HK1075102B - Method of optimising the performance of a computer and a main non-volatile memory unit optimised using specific-use sections - Google Patents
Method of optimising the performance of a computer and a main non-volatile memory unit optimised using specific-use sections Download PDFInfo
- Publication number
- HK1075102B HK1075102B HK05107278.3A HK05107278A HK1075102B HK 1075102 B HK1075102 B HK 1075102B HK 05107278 A HK05107278 A HK 05107278A HK 1075102 B HK1075102 B HK 1075102B
- Authority
- HK
- Hong Kong
- Prior art keywords
- files
- operating system
- computer
- dedicated
- storage medium
- Prior art date
Links
Description
Background
Currently, computers have gained wide acceptance in various fields because such devices are very useful tools for performing various tasks. Scientific development and the use of new technologies have contributed to this fact and have at the same time accelerated the introduction of newer and better computers into the market at lower cost. Among the components that relate to the highest level, for example, the Central Processing Unit (CPU) is most prominent; they are continually becoming faster, smaller, and more computationally powerful than previous generations. Other components that show a similar degree of technical sophistication are the means used to provide the main non-volatile storage medium to the computer, which is the means that retain its content even if the power supply is disconnected, which in the present case is the use of hard disks or flash memory banks, which are becoming increasingly faster, more reliable, less expensive, and have a larger capacity.
However, despite significant technical advantages such as those described above, all computers loaded with primary non-volatile storage media exhibit, without exception, the fact that it is observable from the same operating system in which they are used. This phenomenon manifests itself as a gradual decrease in the performance of the computer, i.e. a decrease in its overall speed, which, as it were, becomes increasingly important for everyday use of the device. As expected, the user perceives the effect of this phenomenon, as he/she must wait longer each time his/her task is processed, even if the same computer works better several months ago.
What is a file fragment?
To recognize the existence of this phenomenon, a good reference example is typical of what is often used in offices, e.g. in millions "PC compatible "computer with hard disk set as its non-volatile main storage medium as follows.
Over months, the user perceives a slow and positive increase in wait time, which decreases her/her productivity; his/her computer becomes less fast than when it is a new machine. By the end of the first year, the user may clearly perceive that the performance of the device has reduced to the point where its use has become intolerable. He/she may be able to wait another year but eventually has to turn to professional help. Conventional techniques provide the user with the following options: (1) purchasing a new faster computer; (2) expanding existing hardware capabilities, or upgrading them; (3) reinstalling an operating system and an application program; (4) arranging hard disks; or (5) a combination of the above. However, whatever option is chosen, the effect of restoring performance will be temporary, short-lived, as this is a recurring phenomenon and the performance degradation will eventually reappear.
The phenomenon is called "file fragmentation". This phenomenon occurs in non-volatile main storage media of computers. The main reason for this is the operating system installed in the device, since this software manages the available non-volatile storage space. Another reason for this is the configuration of conventional memory devices, as in the example mentioned "As was the case with the PC compatible "platform, there has been little change for more than twenty years.
How does a file fragment start?
To describe in more detail how file fragmentation originates, another example will be used. This time the focus will be a personal computer, a new one "PC compatible computer equipped with a hard disk as its nonvolatile main storage medium and described belowWindowsIs its operating system.
In this computer the hard disk needs initial setup in order to start the operation. The conventional technology for hard disks at present has obvious characteristics: they generate a "main partition" that is set to an "active partition" and occupies the entire, if not most, of the hard disk storage capacity. The hard disk is then "formatted". The act of "partitioning" and "formatting" the hard disk is very important because it builds a structure on its surface consisting of hundreds of thousands to millions of equally sized tiny parts called "clusters" (typically 4,096 bytes). The only method of (3). The purpose of the cluster is apparent whenever the operating system reads from or writes to a hard disk a file.
Software installation of the operating system and applications can only be accomplished after partitioning and formatting the non-volatile main storage medium, thus rendering the computer ready for operation.
It is important to note here that manufacturers of such computers have used the same configuration of hard disks for more than twenty years. A particular characteristic that makes this conventional arrangement such that the four fundamental factors of machine operation exist only in a space that itself has the storage capacity of all, if not most, of such media. The four basic factors are: (1) files that are part of the operating system; (2) temporary work files and those frequently updated by the operating system and applications, such as virtual memory swap files, temporary internet files, and error and event records; (3) files that are part of the installed application; and (4) user files. Similarly, important and non-important factors of machine operation share the same memory space. This conventional configuration of a hard disk may just show: making non-volatile storage media in computers work in an old way and in a harmful way. However, as will be seen later, several important and disadvantageous results are precisely from this technology for the owner of the computing device.
Having explained the previous problems, it is now possible to discuss what happens when a file on a hard disk is written, read or deleted. (1) When writing a file, the operating system first divides the data into blocks whose size (typically 4,096 bytes) is equal to the cluster size. It then records these blocks onto the first obtained cluster on the hard disk it finds. (2) On the other hand, when a file needs to be read, the operating system searches for a "map" of those clusters used to store the file, collects the data bits and passes them "in block" to any requested read. (3) Finally, to delete a file, the operating system again searches for "images" of those clusters associated with the file and marks them as available, which causes a "gap" to occur for subsequent write blanks.
To understand how file fragmentation begins, one must remember that tens, hundreds, or even thousands of writes, reads, and deletes a cluster are to be passed through during operation. Thus, "gaps" gradually appear, and subsequent writes fill these gaps by placing new data bits into non-adjacent clusters that have become scattered; this is not together, that is they break the file being written without failure. Accordingly, with the use of conventional devices, the contents of hard disks are becoming increasingly fragmented due to the ongoing writing and deleting operations performed by the operating system.
The result of the above is the phenomenon of "fragmentation" described above, sometimes referred to as "hard disk fragmentation" when it occurs on such media; in practice, however, as previously mentioned, it is not the storage medium itself that is fragmented, but the files it contains.
Why is the operating system mainly causing fragmentation?
Explaining why the operating system is the main potential cause of this phenomenon, it is not uncommon for the task of writing files on the hard disk to need to be completed in the fastest way possible, without the need for time to find neighboring clusters, which would allow more efficient access to the data at later reads.
The actions that cause the operating system to crash the non-volatile main storage medium include, among other things: (1) turning on and off the computer, (2) managing virtual memory swap files, (3) opening and closing applications, (4) opening and closing data files, (5) sending files to the printer, (6) surfing the internet, and (7) sending and receiving e-mail. Although almost all of these tasks stem from user actions, ultimately they are performed within the computer core by the operating system itself, in the form of read and write and delete operations to the storage medium.
Why does fragmentation reduce computer performance?
Fragmentation reduces computer performance because it gradually requires more time for the non-volatile primary storage medium to complete the read, write and delete operations of those files managed by the operating system. For example, in the particular case of a hard disk, the read head needs to perform a large amount of motion in order to (1) read all the scattered clusters that make up a fragmented file, (2) find those clusters that are also typically scattered available in order to write a new file.
Considering that the operating system handles read, write and delete operations of hundreds, thousands or even millions of files in a non-volatile storage medium during operation, it is clear why computer performance gradually decays as long as its content remains fragmented.
The most common remedy for fragmentation
A conventional solution to this problem is the so-called "file defragmentation" process, which is sometimes referred to as "hard disk defragmentation" when such media is involved. This process means that scattered data bits from all those fragmented files are reset within the non-volatile main storage medium, so that all subsequent reads and writes by the operating system are more efficient and require less time. However, the positive effect of defragmentation is always temporary when the file is no longer fragmented.
Inherent characteristics of traditional hard disk defragmentation
Since hard disks are the most widely used non-volatile primary storage media on the market today, certain inherent properties of their traditional defragmentation process have to be studied. Before this point, however, it is appropriate to clarify the use of the term "traditional" in the above headings: this is because such a process is based on the above-described conventional hard disk configuration technology.
What is the traditional defragmentation of hard disks?
