Datakeeper for Windows All Documentation

Total Page:16

File Type:pdf, Size:1020Kb

Datakeeper for Windows All Documentation DataKeeper for Windows v8.4 Technical Documentation July 2016 This document and the information herein is the property of SIOS Technology Corp. (previously known as SteelEye® Technology, Inc.) and all unauthorized use and reproduction is prohibited. SIOS Technology Corp. makes no warranties with respect to the contents of this document and reserves the right to revise this publication and make changes to the products described herein without prior notification. It is the policy of SIOS Technology Corp. to improve products as new technology, components and software become available. SIOS Technology Corp., therefore, reserves the right to change specifications without prior notice. LifeKeeper, SIOS and SIOS DataKeeper are registered trademarks of SIOS Technology Corp. Other brand and product names used herein are for identification purposes only and may be trademarks of their respective companies. To maintain the quality of our publications, we welcome your comments on the accuracy, clarity, organization, and value of this document. Address correspondence to: [email protected] Copyright © 2016 By SIOS Technology Corp. San Mateo, CA U.S.A. All rights reserved Table of Contents Chapter 1: Introduction 1 SIOS DataKeeper Overview 1 Features 2 User Interface 3 SIOS DataKeeper User Interface 3 DataKeeper Components 4 DataKeeper Service Log On ID and Password Selection 5 Understanding Replication 11 How SIOS DataKeeper Works 11 SIOS DataKeeper Intent Log 11 Non-Shared Volumes 12 Shared Volumes 12 Configuration Issue 12 Relocation of Intent Log 12 SIOS DataKeeper Resynchronization 13 Initial Creation of a Mirror 13 Example: Whitespace Elimination 14 Synchronous and Asynchronous Mirroring 14 Synchronous Mirroring 14 Asynchronous Mirroring 15 Mirror PAUSED 18 Mirror RESYNCING 19 Read and Write Operations 20 Volume Considerations 21 What Volumes Cannot be Mirrored 21 Table of Contents i Volume Size Considerations 21 Specifying Network Cards for Mirroring 22 Dedicated LAN for Replication 22 Performance Monitor Counters 22 Mirror State Counters 23 Mirror Elapsed Time 23 Mirror State 23 Mirror Type 24 Network Number of Reconnects 24 Write Queue Counters 24 Queue Current Length 24 Queue High Water 24 Queue Low Water 25 Resynchronization Control Counters 25 Resync Reads 25 Resync Current Block 25 Resync Dirty Blocks 25 Resync Elapsed Time 26 Resync New Writes 26 Resync Pass 26 Resync Total Blocks 26 Resync Phase 27 Chapter 2: Installation 28 Chapter 3: Configuration 29 Requirements/Considerations 29 Sector Size 29 Network Bandwidth 29 Determine Network Bandwidth Requirements 29 Measuring Rate of Change 30 Network Adapter Settings 30 Table of Contents ii DataKeeper Service Log On ID and Password Selection 31 Firewall Configurations 37 Configuring Microsoft's Windows Firewall with Advanced Security - Example 38 High-Speed Storage Best Practices 41 Configure Bitmaps 41 Disk Partition Size 41 Handling Unmanaged Shutdown Issues 42 Other Recommendations/Suggestions 42 Configuration of Data Replication From a Cluster Node to External DR Site 43 WAN Considerations 43 Initial Synchronization of Data Across the LAN or WAN 43 Verifying Data on the Target Volume 45 Compression 46 Bandwidth Throttle 46 Chapter 4: Administration 47 DataKeeper Event Log Notification 47 Primary Server Shutdown 48 Secondary Server Failures 48 Extensive Write Considerations 49 CHKDSK Considerations 49 DKSUPPORT 49 DKHEALTHCHECK 50 Event Log Considerations 50 Using Disk Management 51 Registry Entries 51 Registry Entries that MAY be Modified 51 BandwidthThrottle † 52 BitmapBaseDir* 52 CompressionLevel † 52 DontFlushAsyncQueue * 53 Table of Contents iii PingInterval * 53 MaxResyncPasses * 53 