|Disk Shadow Features|
SolarSys Disk Shadow (and the sister product Notebook Shadow) is designed to provide complete and reliable backup and sychronisation for laptop PCs, desktop PCs and servers. It can handle your backup requirements automatically by operating unobtrusively in the background while you continue to work.
You create your work - Disk Shadow makes sure you dont lose it.
Disk Shadow has many features that are particularly relevant to mobile executives as it can cope with changing environments:
This document gives a summary of the key features of Disk Shadow. [ contents ]
SolarSys Disk Shadow will backup files in one or more folders. Sub-folders can be included or excluded. This is useful if you want to have your work backed up in one direction from your PC to a backup device or server. You can compress your backup files to save space by using Shadow's WinZip compatible compression feature. [ contents ]
Two or more folders can be synchronised so that the latest version of a file always exists in both folders regardless of where the change was made. Sub-folders can be included or excluded.
This is useful if you sometimes work on files that are located on an office server, for example, and sometimes on files located on your PC. If you use two way synchronisation both the server and your PC will be kept up-to-date.
You can also force two or more folders to be identical including deleting files from the destination folder that do not exist on the source folder. [ contents ]
Within Disk Shadow, we refer to both backups and sychronisation by the general term Shadowing. [ contents ]
Source files represent the files you wish to backup or synchronise. To define a source you simply add a new line to the list of Files to shadow that contains the path and file name(s) of the file(s). A browse feature is provided or you can simply drag and drop a folder or file off explorer onto Disk Shadow and your backup will be configured.
For example, a source could be c:\My Documents\*.*. This represents all the files in the folder My Documents. You can be more specific by using part or all of a file name, for example c:\My Documents\*.doc, or c:\My Documents\Letter.doc.
The source files can exist on the local drive or on any connected device e.g. a network PC or server or storage device such as a zip drive. [ contents ]
Source files can be directed at a default shadow folder (destination) or the destination folder can be specified explicitly.
If you use the default shadow folder then the shadow will preserve the complete folder structure of the original files including a drive folder. This means you can shadow files from more than one disk drive and Disk Shadow will record precisely where the files originated.
If you specify an explicit destination folder then Disk Shadow will preserve only the folder structure of the branch being shadowed. This means you can control precisely where and how your files are shadowed.
The destination folder can exist on the local drive or on any connected device e.g. a network PC or server or storage device such as a zip drive. [ contents ]
The combination of one or more source and destination pairings (shadow set line) defines the shadow set. The shadow set is specified within the Files to shadow list in the main Disk Shadow form.
In addition to the source and destination, there are many options that can be used to configure the shadow set lines, either globally or individually, to define precisely if, how and when the files should be shadowed. The main options are described below.
An unlimited number of shadow set lines can be defined within the shadow set which means that Disk Shadow can handle both very simple and very complex shadow requirements.
Use the Spec Builder to define your shadow set lines within the grid view or type them in directly using the text view. [ contents ]
Disk Shadow can operate entirely automatically. The software can launch itself when you switch on your computer, operate in the background while you use your computer, and then shutdown when you switch off your computer.
In automatic mode your files are always backed up and synchronised in the way you want whenever you use your PC. [ contents ]
You can define when Disk Shadow should perform its shadow tasks in two ways:
You can also use a combination of timed countdown and timed events. You can even specify that particular shadow set lines should only be considered during timed events or on a certain day of the week.
We find that most customers use a straightforward timed countdown but we have included a comprehensive scheduling system so that you can gain precise control over when your files are shadowed. [ contents ]
If you prefer you can control when Disk Shadow performs its shadow runs by using the Run button. If you only want to use this manual control then clear all the timed events and switch off the timed countdown. Note that you can start and stop the timer and initiate a run by right clicking on the system tray icon. [ contents ]
Disk Shadow has a powerful feature that allows you to operate automatically and maintain considerable run time control at the same time. The feature is known as Querying.
When you operate with queries Disk Shadow will detect the files that need to be shadowed and prompt you with the file paths and names, rather than automatically shadowing them. Disk Shadow will only shadow the files you select from the query list.
When you use queries you can reverse the shadow direction on individual files e.g. force the older file to overwrite the newer file. By default, Disk Shadow will keep a copy of the newer version in case you made a mistake in overwriting it.
You can elect to have all files queried using the Query all saves option or you can specify querying against individual shadow set lines where the file size exceeds a given value. This means you can have some files being shadowed automatically and some files being prompted to you. [ contents ]
Disk Shadow can maintain up to 9 versions of the same file on the source or destination folder or on both. This means that you can protect against accidental or incorrect updates to a file. [ contents ]
You can explicitly exclude one or more files from being shadowed in three ways:
This feature is useful if you:
If you use external storage devices like a zip drive you can name individual disks and define the files that should be shadowed to that named disk. When the named disk is in the storage device those files will be shadowed. When a different disk is in the device different files can be shadowed or no files if none are defined for the disk.
If you wish to group your shadow set lines, perhaps into those that are relevant when you are in your office and those that are relevant when you are at home, then you can assign a volume name to individual shadow set lines. These lines will only operate when you enter or select the Shadow volume name on the main form or select the [All Volumes] option.
In addition, you can make the shadow set lines private to the volume so that they are only visible and relevant when you want them to be. This is a particularly powerful feature and is worth experimenting with until you are familiar with it. [ contents ]
This allows you to synchronise a subset of files from another PC (such as a server) with your PC and shadow those files only plus any new files you create on your PC. This is useful if you have space limitations on your PC or do not want files that others have created in a common folder structure being copied to you PC. [ contents ]
This allows you to force files in the source to overwrite files in the destination even when the destination files are newer or read only. This is useful if you wish to reset files to a previous baseline state, for example, during repeated testing. [ contents ]
Disk Shadow operates over a local or wide area network, supports network notation and provides you with access to your network neighborhood. It also operates over a remote connection, e.g. via a modem. If you use a remote (slow) connection you can control the connection time used by Disk Shadow in two ways:
Disk Shadow automatically detects new connections, e.g. to a server or zip drive, when it performs a shadow run. Devices can generally be connected and disconnected at any time and Disk Shadow will operate correctly. The software is designed to be resilient to changing device connections but can be affected, like all other applications, when servers or network connections are lost. [ contents ]
The system tray icon for Disk Shadow shows the current status of your shadow.
You can delete files that have been prompted to you by the query function or that are listed in the shadow log (and hence have already been shadowed).
You can also use Shadow to fully synchronize two or more folders to make them identical, including deleting files in the destination folder that no longer exist on the source folder. This is a very useful however please use it with caution. You should not use it on shadow set lines that represent your actual backups or ones that specify folders that are also used by other people on a server. Experiment with it using test folders and files so that you understand how it works. Also, set the multiple file versions feature to at least 1 and Shadow will keep the most recent version of a deleted file for safety. [ contents ]
Disk Shadow is designed to operate in the background and allow you to get on with your work. Most status conditions are communicated to you via the system tray icon. Disk Shadow will always perform all the shadow operations that are available and relevant. If one or more devices are not available then Disk Shadow will log a warning but will continue to do what it can. As devices become available Disk Shadow will detect them and perform the relevant shadow operations during the next shadow run. This resilience matches the way in which laptop computers are used in the office, on the move, at home
Download your free evaluation copy here