Each fragmented file in the hard disk consists of a set of discrete parts. At the physical level, the part written to the hard disk occupies a set of scattered clusters due to the way the file is written. Thus, to avoid file fragmentation, a defragmentation tool uses specialized algorithms to generate complex planar motion that is later used to reset the contents of those scattered clusters. A typical way to defragment a hard disk is to reorganize its content as follows: (1) each file of "one block", all parts together and in order; (2) all files are configured into one block at the beginning of the hard disk; (3) the free space is also arranged in one block, but towards the end of the hard disk.
How long is it time to defragment a hard disk?
Since this process implies a lot of work, conventional defragmentation of a hard disk takes 1 to 8 hours (or more) in total, depending on the storage capacity of the hard disk, its access time, its data transfer rate, the amount of stored files, and the defragmentation tool used. However, there is a published case in which the user stops the process because it lasts three days and three nights and does not complete more than 10% of the process.
Considering the above, it is clear why most people consider the traditional hard disk defragmentation process to be a notorious and tedious task, although using it can improve the performance of the computer.
What defragmentation tools are available on the market?
There are many programs on the market that provide defragmentation of hard disk content.Bath as the last version of the system has been a tool for this purpose. Similarly, widely usedThe bath making system integrates a procedure for removing debris in a simple manner. After a few years, the composition has,the operating system includes a somewhat sophisticated defragmentation process that uses somewhat less thanThen the process is completed.
For example, the software manufacturer NetworkAnd(formerly)) Separately developed tools, such asNorton Andin order to perform a more advanced defragmentation process. Executive as an advantageDevelop and useIs a more sophisticated tool for defragmenting in a continuous manner without stopping and without user intervention, such as those with a rotating cutterWindowsAndhard disk of computer with operating system connected to installed computer via LANThe server of (1).
Who is benefited from the defragmentation process?
Clearly, existing defragmentation programs on the market offer the benefit only to the users who employ them. Furthermore, if the basic tools for defragmenting a hard disk are generally unknown to beginners, this is especially true for sophisticated tools.
Thus, while inexperienced users perceive the impairment, they do not know the cause or solution, whereas advanced users are aware. The latter understands that a reduction in computer performance occurs because of fragmentation of the hard disk, and although it appears to be tedious, the only way to address this drawback is to go to programs that more or less defragment the hard disk. Furthermore, such advanced users know that the best possible computer performance is desired, although painful for him/her, this process must be done regularly, once and again.
How often hard disk defragmentation must be done?
In several articles published in special magazines, authors actually propose to defragment a computer hard disk according to rules. Some recommend doing this at least once a month, others claim that the frequency depends on the type of work the user is doing, as this determines the fragmentation that will occur. Yet others have suggested defragmentation once every two weeks, while others even claim to have to do so once a week in order to minimize fragmentation and maintain computer performance at an optimum state.
In summary, the method is embodied in the NetworkDeveloped McAfeeAnd by ExecutiveDeveloped byThe most recent version of defragmentation program in (c), establishes the maximum suggested frequency that can be employed when defragmenting hard disks configured by the so-called conventional technique "under the influence". In light of these, optimal file defragmentation is to keep the user working as usual, in a continuous manner without stopping user intervention.
The difference between the present invention and the conventional technique
Once the above arguments have been explained, the features that distinguish the present invention from the so-called conventional techniques currently used can be studied in more detail. Defragmentation available on the market is even more or superior. Including (1) patents that protect algorithms for defragmenting non-volatile storage media and (2) patents that protect the way in which files in a hard disk are reorganized to reduce fragmented reproduction. In addition, there are patents (3) that protect unique algorithms for defragmenting certain types of files.
However, the conventional solutions for fragmentation of currently known applications or non-applications (1) provide temporary remedies for the phenomenon of reproducibility; or in addition, provide a partial solution when compared to the present invention. (2) These solutions are based on the above-mentioned conventional structure of non-volatile storage media-which structure has existed for at least twenty years, under the same conditions, in the case of hard disks integrated into "IBMPC compatible" computers. In summary, (3) this solution offers little benefit to the user when compared to the present invention.
The present invention differs and differs from the previous ones in that it applies the following arguments: "the healthiest house is not the cleanest house, but the least contaminated house". The invention minimizes the effects of file fragmentation and thereby maintains the best possible performance of the computer for a longer period than would be considered achievable using conventional techniques. Similarly, the present invention uses as its foundation a new architecture that is fundamentally different from that currently provided by computer manufacturers, operating systems, and software applications. The present invention also differs from the optimization techniques proposed by the prior patents; and this is the result of successful testing conducted by actual users on many computers over the years of research and since 1999.
Another feature that distinguishes the present invention is that it provides proven benefits to the user that are not achievable using conventional techniques, available hardware and software tools, existing patents, or published suggestions, either singly or in combination, employing these alternatives. Among these benefits, the following are highlighted: (1) providing the best performance available to the computer, even better than when the device is new. (2) A better security scheme is provided for user files, which enables (a) minimizing damage caused by virus attacks, internet intrusion, and power loss; (b) maintaining valuable information that is normally lost using conventional techniques of recovering, reinstalling and updating software; and (c) there is an easier, faster, more complete, and efficient way to generate backup copies. (3) A new optimized defragmentation process is obtained which is more efficient and less tedious than conventional defragmentation. (4) Provides at least 70% savings to the user and in some cases, above 90%, such as the problem of (a) taking the user's time when optimizing his/her computer performance by defragmenting the non-volatile primary storage medium; (b) machine wear caused by such process cleaning; and (c) energy consumption caused by these activities. And finally (5) on the one hand, provides the best cost-benefit ratio by maximizing the benefit obtained by the user; and on the other hand, because the invention can be used with new computers as well as used computers, the required investment is reduced.
Objects of the invention
The object of the invention is to provide a method, the application of which results in the best possible performance of a computer.
Another object of the invention is to make available a supplementary method which supplements the functions of the first method described above, in order to optimize tens, hundreds or thousands of identical computers in a minimum time, that is to say with matching hardware and software and configuration.
It is another object of the invention to provide an optimized non-volatile main storage medium comprising a basic set of dedicated sectors.
It is another object of the invention to provide an optimized non-volatile main storage medium optionally containing an additional set of dedicated sectors.
It is another object of the present invention to provide an improved security scheme for a user for his/her files that gives him/her more advantages than the conventional techniques offer.
It is a further object of the invention to facilitate obtaining maximum performance in a device by means of an optimized defragmentation process applied to a non-volatile main storage medium.
Another object of the invention is to enable the user to save on problems such as his/her time, machine wear and energy consumption.
These and other objects of the invention will become apparent in the further detailed description of the preferred embodiments.
Summary of the invention
The invention consists of three parts (1) a method of optimizing a computer by means of dedicated sections generated in its non-volatile main storage medium. (2) A secondary method, complementary to the previous one, to optimize the performance of the myriad of "duplicate" computers, starting from the obtained "primary" computer optimization, in an accelerated manner. And (3) a non-volatile primary storage medium that presents a basic set of dedicated sectors, and optionally an additional set of dedicated sectors, after optimization by one of the previous methods.
The following two topics present a background explaining why the invention itself remains unprecedented of technical innovation: (1) the possibility of creating segments in a computer non-volatile main storage medium, and (2) the idea of disclosure with respect to the subject. It should be clarified that even though the topic will discuss the current problematic state of the personal computer industry, the following fact is not ignored since it is prevalent all over the world. The present invention may be used with any computing platform; other types of devices that use non-volatile primary storage media other than computers; for different types of devices used as non-volatile primary storage media; and for various operating systems and applications.
The first question is to investigate how long it may or may not take to build a plurality of dedicated sectors in the non-volatile main storage medium of a computer. Moreover, it reveals that the opening of specialized sections, such as results from applying the invention to one or more computers, is a technology that is ignored by the broad consumer computing industry.
In some cases, more than one segment can be created in a non-volatile storage medium of a computer. An obvious example is a hard disk as the first of its non-volatile primary storage mediaPC compatible "computers. By means of operating systems from those installed in the computerThe "fdisk" command of (a) enables various sectors or "partitions" to be created in the hard disk, enabling a user to employ such a device as if it contained a number of disk drive "volumes". However, the conventional structure of hard disks has made the disk as a non-sectored whole since a scheme with only one partition.