ResyncReads 54 TargetPortBase * 54 TargetPortIncr * 54 TargetDispatchPort * † 55 WriteQueueHighWater * † 56 WriteQueueLowWater*† 57 SnapshotLocation * 57 TargetSnapshotBlocksize * 57 Registry Entries that SHOULD NOT be Modified 58 ErrorControl 58 DisplayName 59 ImagePath 59 Start 59 Type 59 ErrorControl 60 Group 60 Start 60 Tag 60 Type 61 BuildDate 61 BuildTime 62 LastStartTime 62 Version 62 Failover 63 MirrorRole 63 SnapshotDevice 63 VolumeAttributes 63 BitmapFileEnabled 64 Table of Contents iv BitmapFileValid 65 Enabled 65 TargetDriveLetter 65 SourceDriveLetter 66 MirrorState 66 MirrorType 67 CleanShutdown 67 BreakUserRequested 67 RemoteName 68 Chapter 4: Using EMCMD with SIOS DataKeeper 69 Mirror State Definitions 69 BREAKMIRROR 70 CHANGEMIRRORENDPOINTS 70 1x1 Mirror CHANGEMIRRORENDPOINTS Command Example 71 2x1 Mirror CHANGEMIRRORENDPOINTS Command Example 72 1x1x1 Mirror CHANGEMIRRORENDPOINTS Command Example 73 CLEARBLOCKTARGET 74 CLEARSNAPSHOTLOCATION 74 CLEARSWITCHOVER 75 CONTINUEMIRROR 75 CREATEJOB 75 CREATEMIRROR 76 DELETEJOB 77 DELETELOCALMIRRORONLY 77 DELETEMIRROR 77 DROPSNAPSHOT 77 GETBLOCKTARGET 78 GETCOMPLETEVOLUMELIST 78 GETCONFIGURATION 79 GETEXTENDEDVOLUMEINFO 79 Table of Contents v GETJOBINFO 80 GETJOBINFOFORVOL 80 GETMIRRORTYPE 80 GETMIRRORVOLINFO 81 GETREMOTEBITMAP 81 GETRESYNCSTATUS 82 GETSERVICEINFO 83 GETSNAPSHOTLOCATION 84 GETSOURCEMIRROREDVOLUMES 84 GETTARGETMIRROREDVOLUMES 85 GETVOLUMEDRVSTATE 85 GETVOLUMEINFO 86 ISBREAKUSERREQUESTED 87 ISPOTENTIALMIRRORVOL 87 LOCKVOLUME 88 MERGETARGETBITMAP 88 PAUSEMIRROR 88 PREPARETOBECOMETARGET 89 READREGISTRY 89 RESTARTVOLUMEPIPE 90 RESYNCMIRROR 90 SETBLOCKTARGET 90 SETCONFIGURATION 90 SETSNAPSHOTLOCATION 91 STOPSERVICE 92 SWITCHOVERVOLUME 92 TAKESNAPSHOT 93 UNLOCKVOLUME 93 UPDATEJOB 93 UPDATEVOLUMEINFO 93 Table of Contents vi Chapter 5: Using DKPwrShell with SIOS DataKeeper 95 New-DataKeeperMirror 95 Parameters 95 Inputs 96 Outputs 96 New-DataKeeperJob 96 Parameters 96 Inputs 97 Outputs 97 Remove-DataKeeperMirror 97 Parameters 97 Inputs 98 Outputs 98 Remove-DataKeeperJob 98 Parameters 98 Inputs 98 Outputs 98 Add-DataKeeperJobPair 98 Parameters 99 Inputs 99 Outputs 99 Get-DataKeeperVolumeInfo 100 Parameters 100 InputsNone 100 Outputs 100 Chapter 6: User Guide 101 Getting Started 101 Choose Your Configuration 101 Disk-to-Disk 101 One-to-One 102 Table of Contents vii One-to-Many (Multiple Targets) 104 Many-to-One 105 N-Shared-Disk Replicated to One 106 N-Shared-Disk Replicated to N-Shared-Disk 107 N-Shared-Disk Replicated to Multiple N-Shared-Disk Targets 108 Setting Up SIOS DataKeeper 109 Connecting to a Server 109 Disconnecting from a Server 110 Creating a Job 110 Configuring Mirrors 110 Creating a Mirror 110 Creating the Mirror 111 Creating Mirrors With Shared Volumes 112 Safe Creation of a Shared-Storage Volume Resource 115 Creating Mirrors With Multiple Targets 116 Switchover and Failover with Multiple Targets 117 Manual Switchover to a Target Server 118 Source Server Failure - Manual Switchover to a Target Server 119 Working With Jobs 120 Jobs 120 Renaming a Job 121 Deleting a Job 122 Reassigning a Job 122 Switching Over a Mirror 122 Requirements for Switchover 123 Working With Mirrors 123 Managing Mirrors 123 Pause and Unlock 124 Continue and Lock 124 Partial Resync 124 Table of Contents viii Break 124 Resync 125 Deleting a Mirror 125 Replacing a Target 125 Using the BREAK Command 126 Using the DELETE Command 126 DataKeeper Volume Resize 126 Non-Shared Volume Procedure 126 Shared Volume Procedure - Basic Disk 127 Error Handling: 127 Restrictions 128 Mirror Properties 128 Changing the Compression Level of an Existing Mirror 130 Working With Shared Volumes 131 Managing Shared Volumes 131 Adding a Shared System 132 Removing a Shared System 133 Using Microsoft iSCSI Target With DataKeeper on Windows 2012 133 