This paper describes a general-purpose file system that … to be modified a number of times before … made at any time without limiting the users' … a second read-only file system, do not contain … event that the disk cache is destroyed. The … at AT&T Bell Laboratories. … [p. 1290] At the user's request, the file system … A consistent snapshot of the file system appears … For the user's perspective, the entire back-up procedure … [p. 1292] After a file is opened, a copy-on-write … write to either a dump [cached, read- only] or a … [WORM] … [cached] block is allocated and substituted using the same procedure as … [This procedure ensures that modified data resides in write blocks.] … [p. 1298] A problem arises when the WORM becomes … fill one of our optical disk juke-boxes. …
Google-1
Google-2
Copyright clearance needed for quotation.