Configuring the non-volatile main storage medium in this manner has a deeper conventional root than the techniques that demonstrate the benefits. One example of this is the arrival of a broad trend of consumer software design to be problematic and pernicious, appearing in operating systems as well as applications, and having dominated the market over the past two decades.
An obvious example of the previous is from the wide useIs/are as followsAndcertain characteristics of the operating system exist. Such operating systems see hard disks as a whole without sectors, since they are implemented by means of basic elements for their function: operating system, dynamic file, applicationWith an efficient segmentation of the program and user files, a painless optimization of the computer performance is prevented at the physical and logical level. The dynamic file specific case, those that are temporarily or frequently updated, causes itself and other files to be fragmented, proving this as it becomes impossible to separate them in another logical drive unit, in another partition, or in another folder, unlike the original files. Examples of such files and folders are as follows: (1) some error logins and some event logins located on paths such as "C: \", "C: \ Windows" and "C: \ Windows \ Temp"; (2) keeping the record of the use frequency of the application program in a file of a channel 'C: \ Windows \ Apllog'; and (3) a temporary print job folder at C: \ Windows \ Spool'. In practice, moving dynamic folders such as "ApplicationData", "Cookies", "Historial" (in Spanish versions only), "History", "Tasks", and "Temp", all of which are located on the path "C: \ Windows", are only possible when using a set of structures that are not readily available to the public.
As the mass consumer computing industry has been pioneered for twenty years, specific configurations, design criteria and those techniques referred to herein as "legacy" have been introduced to the point of causing a tremendous amount of mishap to the computer owner and inevitable consequences. This swelling is inevitable, slow but definite, and the recurring impairment of device performance, and the potential loss of user files. To gauge the profound origin of this technique, one looks at the following facts: since its advent, over 5 million personal computers using this traditional configuration have been sold worldwide with the advantage of using no dedicated sectors at all in their non-volatile main storage media. It is hard to imagine that it has emerged that over the last two decades hardware and software manufacturers have ignored this possibility. They remain at their own marginal in development, without paying attention to and without exploiting the benefits available from advances in technology such as that proposed by the present invention, despite the morbidity affecting their consumers, computer users.
After studying the above scenario, the copy presents a second topic: ideas disclosed with respect to the subject matter, and their contributions. From many years ago, the authors set forth the possibilities and advantages of generating extents in a computer's non-volatile main storage medium without exhaustive research attempts to discover the advanced results obtained by generating "dedicated extents" as done by the present invention. This may be the reason why such proposals have not been accepted commercially for the computer industry.
In "In the particular case of PC-compatible "computers, authors argue separately for certain benefits arising from the creation of partitions in a hard disk. This benefit is summarized below. (1) Files are easier to organize and space can be allocated more efficiently. (2) The diversity of operating systems installed in computers can be maintained. (3) The start-up time of the operating system is improved. (4) When it is in a separate partition, the fragments of the virtual swap file disappear. (5) When a virus attack occurs or when software needs to be reinstalled, the loss of user files becomes minimal. All these ideas have been published in an independent way and have limited their reach and acceptance among hardware and software manufacturers, at least on different dates and countries.
Of particular importance are two proposals, the authors of which are presented in "PC compatible "several partitions are created in the computer hard disk, especially if the storage capacity is adapted to the" large hard drive "class. The results of which, in addition to the other benefits mentioned above, they were argued in the first proposal, file fragmentation reduction and consequent computer performance improvement. However, they claim to provide such proposals and advantages to be limited in at least four important respects when compared to the present invention and the outstanding benefits they bring. To show this problem in more detail, four aspects that distinguish the present invention from the proposal will be studied below.
The first of these aspects is that the proposal does not mention the advantages of effective separation of the elements nor does it state how this can be achieved. For example, they never suggest transferring those files and folders which, according to the first part of the invention, must be stored in sections for use with dynamic files, as is the case with internet temporary files and with re-assignable error and event records. They also do not suggest reallocating files that must be stored according to the first component in a partition for use with user files, such as those files where email messages and address books reside.
From such inattention, the following conclusions are drawn: the authors are unaware of the ability to meet their properties to achieve better computer performance by effectively separating all the possible elements in their matching dedicated zones. The purpose of this strategy is to keep the usual shards clearly separated from the sporadic shards in order to minimize the subject shards of the hard disk, not just "reduce" it, as explained later in the detailed description of the invention. The strategy is of fundamental importance because it allows the present invention to extend the optimal performance state of a computer for a longer period of time than provided by conventional techniques and the disclosed proposals.
The second aspect is that the first proposal concludes that as a benefit the user is facilitated in backing up copies of his/her files, due to the fact that they are stored in a partition only for such files. However, the authors do not teach the user that, in order for the backup copy to be truly effective and easy, it is necessary to (1) configure the operating system and applications so that they recognize and employ such partitions for their defined purposes. In addition, other files that are important to the user must be (2) reassigned in the partition, such as lists containing e-mail, address books, and favorite Web pages. The user would lose valuable information if he/she did not make such adjustments, when re-storing, reinstalling, and even from time to time when updating the operating system or applications.
Unlike this proposal, the present invention provides, as one of its objects, a "security solution improved for his/her files" to the user. This benefit is made possible by the fact that the first component suggests an efficient separation of user files in their unique dedicated sections. Thus, backup copies made in a computer that are optimized by the present invention are easier, faster, and more efficient to achieve than using conventional techniques or published proposals.
The third aspect stems from the fact that the second proposal, apart from not indicating any significant benefit to the user, has not yet explicitly stated which elements are to be separated. First, authors encourage the installation of one or more operating systems in separate partitions; installing a software application in another partition; installing a virtual storage swap file in another partition; and install the user files in different partitions. They are therefore not subsequently consistently recommended. Applications and user files are unified in only one partition. If the user presses a job later, he/she will severely limit the benefit that the first proposal is trying to provide, for the reasons explained earlier in the previously mentioned aspect.
The above leads to the following conclusions: they are isolated proposals and the authors of the second proposal have made inadequate research to determine the certainty of best achieving separation of the active elements, as is the first component of the invention.
A further fourth aspect consists in the fact that the authors of said proposals neglect the suggestions, in their knowledge, to defragment the resulting partitions once the component separation ends. The present invention enables a more optimal defragmentation process than conventional processes in that (1) it ends faster, (2) it is more accurate, (3) it is more efficient, (4) the benefit lasts longer, and (5) it needs to be done at most every two, every four, or even every six months. These five advantages are not achieved by conventional techniques or published proposals. This fact illustrates that these proposals are limited, hasty, and that their authors have not conducted extensive research to reveal that more and better computer performance results are achievable by performing an optimized defragmentation process, as described in the first component of the present invention.
Detailed description of the invention
The present invention employs a strategy to prevent both critical and non-critical studies of computer operations from co-existing in the same segment at the same time. That is, a computing device, or any other different apparatus incorporating a non-volatile primary storage medium to which the present invention relates, comprises an optimized non-volatile primary storage medium that hosts the elements according to three basic criteria: (1) the elements must be organized within one or more dedicated field groups. (2) They must be physically separated, which is evident by the location assigned to them within the storage medium. (3) They must also be separated at the logical level, as is evident from the configuration established in the operating system and in the application programs, in such a way that both elements recognize and exploit the advantages of the existing dedicated zones.
This new technique reduces the overall fragmentation of the storage medium to the minimum possible, since the usual fragmentation, resulting from reproducing files that become fragmented at a greater rate, remains independent of sporadic fragmentation, which originates from a read and does not change the file unless it has to be updated.
Similarly, this technique provides a novel type of defragmentation of files: "optimized defragmentation". This process appears to be better than conventional techniques due to the following fact. (1) In less time, it is easier and faster for the defragmentation tool and the device itself, since defragmentation of three to four small zones, which are important for the optimal performance of the computer, resides in larger zones than the individual elements, which are important and not important for the operation of the machine. Furthermore, this is a fact which has been closely proven by means of the device optimized according to the invention. (2) More precisely because a different file configuration scheme can be applied to each existing dedicated sector. (3) More efficient because such a file configuration scheme may be the most appropriate to comply with the zone-specificity where the present shard resides. (4) The benefit lasts longer, since the isolation from sporadic crushing from the usual crushing moment is extremely low. Finally, due to the previous fact, (5) at most only every second, fourth or even sixth month is required to perform this process.