Installation of the iSCSI Target 134 Creation of Mirror and Configuration of Cluster 136 Creation of iSCSI Virtual Disks 139 Setting Up Multiple Virtual Disks Within the Same Target Name 141 Setup of iSCSI Initiator on Windows 2012 141 DataKeeper Notification Icon 143 Auto-Start at Login 145 DataKeeper Target Snapshot 145 Overview 145 When To Use Target Snapshot 146 How To Use Target Snapshot 146 How Target Snapshot Works 146 Table of Contents ix Quiescing the Database/Application 147 Read and Write I/O Requests 147 Source Write 147 Local Write 148 Target Read Request 149 Using Target Snapshot 149 Configuring the Snapshot Location 149 Snapshot Location Size 150 Snapshot Location Selection 150 Taking a Snapshot 153 Dropping a Snapshot 153 Disabling Target Snapshot for a Given Volume 153 Target Snapshot Notes 154 Supported Configurations 154 Source Out of Service 154 Switchovers and Failovers 154 Files / Disk Devices / Registry Entries 154 TargetSnapshotBlocksize Registry Value 156 SQL Server Notes 156 Known Issues 156 Microsoft .NET Framework 3.5 SP1 Requirement 156 NTFS File System Message 156 Application Data Using Snapshot 157 Volume Shadow Copy Service (VSS) Free Disk Space Requirements 157 Using SIOS DataKeeper Standard Edition To Provide Disaster Recovery For Hyper-V Vir- tual Machines 157 Considerations 157 Preparing the Environment 157 Create and Configure a Hyper-V Virtual Machine 158 Install an Operating System and Any Required Applications in the Virtual Machine 162 Table of Contents x Configure the Target Server to Run the Virtual Machine 162 Planned/Unplanned Switchover 166 Planned Switchover 166 Unplanned Switchover 168 Switchback 169 Chapter 7: Frequently Asked Questions 170 Awareness of Windows Filenames and Directory Names 170 Change Mirror Endpoints 170 Change Mirror Type 170 Create a Mirror and Rename Job and Delete Job Actions Grayed Out 170 Data Transfer Network Protocols 171 Delete and Switchover Actions Grayed Out 171 Deleting a Mirror FAQ 171 Error Messages Log 171 Inability to Create a Mirror 172 Network
Recommended publications
  • Bitmap Graphics Model - Device Context • Windows Does Not Retain a Copy of What the Application Drew • Windows 3.0 (1990)
    historie 08.11.2018 vjj 1 pravěk INPUT PROGRAM OUTPUT 08.11.2018 vjj 2 evoluce • dávkové zpracování • interaktivní práce • prompt • GUI 08.11.2018 vjj 3 evoluce INPUT PROGRAM OUTPUT 08.11.2018 vjj 4 evoluce Windows • bitmap graphics model - Device Context • Windows does not retain a copy of what the application drew • Windows 3.0 (1990) • bitmap graphics model - layered Device Context • Windows does retain a copy of the drawing as a bitmap • Windows 2000 (beta 1998) • .NET Framework (2001-2005) • vector graphics model – WPF (on DirectX) • tree of user-interface elements with objects representing graphical shapes • Windows Vista, .NET Framework 3.0 (2006) • Metro - deterioration • Windows 8, .NET Framework 4.5 (2012) 08.11.2018 vjj 5 1: Win32 API classique 08.11.2018 vjj 6 Uživatel Fronta zpráv GetMessage (mouse, keyboard) hardware interrupt DRIVER DispatchMessage System message queue WindowProc WindowProc RIT Raw Input Thread Fronta zpráv 8.11.18 vjj 7 WM_PAINT • každý ovládací prvek je samostatným oknem s vlastní procedurou na zpracovávání zpráv • celá stavba programu/algoritmu se točila kolem přípravy dat pro vykreslení obsahu okna vždy, když přišla zpráva WM_PAINT (a že chodila často) • během přímého kreslení se výstup do momentálně neviditelné části okna nikam nezapsal 08.11.2018 vjj 8 User Windows OS Invalidate... Program WM_PAINT GetDC Program Funkce GDI32 / GDI+ Graphics Card Frame Buffer for Screen Image data only retained as long as it remains visible on screen 08.11.2018 vjj 9 PROGRAM: direct Device Context OUTPUT PROGRAM PROGRAM PROGRAM PROGRAM PROGRAM WM_PAINT WM_PAINT WM_PAINT WM_PAINT WM_PAINT 08.11.2018 vjj 10 standardní funkce • TextOut • MoveToEx DrawText LineTo Rectangle Ellipse • DrawIcon Pie Arc Chord Polyline • BitBlt Polygon stretchBlt 08.11.2018 vjj 11 Device Context • standardní funkce pro kreslení do okna vyžadují hDC jako svůj první parametr • datová struktura popisující vlastnosti výstupu, např.
