the alternate location and associating such retrieved data with such ghosted file to form the reconstituted file. Upon receiving a trigger based on a triggering event, files are selected from among the fully and partially reconstituted files and never-ghosted files based on first predetermined selection criteria, and each of at least some of the selected files are re-ghosted.
摘要:
A block based backup system may store backed up data from multiple clients by maintaining backup databases for each client, where each backup database may include blocks of data. The backup system may perform a de-duplication process by examining the databases to identify common blocks and moving the common blocks to a common database. The common blocks may be removed from the client backup databases and a pointer substituted for the data, thus compacting the client backup databases. The de-duplication operation may be performed at an opportunistic time, such as after the clients have completed any data transfer to the backup system.
摘要:
Files on a computing device are defined to include data and metadata relating to the data. Data from each file has been removed therefrom and stored at an alternate location and the file is in a reduced, ghosted form. Each of at least some ghosted files has been fully or partially reconstituted for use by retrieving the data thereof from the alternate location and associating such retrieved data with such ghosted file to form the reconstituted file. Upon receiving a trigger based on a triggering event, files are selected from among the fully and partially reconstituted files and never-ghosted files based on first predetermined selection criteria, and each of at least some of the selected files are re-ghosted.
摘要:
Aspects of the subject matter described herein relate to resource replication systems. In aspects, a mechanism is described that detects when local resources are stale. Local resources may be stale when the time between a last successful synchronization activity and a current time exceeds a staleness value. If the local resources are determined to be stale, the local member may refrain from certain synchronization activities until the local member is allowed to resume these certain synchronization activities. If the local resources are not stale, additional synchronization activities including synchronizing resources between the member and an upstream or downstream partner may be performed.