Once the foregoing has been explained, the present invention can be thoroughly discussed for each of the following three components: (1) a method for optimizing computer performance; (2) methods for rapidly optimizing the performance of countless computers; and (3) optimizing the non-volatile main storage medium with the dedicated section; all the description is as follows.
Method for optimizing computer performance
The first component of the present invention is a method of optimizing the performance of a computer by means of dedicated sections generated in its non-volatile main storage medium. The method comprises the following five stages: (1) preparing a non-volatile primary storage medium, (2) installing and configuring an operating system, (3) installing and configuring an application, (4) restoring user files, and (5) optimizing file defragmentation.
The first stage. A non-volatile main storage medium is prepared.
The first stage focuses on preparing the non-volatile main storage medium. The method comprises the following three steps:
a backup copy is formed. The first step of this phase consists in making a backup copy of the files useful for the user and for the operation of the computer hardware apparatus. This step may be skipped if the most recent backup copy has been obtained and if the hardware "driver" is readily available at hand;
2) a dedicated section is generated. The second step consists in completing all the partitioning operations as the case may be, so that there is a basic set of dedicated sectors within the non-volatile main storage medium. This collection is where four important elements of the operation optimized computer reside. Thus, the base set includes:
a) only one section of those files of the operating system part is installed.
b) Only for sections of the dynamic file. Which stores temporary files or frequently modified files as a result of tasks inherent to the operation of the operating system and applications. Some examples include, but are not limited to, the following: virtual storage swap files, internet buffers, error logs, and event logs.
c) One section dedicated to all those files containing the application part.
d) A section dedicated to user files.
If more space is available in the non-volatile master-slave medium, additional sets of dedicated zones may be created if needed, or if it appears convenient to generate. It is important to note that this set is optional, as it will contain elements that are not important to the operation of the device. Some examples of dedicated zones that may contain additional sets include, but are not limited to, the following:
a) one or more additional sections of the user file.
b) Write cache for small disk generation.
c) For downloading one or more segments of a file from the internet.
d) And an isolation region for storing virus infection files.
e) One or more sections for digital editing of music or video files.
f) And music large file whole series repositories such as databases, backup copies, images, music, video, software updates, and redundant additional convenience functions; and
3) consider the case where there is more than one operating system. The third step of this phase is focused on handling situations where more than one operating system needs to be installed. In this scenario, it is important to remember that each additional operating system (1) will have its corresponding private segment base set, (2) will be installed in its own segment within the base set, (3) will be in the "neighborhood" of the dynamic files, applications, and user files that are compatible with it, but (4) all of them will be separated at the physical level from the logical level, and furthermore, (5) can have its own additional set in which it can store, and also separate at the physical and logical levels, elements that are not important to the operation of devices that are compatible with the additional operating system. Therefore, the previous steps must be repeated as many times as the operating system is required or allowed for the computing platform of the device being optimized.
And a second stage. Installing and configuring operating systems
The second phase includes installing and configuring the operating system. It comprises the following steps:
1) and installing an operating system. The first step of this phase consists in installing the operating system in the dedicated sector corresponding to it. If the program performing the installation allows to set the position of one or more basic elements for computer operations, operating systems, dynamic files, applications and user files, it is important to select the relevant option in such a way that this configuration is permanently set and, from the moment of their installation, these elements are configured in their corresponding dedicated sectors according to their nature. An example of which isAn operating system that allows selection of where to store its files during its installation.
2) The driver for the device is installed and configured. -a second step consisting in installing and configuring a so-called "device driver"; that is to say those files that enable the operation of the hardware devices contained in the computer. The neutral configuration of such elements is performed at this step, unless specified by the driver manufacturer.
Two important issues related to such applications where drivers are bundled together must be mentioned: (1) their installation is not carried out until the third stage, whenever possible. (2) However, if one or more of these applications are automatically installed when the driver is installed, the relevant option must be selected so that their files are stored in the corresponding section. An example isCD-RW model CD24 reader/writer devices contain additional applications, such as drivers to enable their operationJukebox, My Ptoto And other applications bundled by the manufacturer, enable the user to develop the functionality of such devices.
3) Installing an operating system supplement. The third step of this phase consists in installing the operating system enhancement program; that is, updates, patches, and proximity to optimize operating system and device driver performance. Installation of such components proceeds at this step unless the generator provides an accurate indication and reason for installing such supplements at a different time.
If the installer allows setting the location of one or more basic elements for computer operations, operating systems, dynamic files, applications and user files, it is important to select the relevant option so that this configuration is permanently set and these elements are stored in their dedicated sections from the time they are installed. An example of representing the above situation isInternet Explorer, this program holds andthe operating system is in close relation and is therefore considered an accessory installed at this step. During its installation, the relevant application allows the location of its files to be set.
4) The operating system and its accessories are configured. The fourth step is focused on implementing the necessary configuration so that the operating system and accessories installed in the previous step identify and use dedicated fields useful for their operation, whether these fields are part of the basic set or the additional set. This arrangement is necessary because many commercially available operating systems assume the non-volatile main storage medium as a whole without segments. Therefore, it is important to adjust the parameters and registry used by the operating system and its accessories in order to set where they will be located below. (1) Dynamic files that are reconfigurable in their corresponding sections, such as virtual memory swap files, error records and event records, to name a few. (2) A file that is part of the installed application. (3) Files generated by the user's work. And (4) the remaining files and folders, which are reconfigured to dedicated sections provided in the additional sets, will be convenient as long as they can be transferred and play a role in achieving the objects of the present invention. In some cases, these configurations mean that files and folders are moved to new locations, deleting them from their original locations. Thus, transfers must be manually implemented, except that the operating system and its accessories automatically perform these operations when their configuration is modified.
5) Reconfiguring the application uninstalled from the operating system. The fifth step of this phase is focused on reconfiguring all those files: (1) offloaded from the operating system; (2) stored by default in a section associated with such an operating system; (3) a portion of those applications that are installed by the operating system, its accessories, or hardware device drivers; and (4) their transfers can correspond to dedicated zones. Since almost all existing software on the market considers the non-volatile main storage medium as an integral segment, it is important to reconfigure these files in order to achieve the object of the invention. This transfer of course requires a parameter and registry-related adjustment in which the previous locations of these files are set such that a new location is established; and
6) consider the case where there is more than one operating system. The sixth and final step considers those cases where an additional operating system is required. In this case, it is important to remember that for each additional operating system, there is a basic set of dedicated sectors, and there may be an additional set. It is therefore important to repeat the first previous step of this phase for each additional operating system, each using its own corresponding set.
And a third stage. Installing and configuring applications
The third phase focuses on the installation and configuration process of all required applications. Before going into more detail, it is important to note that only the application is considered in the first three steps of the staged. Thus, all applications identified as being easy to install must be subjected to the first three steps, one at a time, which will be described later, until they have all been installed. As already mentioned, this phase consists of four steps again:
1) install applications and their complements. The first step of this phase consists in installing an application in the corresponding dedicated field. At this step, it is important to include those updates, paths and attachments to ensure that the performance of the software is optimized until its generator adjusts and provides specialized instructions for installing such supplements at additional times.
If the installer provides a method to set up (1) one or more of the above-mentioned elements that are important to the performance of the computer, operating system, dynamic files, application programs, and user files, or (2) any element that is not important to the operation of the machine, which is used by the application program, and which is conveniently stored in an existing dedicated section within the additional collection, it is important to select the relevant option so that this configuration is a permanent setting, and these elements are placed in their corresponding dedicated sections from their installation. An example of this isThis is an application for desktop publishing that allows the location of its temporary working files, that is, files that are considered dynamic by the present invention, to be set when more than one hard drive unit is detected during installation.