    [Show full text]
  • Guidelines for Designing Embedded Systems with Windows 10 Iot Enterprise
    Guidelines for Designing Embedded Systems with Windows 10 IoT Enterprise Version 2.0 Published July 15, 2016 Guidelines for designing embedded systems 1 CONFIDENTIAL Contents Overview .................................................................................................................................................................................................... 4 Building a task-specific experience ............................................................................................................................................ 4 General Group Policy settings ....................................................................................................................................................... 4 Application control ................................................................................................................................................................................ 5 Application boot options ................................................................................................................................................................. 5 Auto-boot Universal Windows apps ...................................................................................................................................... 5 Auto-boot Classic Windows apps ........................................................................................................................................... 5 Limit application access with AppLocker ...............................................................................................................................
    [Show full text]
  • Zero-Day Vulnerability in Desktop Window Manager (CVE-2021-28310) Used in the Wild | Securelist
    4/14/2021 Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild | Securelist Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild securelist.com/zero-day-vulnerability-in-desktop-window-manager-cve-2021-28310-used-in-the-wild/101898 While analyzing the CVE-2021-1732 exploit originally discovered by the DBAPPSecurity Threat Intelligence Center and used by the BITTER APT group, we discovered another zero-day exploit we believe is linked to the same actor. We reported this new exploit to Microsoft in February and after confirmation that it is indeed a zero-day, it received the designation CVE-2021-28310. Microsoft released a patch to this vulnerability as a part of its April security updates. We believe this exploit is used in the wild, potentially by several threat actors. It is an escalation of privilege (EoP) exploit that is likely used together with other browser exploits to escape sandboxes or get system privileges for further access. Unfortunately, we weren’t able to capture a full chain, so we don’t know if the exploit is used with another browser zero-day, or coupled with known, patched vulnerabilities. The exploit was initially identified by our advanced exploit prevention technology and related detection records. In fact, over the past few years, we have built a multitude of exploit protection technologies into our products that have detected several zero-days, proving their effectiveness time and again. We will continue to improve defenses for our users by enhancing technologies and working with third-party vendors to patch vulnerabilities, making the internet more secure for everyone.
