wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Caching windows

profile
Dev Sheta
Sep 10, 2024
0 Likes
0 Discussions
96 Reads

• The Windows cache improves the performance of file systems by keeping

recently and frequently used regions of files in memory

• The cached regions of files are called views because they represent regions of

kernel virtual addresses that are mapped onto file-system files.

• Thus, the actual management of the physical memory in the cache is provided

by the memory manager.

• The role of the cache manager is to manage the use of kernel virtual addresses

for views, arrange with the memory manager to pin pages in physical memory,

and provide interfaces for the file systems

• The Windows cache-manager facilities are shared among all the file systems.

• Because the cache is virtually addressed according to individual files, the cache

manager is easily able to perform read-ahead on a per-file basis.


Comments ()


Sign in

Read Next

Distributed Denial of Service (DDoS) attack

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Asana

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

OS Evolution Achievements

Blog banner

All you need to know about Cassandra

Blog banner

Deadlock

Blog banner

Number Guessing game --lisp

Blog banner

The Five Steps of Data Science

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Life lesson

Blog banner

ODOO

Blog banner

UniProcessor Scheduling

Blog banner

Memory Management

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Why Progressive Web Apps (PWAs) Are Replacing Traditional Websites

Blog banner

Service Operations in ITSM

Blog banner

BUFFER OVERFLOW_142

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

MySQL

Blog banner

SQL Injection practice on DVWA

Blog banner

"Audit" In Data Science

Blog banner

Explain Kernel in OS

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Layers Of Blockchain

Blog banner

Types of email

Blog banner

Security requirements for Safe E-Payments

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Data Structures

Blog banner

"Games and the future"

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

PODIO

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Multiple processor scheduling

Blog banner

Memory Management

Blog banner

Firewall

Blog banner

Service Validation and Testing during the Design Phase

Blog banner