2) An application and its accessories are configured. The second step is focused on implementing the necessary configuration, with the aim of identifying and adopting those dedicated fields useful for their function, whether these fields are part of the basic set or the accessory set. Almost all software on the market assumes that the non-volatile storage medium is a whole without segments, which makes the configuration unavoidable. Thus, it is important to modify the parameters and registry used by the application, by its accessories, and by the operating system to determine where they will be located: (1) dynamic files that can be reconfigured in their nature in the corresponding sections, such as internet temporary files, error logs and event logs. (2) Files that are part of an application in the event that any relevant parameters are modified during installation of the application or its attachments. (3) User files and other useful items such as files containing email messages, address books, and favorite Web page lists. (4) Highlighted files and folders that are feasible and suitable for reconfiguration in dedicated sections of the additional set, as long as their transfer plays a role in achieving the objectives of the present invention. In many cases, those configurations imply transferring files and folders to their new locations, a process that includes removal from their original location. Thus, unless the operating system or its accessories automatically do so when its settings are modified, this must be done manually.
3) Reconfiguring files unloaded from the operating system. The third step of this phase consists in reconfiguring all those files, namely: (1) files unloaded from the operating system; (2) files stored by default in sections associated with such operating systems; (3) a portion of an installed application or an accessory thereof; and (4) files that can be transferred to the corresponding dedicated zone. Almost all existing software on the market considers the non-volatile main storage medium as a whole without segments, and reconfiguring these files is one element to achieve the object of the invention. Of course this transfer requires a parameter and registry related adjustment in which the previous location of such a file is set such that its new location is established; and
4) consider the case where there is more than one operating system. The fourth and final step considers the case of an additional operating system and its matching applications. In this case, it is important to remember that for each additional operating system, there is a basic set of dedicated sectors, and possibly an additional set. Thus, this same phase first previous step must be repeated for additional applications as needed, depending on the additional operating systems with which they are compatible to use the corresponding set.
And a fourth stage. Restoring user files
The fourth stage focuses on restoring the user files. This is an optional stage, only if a backup copy of the user files is generated during the first stage. The method comprises the following two steps:
1) the backup copy is restored. The first step consists in restoring the user files in their corresponding dedicated sections. It is important to note that when restoring the backup copy, files that are useful to the user, such as files containing email messages, address books, and favorite Web page lists, must be placed in the new, previously staged locations. If desired, additional configurations available in the operating system and applications must be made in addition to all the necessary data transformations in the file in order for the user to use his/her information in the normal manner.
2) Consider the case where there is more than one operating system. The second and final step considers the case where more than one operating system and its own applications and user files are required. For each additional operating system needed, consider that there is a basic set of dedicated sectors, and presumably an additional set. Thus, the final steps must be repeated using the set of master applications that the user file will be launched into good application.
And a fifth stage. Optimizing defragmentation of files
The final phase of the method consists in optimizing the defragmentation of the files, whether they belong to the basic set or to the additional set, in each dedicated sector present in the non-volatile main storage medium of the computer; or operating systems with which they are compatible. As the only minimum in nature, an optimized defragmentation process has to be performed in those dedicated zones, where four previously mentioned elements important to device performance are stored, namely the operating system, dynamic files, application and user files.
When performing the optimized defragmentation process it is important to use the most appropriate file placement scheme based on the following factors: an installed operating system, a defragmentation tool used, and a zone dedicated to defragmentation. In this way, a better optimized defragmentation process than conventional can be achieved because (1) it is done in less time, (2) it is more accurate, (3) it is more efficient, (4) its benefits last longer, and (5) it only needs to be performed every two, every four, or every six months at most.
Method for quickly optimizing performance of countless computers
The second component of the present invention is a method of supplementing the assistance of the first component of the present invention, enabling optimization obtained from a "master" computer to quickly optimize the performance of an infinite number of "replicated" computers.
To illustrate the utility of this second component, it is important to emphasize that the first component, i.e., the above-mentioned method for optimizing the performance of one computer, is considered to optimize the performance of one computer at a time. However, a large number of applications at the commercial and industrial level require an ancillary method that enables rapid optimization of tens, hundreds, or even thousands of identical computers, that is, identical in their hardware and software and their configuration. Situations such as this are typical, for example, where computing system personnel are managed for a medium-scale enterprise or company, and where personnel responsible for a large-scale production line of a computer manufacturing plant. In such a case, the use of auxiliary components proves that numerous machines can be optimized in the fastest possible manner. Using the first component in only one "master" computer in order to later replicate its optimization state in the remaining "replica" computers is a time saving technique. To achieve this result, it is important to use commercially available tools for this purpose, such as software programs, hardware devices, and those disk drives and storage media, singly or in combination.
The second component of the present invention comprises the following three stages:
the first stage. Optimizing a 'host' computer
The first stage consists in selecting a "master" computer and then optimizing it with the first component mentioned above, i.e. the method used to optimize the performance of a computer. The details of this first component have already been explained above and are omitted here.
And a second stage. Optimizing 'replicated' computers
The second phase consists in using auxiliary tools, such as software programs, hardware devices, and storage media or disk drives existing on the market for this purpose, singly or in combination, so that the optimized state of the "master" computer is quickly copied to the "copy" computer. The result of this stage must be an exact copy of the non-volatile primary storage medium 'structure and content, optimized in dedicated sections of the "master" computer, among all and every "duplicate" computer's corresponding non-volatile primary storage media.
And a third stage. Final adjustment in optimized computer
This third and final stage is optional in that the parameters in these machines are configured such that they need to be somewhat different from each other in different environments. Some examples include, but are not limited to, the following: a unique user file, different from that in other machines; a particular machine identification that distinguishes it from other machines in the local area network; and TCP/IP protocol settings that allow internet access to users in the local area network.
Similarly, when additional software needs to be installed in a machine used by a user-specific group, such installation must proceed with the following steps depicted in the third phase of the first component of the present invention.
Non-volatile main storage medium optimized with dedicated sectors
The third and final component of the present invention is a non-volatile main storage medium optimized in dedicated sections, which is the result of using the "method for optimizing computer performance" either in one computer as explained for the first component or in countless computers as explained for the second component.
Even when a computer is now provided with a non-volatile main storage medium, computer manufacturers use hard disks as the preferred device, and it is important to clarify that these devices are not limited to the only optimizable devices. Thus, the third component considers any other past present and future storage media in the discussion; it is optimizable if the energy supply is interrupted, as occurs for example for flash memories, whose content is still maintained.
After clarifying the above, it can now be established that the non-volatile main storage medium optimized with the discussed dedicated section has many characteristics. These groupings are the following:
1) attributes of a non-volatile primary storage medium. A first characteristic of this storage medium is the presence of one or more dedicated sets of sectors. Most importantly, the basic set, since the four basic elements of computer operation reside separately at the physical and logical levels. Thus, the basic set includes:
a) only one section of those files that are part of the operating system is installed.
b) For only one section of the dynamic file. Which stores temporary files or files that are frequently modified as a result of the operating system and application program work-inherent tasks. Some examples include, but are not limited to, the following: performance storage aggregate files, internet buffers, error logs and event logs.
c) Mainly due to the saving of one section of those files of the application part.
d) Exclusively due to one section of the user file.
When there is more space available in the non-volatile main storage medium, an additional set of dedicated sectors will also be present, if needed, or if it is generated somewhat appropriately. It is important to clarify that this set is optional, as the elements in which resident device operation is not important are separated at the physical and logical levels. Examples of dedicated sections that an additional set may contain include, but are not limited to, the following:
a) one or more additional sections for user files.
b) Write caching for small disk generation.
c) One or more segments of a file for download from the internet.
d) And an isolation region for storing virus infection files.
e) One or more sections for digital editing of music or video files.
f) And a full series of repositories of music large files such as databases, backup copies, images, music, video, software updates, and the remainder of additional convenience functions.
The second and third additional characteristics can be checked in the optimized non-volatile main storage medium. After the first or component is employed or both are correctly identified and both are derived from the optimized defragmentation that takes place. One of them is that the degree of fragmentation of the existing dedicated section is zero. The other is that the file placement scheme for each section is different, being most appropriate according to each specificity.
It is important to consider the specific case of a non-volatile main storage medium that requires more than one operating system to be installed, as detailed above. In storage media of this nature, each additional operating system that is required (1) has its base set of private section matches, (2) where in its own section within the base set, (3) is a "neighbor" of the dynamic files, applications and user files that are compatible with it, but (4) all of them are separate on the physical and neighbor level; further (5) it may have its own additional set, also separated at the physical level from the neighbor level, in which it is able to store non-volatile elements compatible with such additional operating systems for device operation.
