wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Caching windows

profile
Dev Sheta
Sep 10, 2024
0 Likes
0 Discussions
96 Reads

• The Windows cache improves the performance of file systems by keeping

recently and frequently used regions of files in memory

• The cached regions of files are called views because they represent regions of

kernel virtual addresses that are mapped onto file-system files.

• Thus, the actual management of the physical memory in the cache is provided

by the memory manager.

• The role of the cache manager is to manage the use of kernel virtual addresses

for views, arrange with the memory manager to pin pages in physical memory,

and provide interfaces for the file systems

• The Windows cache-manager facilities are shared among all the file systems.

• Because the cache is virtually addressed according to individual files, the cache

manager is easily able to perform read-ahead on a per-file basis.


Comments ()


Sign in

Read Next

Real time scheduling

Blog banner

Life of a 2020-2021 student

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

MUTUAL EXCLUSION

Blog banner

Scheduling

Blog banner

The Laws of Karma

Blog banner

Multicore and Multithreading

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

Modern operating system

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Modern Operating System

Blog banner

Why am I never satisfied with my Life?

Blog banner

Jira Software

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Multiprocessor

Blog banner

Cyber Security Control

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Security issues

Blog banner

Google App Engine

Blog banner

Big Data Architecture

Blog banner

To travel is to live

Blog banner

DATA WRANGLING

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Hacking Mobile Platforms

Blog banner

Modern operating system

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Animal’s have my heart

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Memory Management

Blog banner

Virtual memory

Blog banner

Objectives and Functions of Operating System

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

How Men and Women Process Pain Differently

Blog banner

Malware Defense

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Article on IT development trends

Blog banner

CoWIN

Blog banner