After explaining the above topics, this section can now be supplemented with the last consideration. The above mentioned set of dedicated sections constitutes the main difference between a conventional non-volatile main storage medium and a non-volatile main storage medium optimized according to the present invention.
2) Operating system and application properties. Although the conventional technique is to create a single section of all, if not most, of the available space in the storage medium and to store therein all the elements that are important and not important to the operation of the device, the present invention differs from this idea by adopting a strategy that avoids these elements being present in a unique and identical section at the same time. That is, the non-volatile primary storage medium optimized by the present invention masters the elements according to three basic criteria: (1) the organizing elements must be concentrated in one or more dedicated zones. (2) They must be separated at the physical level by giving them a position within the storage medium. (3) And by aggregating the operating system and application configurations, which must be separated at the logical level, so that the elements of both identify and make good use of the existing dedicated sectors in the base set and in the additional set.
The above-described configuration constitutes a major difference between elements such as the operating system and the application programs installed and configured in a conventional non-volatile main storage medium and the same elements installed and configured in a non-volatile main storage medium optimized by the present invention; and
3) attributes of device performance. There are three attributes that are relevant to the performance of a computer with a non-volatile main storage medium after the latter is optimized by the present invention. The first of these is that, since the important and non-important elements are separated at the physical level as well as at the logical level, each in its own dedicated zone, it is possible to reduce the overall fragmentation of the medium to the minimum possible. This is because ordinary fragments generated by files that are often fragmented are well isolated from sporadic fragments that are read once from the file and do not change unless updates have to be updated.
The second attribute is that the third component, the non-volatile main storage medium with dedicated sectors, allows to obtain a new type of defragmentation: "optimized defragmentation". This new process result is superior to the conventional process due to the fact that: (1) in less time, since it is easier and faster to defragment the three or four small zones that are important to the computer optimization performance for the defragmentation tool and the device itself than a single large zone where all the elements that are important and not important to the machine operation reside. (2) More precisely because different types of file placement schemes can be employed for each existing dedicated sector. (3) More efficient because the placement scheme may be most appropriate according to the particular purpose of the section being collated. (4) The benefit lasts longer, since this phenomenon is minimal to reproduce once the ordinary fragments are isolated from the sporadic fragments. Finally, due to the previous fact, (5) only needs to be performed at most once every two, every four or every six months.
The conclusion derived from more than two attributes is that over time, the non-volatile main storage medium optimized with dedicated sections does not become an obstacle as frequently happens with non-optimized legacy media, but due to its optimization, the device performance can be maintained at its fullest potential.
A third and final feature of a non-volatile primary storage medium optimized in this way is that its presence in the computer in which it is contained allows the owner of the device to receive some benefit unique in its type. The above-mentioned advantages are explained in the last section of the "background of the invention" and are omitted here. However, the benefits cannot be simultaneously obtained by either of these methods alone or in combination, since it is emphasized that in conventional non-volatile primary storage media, which are not optimized by the present invention, the use of conventional techniques, hardware and software tools, existing patents, or the subject-related disclosure proposals, available on the market, is not used.
The three above-described attributes in this section constitute the difference between the performance of a computer having a conventional non-volatile primary storage medium and the performance of a computer having the optimized medium of the present invention.
PREFERRED EMBODIMENTS OF THE PRESENT INVENTION
Although they are completely different among them but closely related products,PC compatible computer possession and operating systems such asAndcommon things are: they are the computer products that have reached the greatest penetration in the market. This fact is almost true for all personal computers currently in use that are adapted to such a platform and have installed one of these operating systems. Therefore, the preferred embodiments described below will be closely related to this market fact for the purpose of illustrating the practical application of the invention. This embodiment is based on a hypothetical case involvingA second version of the operating system is provided,PC-compatible "personal computers, and hard disks having a storage capacity of 10.2 gigabytes as their nonvolatile main storage media. The following assumptions are also made:
a) with "factory installedA new computer with a second version of the operating system.
b) Since it is a new device, it does not contain user files.
c) It contains 64MB of RAM, a hard disk with a storage capacity of 10.2 gigabytes, and built-in CD-RW, multimedia device (removable sound card) and external speakers.
d) There is internet access through an external modem.
e) Suitable for a set of applications for office work (word processor, summary sheet, attachment), desktop publishing, internet email and Web browsing.
f) A printer and an image scanner connected to a computer through parallel ports are used.
g) All required software is available on floppy disks or in CDs. This includesA second version of the operating system; hardware device "drivers"; an application program; and of course updates, patches, and attachments for operating systems and applications.
Once the previous assumptions have been explained, the first component of the present invention can be studied in detail. Thus, only the steps associated with this preferred embodiment need be detailed, organized according to the five previously described phases: (1) preparing a non-volatile primary storage medium, (2) installing and configuring an operating system, (3) installing and configuring an application, (4) restoring user files, and (5) optimizing file defragmentation.
The first stage. Preparing a non-volatile main storage medium
And (1). Making backup copies
This step is skipped because it is a new computer that does not have to make a backup copy of the user files or drivers, as the latter are available on the disk.
And 2. step 2. Generating dedicated zones
The second step consists in generating a private sector base set containing partitions and disk drive "units" needed to provide private sectors for each basic element of device operation, operating system, dynamic files, applications and user files. Since there is space available in the disk, an enclosure set of dedicated sectors may also be generated.
Generating a basic set in a hard drive
It is important to note that all drive "units" that are built within the private sector base set will employ the FAT 32 file system. The basic set is prepared as follows:
a) a main partition is generated and set as an active partition, which is approximately 512MB in size. Drive "C" is generated, occupying 100% of the storage capacity of this partition. This section will save all the files backed up by the operating system.
b) Drive "D" is generated within an expanded partition that will occupy the remaining available space of the hard disk. Its size is just larger than 512MB in parallel. All those dynamic files that are reconfigurable for use by the operating system and application programs will be stored on this driver.
c) Within the extended partition described above, a drive "E" is generated. Its size is parallel to approximately 2,048 MB. This section will contain the files of the software application part.
d) Within the same extended partition, drive "F" is generated. Its size parallels approximately 700 MB. The files generated by the user will be stored on this drive.
Generating additional sets in a hard disk drive
It is important to emphasize that all drive "units" built into the additional set of dedicated zones will use the FAT 32 file system, and will be tied into the extended partition described above. This additional set is planned as follows:
a) a drive "G" is generated that is approximately 700MB in size. The purpose is to store files downloaded from the internet.
b) The same size drive "H" is generated for writing to the cache of the mini-disc.
c) Drives "I" and "J" are generated, each approximately 700MB in size, which are two storage areas for backup copies.
d) Likewise, drivers "K" and "L" are also generated, which are two storage areas for scanning images and music, respectively.
e) Drive "M" is generated with the remaining available space, which is a multipurpose extra region.
Formatting the hard disk drive
All drive "units" generated in the base set as well as the additional set of dedicated zones are formatted.
And 3. step 3. Consider the situation where there is more than one operating system
The third step may be skipped because there need not be more than one operating system installed.
And a second stage. Installing and configuring an operating system
And (1). Installing an operating system
By means ofThe second version is provided with a disk, and an operating system is installed on a driver 'C'. The installation option must allow the user to perform all required activities. In this example, internet access via an external modem is required, which requires installation of all components of dial-up network access and TCP/IP protocol.
And 2. step 2. Driver for installing and configuring a device
The second step is to install and configure the hardware devices required by the user one by one for each existing device by "installing the hardware devices and their drivers" and by "configuring the hardware devices and their drivers" as described below. In keeping with the assumptions made in detail in the apparatus used, as presented at the beginning of the present embodiment, the CD-RW unit will be installed first; then a sound card; followed by a modem; then a printer; and finally a scanner.
Hardware installation device and driver thereof
A driver for a hardware device is installed on a computer using a corresponding installation disk. It is important to emphasize that at this step, only the driver has to be installed; the bundled application is left to the following steps. However, if the application is automatically installed and the installer allows a path to be set for its Files to be stored, the existing folders used for this purpose must be set in "E: \ Program Files", thus enabling these Files to be saved in the drive "E".
Configuration hardware device and driver thereof
It is wise to configure and significantly test the installed hardware devices and their drivers in such a way that the devices are ready for use by the user.
Internet access configuration and testing
a) The required configuration is set to meet all specifications specified by the user selecting an internet service provider.
b) All required connection tests are performed in such a way that the internet service is ready for use by the user.
And 3. step 3. Installation operating system supplement
Installing updates and patches to an operating system
Use is contained inSecond edition operationUpdate and patch tools in the system, which require access to the internet, or install said elements at the drive "C" by means of a corresponding disk.
Installing updates and patches for drivers
By means of atTools for updates and patches in the second version of the operating system, which require access to the internet, or installation of said elements on the drive "C" by means of a corresponding disk.
Installing accessories for operating systems
Due to the fact thatOperating system andthere is a close relationship between the internet explorer programs, at which point it is recommended that the most recent version of this program be installed with strict options. Use includesDisk for attachment of second version operating system, installed in drive' EInternet Explorer and all its components.
Installation of updates and patches to accessories
Updates and patches to newly installed accessories, if needed or available, are facilitated atTools for updates and patches in the second version of the operating system, which require access to the internet, or installation of the components on a computer by means of a corresponding disk.
And 4. step 4. Configuring operating systems and accessories therefor
Configuring an operating system
a) The virtual memory of the operating system is configured such that its swap file resides on driver "D".
b) The "Cookies", "Hitory", "StartMenu", "Media", "Recent", "Tasks", and "Temp" folders located in "C: \ Windows" are transferred to drive "D". This movement requires that the Windows Registry and installation files be modified so that all references to these folders now begin with "D: \".
c) The values of "CommonFilesDir", "ProgramFilesDir", "ProgramFilesPath" in the pathway "HKLM > Software > Microsoft > Windows > CurrentVersion" located within Windows Registry must be modified so that their contents begin with "E: \".
d) The "application Data", "Desktop", and "Offline Web Pages" folders located in "C: \ Windows" are transferred to drive "F". This movement requires that the Windows Registry and installation files be modified so that all references to these folders now begin with "F: \".
e) The "C: \ My documents" folder is transferred to drive "F". This change also requires modification of the modified Windows Registry and installation files so that all references to this folder now begin with "F: \".
Accessory for configuring operating system
a) The "Temporary Internet Files" folder located in "C: \ Windows" is transferred to drive "D". The required adjustments must be made in the Windows Registry so that all references to this folder now start with "D: \".
b) The "Favorites" folder located in "C: \ Windows" is transferred to drive "F". The required adjustments must similarly be made in the Windows Registry so that all references to this folder now start with "F: \".
And 5. step 5. Replicated operating system uninstalled applications
The "C: \ program files" folder is transferred to drive "E". All the changes needed must be made in the windows registry, installation files, and all shortcuts so that all references to this folder now start with "E: \".
And 6. step 6. Consider the situation where there is more than one operating system
The sixth step is skipped because no additional operating system needs to be installed.
And a third stage. Installing and configuring applications
It is important to remember that the first three steps of this phase focus on one application. Thus, all applications identified as suitable for installation must go through three steps, one at a time, until they have all been installed:
and (1). Installing an application and its supplementation
Installing an application
The corresponding installation disk is used, and the application program is installed at this time. When the installer allows the setting of the path in which its Files will be located, a folder must be selected for this purpose within the "E: \ Program Files" folder, thus enabling all Files to be installed into drive "E".
Installing updates and patches for an application
Using the disk containing the updates and patches matching the application, it is then done to install those elements, ensuring that their files are installed into drive "E".
Accessory for installing application program
Using the disk containing the corresponding attachments for the application, it is then done to install those elements, ensuring that their files are installed into the drive "E".
And 2. step 2. Configuring an application and its accessories
Configuring an application
a) If the application provides a way to do so, the adjustments needed are made so that dynamic files of the application, such as error and event records, are stored in drive "D". Among the adjustments described are adjustments that must be made in the Windows Registry and those installation files that refer to these one element so that all references to this folder now begin with "D: \".
b) Installing the application opens up possibilities for unwanted changes to values within Windows Registry, such as all the values of "CommonFilesDir", "ProgramFilesDir", "ProgramFilessPath" in the pathway "HKLM > Software > Microsoft > Windows > Currentversion". If so, these values should be modified so that their content starts again with "E: \".
c) If the application provides a way to do so, the required adjustments are made so as to relate to the "F: \ My documents" folder, or any other folder within the drive "F", and the resulting files are stored by default in this drive when the user wishes to save/her work. Among the changes are those that must be made in the Windows Registry and installation files in order for all references to this folder to begin with "F: \". Examples of how this can be better represented include, but are not limited to, the following. If the email application provides a way to configure the physical location of those files that store messages and communications, then such a configuration must be made so that all relevant files are stored in drive "F".
d) The necessary adjustments are made if the application provides a do-it-place response so that such application can identify and employ the special segments generated in the append transaction. Among the adjustments are those that must be made in the Windows Registry and installation files in order to update all of the related sections. Examples of how this can be better represented include, but are not limited to, the following. (1) If an application for CD-R or CD-RW recording can configure its cache location, the parameters are adjusted so that the drive "H" can be used for this purpose. (2) Another example would be to configure applications that use image scanners such that they employ a drive "K" for the purpose of storing scanned digital images.
Accessory for configuring application
a) With the application attachment allowing this, the necessary adjustments are made so that the dynamic file is stored on drive "D". Among the changes are those that must be made in the Windows Registry and installation files so that all references to this dynamic file now begin with "D: \".
b) With application attachments that allow this, the necessary adjustments are made so that when the user wishes to save his/her work, these attachments relate to the "F: \ My documents" folder; these changes allow user data to be saved at drive "F". Among the adjustments are those that must be made in the Windows Registry and installation files so that all references to this folder now begin with "F: \".
c) With application attachments that allow this, the necessary adjustments are made so that those attachments can identify and use the dedicated field generated in the additional set. Adjustments made in the Windows Registry and installation files are also made, if necessary, to update all of the involved sections. Examples of such a scenario include, but are not limited to, the following scenarios. Accessories using image scanners are configured so that they can utilize the drive "K" as a storage area for scanned images.
And 3. step 3. Reconfiguring files offloaded from an operating system
In the case where the installer of the application deposits Files on the path "C: \ Program Files", the contents of any existing folders are transferred to "E: \ Program Files". The required adjustments must be made in the Windows Registry and all shortcuts so that references to these folders now begin with "E: \".
And 4. step 4. Consider the situation where there is more than one operating system
The fourth step is skipped because no additional operating system needs to be installed.
And a fourth stage. Restoring user files
This stage is skipped because the new computer has no user files.
And a fifth stage. Optimizing defragmentation of files
At this stage, an optimized defragmentation process is performed at each drive "unit". For better results, it is proposed to employ defragmentation tools and different file placement schemes that are best suited for each drive.
It is important to emphasize that the preferred embodiments shown above are only examples and that the first component of the present invention is not limited to use only in a simulated environment. This means that in other instances those adaptations and considerations-or any components thereof-will be apparent to those skilled in the art in order to employ the present invention, provided such environment is included within the scope of the present invention.
Claims (19)
1. A method of optimizing computer performance, the method comprising:
A) preparing a non-volatile main storage medium to include a basic set of dedicated sections, the set including a section in which files of the operating system portion are installed; a section for dynamic files, temporary files or files that are frequently modified as a result of tasks inherent to the operation of the operating system and application programs; a section of a file for the application portion; and a section for user files;
B) installing drivers for the operating system and hardware devices, and related updates, patches and attachments that contribute to their optimization operations, fine-tuned by configuration and relocation of requisite files, so that the installed elements are placed in their corresponding dedicated sections so that they can recognize and use these sections, and separate them at the physical level from the logical level;
C) installing applications and other updates, patches and attachments that contribute to their optimization operation, optimized by the configuration and relocation of the requisite files, so that the elements installed at this step are deposited in their matching dedicated sections, so that existing sections can be identified and used, and separated at the physical level from the logical level;
D) after completion of the previous steps, optimized defragmentation of files is performed in those dedicated sections that reside for the basic elements of the device operation.
2. The method of claim 1 wherein in the event that more than one installed operating system is required, steps a), B), C) and D) are repeated for each additional operating system so that each has its own base set of dedicated sectors.
3. The method of claim 1, wherein said step a) of preparing the non-volatile primary storage medium further comprises, prior to preparing the non-volatile primary storage medium, generating a backup copy of those files that are useful to the user and the operation of the hardware devices within the computer.
4. The method of claim 1, wherein the method further comprises an additional step of restoring the backup copy of the user file in the corresponding dedicated zone by placing said user file at a location configured in step C) of installing the application, and completing such restoration prior to performing the optimized defragmentation step D).
5. The method of claim 4, wherein the method further comprises the additional steps of including in the additional steps for restoring the backup copy the additional configuration necessary in the operating system and applications, and the necessary transformations in the restored file, so that the user can use his/her information.
6. The method of claim 1, wherein said step a) of preparing the non-volatile main storage medium further comprises generating an additional set of dedicated sections in which those non-essential elements for the operation of the optimized device reside, which are separated at the physical level from the logical level.
7. The method of claim 1, wherein said step B) of installing the operating system further comprises selecting available options if the program directing the installation of each component installed at this step allows setting the location of one or more important and non-important components for the operation of the device, such that this configuration is permanently set and said components are placed in their own dedicated sections from the moment they are installed.
8. The method of claim 1, wherein said step C) of installing an application further comprises selecting available options if the installed program running each element installed at this step allows setting the position of one or more important and non-important elements for the operation of the device, such that this configuration is permanently set and said elements are placed in their own dedicated sections from the moment they are installed.
9. The method of claim 1, wherein said step D) of optimizing defragmentation further comprises defragmenting each dedicated sector generated in the non-volatile main storage medium.
10. The method of claim 1, wherein said step D) of optimizing defragmentation further comprises using a defragmentation tool that allows different file placement schemes to be employed, which are most suitable for the specific purpose of the section being defragmented.
11. The method of claim 1, wherein the method can be used to optimize computers of different types or platforms; in different types of devices that may be used as non-volatile primary storage media; and use different operating systems or applications.
12. A complementary method for accelerating the use of a computer performance optimization method, the method comprising:
A) preparing a non-volatile main storage medium of a 'main' computer to contain a basic set of dedicated sections, the set containing a section in which files of the operating system part are installed; a section for dynamic files, temporary files or files that are frequently modified as a result of tasks inherent to the operation of the operating system and application programs; a section of a file for the application portion; and a section for user files;
B) installing drivers for the operating system and hardware devices in the "host" computer, and related updates, patches and attachments that contribute to their user operation, fine-tuned by configuration and relocation of requisite files, so that the installed elements are placed in their corresponding dedicated sections so that they can recognize and use these sections, and separate them at the physical level from the logical level;
C) installing applications and other updates, patches and attachments in the "host" computer that contribute to their optimization operation, optimized by configuration and relocation of the requisite files, so that the elements installed at this step are deposited in their matching dedicated sections, so that existing sections can be identified and used, and separated from the logical level at the physical level;
D) after completion of the previous steps, an optimized defragmentation of the files in said "master" computer is carried out in dedicated sectors that reside in the basic elements for the operation of the device; and
E) one or more "replica" computers are optimized by employing, separately or in combination, commercially available software tools, hardware devices and other storage media for such purposes, so as to quickly replicate in all "replica" computers the optimized state of the "master" computer that has been optimized at the previous step, so that in the matching media of each of the "replica" computers, an exact copy of the structure and content of the "master" computer non-volatile master storage media is produced.
13. The method of claim 12. Wherein the method further comprises an additional step of:
F) the final adjustments to the optimized computer are made by configuring parameters in those machines that need to be performed to distinguish certain machines from others where they are matched.
14. The method of claim 12. Wherein the method further comprises an additional step of:
G) as in the case of step C) of installing the application, the final adjustments are made to the optimized computer by installing the additional software required in those machines for a specific group of users.
15. The method of claim 12, wherein the method can be used to optimize different types of computers or platforms; in different types of devices that may be used as non-volatile primary storage media; and use different operating systems or applications.
16. A non-volatile main storage medium optimized with dedicated sections, obtained after using a computer performance optimization method or a complement thereof, wherein the non-volatile main storage medium comprises a basic set of dedicated sections, which host four basic elements for device operation, separated at the physical level from the logical level, such that said basic set is integrated through a section of a file housing an operating system part; for a section of dynamic files, i.e., those files that are temporarily or frequently modified as a result of tasks inherent to the operation of the operating system and applications; a section of a file for an application portion; and a section for a user file.
17. The non-volatile primary storage medium of claim 16, wherein the peer optionally includes an additional set of dedicated sectors in which non-essential elements for device operation reside, separated at the physical level from the logical level.
18. The non-volatile primary storage medium of claim 16 wherein, in the case where more than one operating system is installed, each additional operating system has its corresponding base set of dedicated sectors; it is installed in its own sector of such a basic set; it is the "neighborhood" of those dynamic files, applications, and user files with which it is compatible; and they are both separated at the physical level from the logical level; furthermore, it is possible that it has its own additional set of dedicated sectors, where the non-essential elements for the operation of the device with which it is compatible are stored, again separated at the physical level from the logical level.
19. The non-volatile primary storage medium of claim 16, wherein the same situation may occur in different types or platforms of computers; in different types of devices that may be used as non-volatile primary storage media; and use different operating systems or applications.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MXPA/A/2001/012371 | 2001-11-30 | ||
| MXPA01012371A MXPA01012371A (en) | 2001-11-30 | 2001-11-30 | Method for optimizing the performance of a computer and main non-volatile storage mean optimized with specific purpose sections. |
| PCT/MX2002/000110 WO2003046714A1 (en) | 2001-11-30 | 2002-11-28 | Method of optimising the performance of a computer and a main non-volatile memory unit optimised using specific-use sections |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| HK1075102A1 HK1075102A1 (en) | 2005-12-02 |
| HK1075102B true HK1075102B (en) | 2010-04-30 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20070226395A1 (en) | Method of optimising the performance of a computer and a main non-volatile memory unit optimised using specific-use sections | |
| JP6708929B2 (en) | Storage control device, storage system, and storage control program | |
| US6108759A (en) | Manipulation of partitions holding advanced file systems | |
| US8005797B1 (en) | File-level continuous data protection with access to previous versions | |
| EP0786111B1 (en) | Snapshot of data stored on a mass storage system | |
| JP4235362B2 (en) | Program installation method and computer-readable recording medium | |
| CN103026343B (en) | Method and system for defining lifecycle policies for data mirroring | |
| US6253300B1 (en) | Computer partition manipulation during imaging | |
| US8667246B2 (en) | System for virtual disks version control | |
| JPH04233639A (en) | file management system | |
| KR100317691B1 (en) | Efficient volume copy using pre-configuration of log structured target storage | |
| WO2000055735A1 (en) | Manipulation of computer volume segments | |
| JPH10510642A (en) | Computer data storage | |
| CN112214279B (en) | Method and system for creating virtual machine based on disk mirror image | |
| JP2005018233A (en) | Method for backing up data recorded on virtual storage medium and backup device for data recorded on virtual storage medium | |
| US20060200639A1 (en) | System and method for computer backup and recovery using incremental file-based updates applied to an image of a storage device | |
| CN101710373B (en) | File operation method of embedded system | |
| US8170991B1 (en) | Method and apparatus for managing image data on a sequential storage device | |
| CN101154172A (en) | Method for centralized establishing dependent snapshot | |
| HK1075102B (en) | Method of optimising the performance of a computer and a main non-volatile memory unit optimised using specific-use sections | |
| JP4394467B2 (en) | Storage system, server apparatus, and preceding copy data generation method | |
| CN1139878C (en) | Method of performing formatting | |
| JP4390618B2 (en) | Database reorganization program, database reorganization method, and database reorganization apparatus | |
| EP1817673A2 (en) | Method and system for managing data transfer between different types of tape media | |
| JP4086600B2 (en) | FAT file system and program capable of rollback |