    [Show full text]
  • Mastering Powershellpowershell
    CopyrightCopyright © 2009 BBS Technologies ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems except as permitted under Section 107 or 108 of the 1976 United States Copyright Act without the prior written permission of the publisher. For permission to use material from the text please contact Idera at [email protected]. Microsoft® Windows PowerShell® and Microsoft® SQL Server® are registered trademarks of Microsoft Corporation in the United Stated and other countries. All other trademarks are the property of their respective owners. AboutAbout thethe AuthorAuthor Dr. Tobias Weltner is one of the most visible PowerShell MVPs in Europe. He has published more than 80 books on Windows and Scripting Techniques with Microsoft Press and other publishers, is a regular speaker at conferences and road shows and does high level PowerShell and Scripting trainings for companies throughout Europe. He created the powershell.com website and community in an effort to help people adopt and use PowerShell more efficiently. As software architect, he created a number of award-winning scripting tools such as SystemScripter (VBScript), the original PowerShell IDE and PowerShell Plus, a comprehensive integrated PowerShell development system. AcknowledgmentsAcknowledgments First and foremost, I’d like to thank my family who is always a source of inspiration and encouragement. A special thanks to Idera, Rick Pleczko, David Fargo, Richard Giles, Conley Smith and David Twamley for helping to bring this book to the English speaking world.
    [Show full text]
  • Security Policy Page 1 of 20
    Security Policy Page 1 of 20 Security Policy This security policy contains data to configure services and network security based on the server’s role, as well as data to configure registry and auditing settings. Server: VENGWIN207 Services Service Name Startup Mode Description Issues, manages, and removes X.509 certificates for such applications such as Active Directory Certificate S/MIME and SSL. If the service is stopped, Disabled Services certificates will not be issued. If this service is disabled, any services that explicitly depend on it will fail to start. AD DS Domain Controller service. If this service is stopped, users will be unable to log Active Directory Domain Services Disabled on to the network. If this service is disabled, any services that explicitly depend on it will fail to start. AD FS Web Agent Authentication The AD FS Web Agent Authentication Service Disabled Service validates incoming tokens and cookies. Adobe Acrobat Updater keeps your Adobe Adobe Acrobat Update Service Automatic software up to date. Sends logging messages to the logging database when logging is enabled for the Active Directory Rights Management Services role. If this service is disabled or stopped AdRmsLoggingService Disabled when logging is enabled, logging messages will be stored in local message queues and sent to the logging database when the service is started. Processes application compatibility cache Application Experience Disabled requests for applications as they are launched Provides administrative services for IIS, for example configuration history and Application Pool account mapping. If this Application Host Helper Service Disabled service is stopped, configuration history and locking down files or directories with Application Pool specific Access Control Entries will not work.
    [Show full text]
  • Windows Tweaks Guide
    Windows Tweaks Guide For By Windows Geeks Team Introduction .......................................................................................................................................... 5 Important Notes on This Guide........................................................................................................... 5 Usage Instruction.................................................................................................................................. 5 No Warranty .......................................................................................................................................... 5 Hosting, Distribution & Translation ................................................................................................... 6 Tweaks for Windows XP ...................................................................................................................... 6 Before You Begin Tweaking XP ................................................................................................. 6 Tweaks for Startup ..................................................................................................................... 8 Tweaks for Shutdown .............................................................................................................. 10 Tweaks for Mouse .................................................................................................................... 10 Tweaks for Start Menu ............................................................................................................
    [Show full text]
  • 05 Vcloud Services Consultant
    Optimizing Windows for VMware View 4.5 Optimizing Windows for VMware View™ 4.5 (Optimizing Windows 7, Windows Vista and XP) Version 2.0 For use only by VMware PSO and VMware Solution Providers Consulting Service Delivery Aid – Not a Customer Deliverable Optimizing Windows for VMware View 4.5 Version History Date Ver. Author Description Rev iewers February 2011 V2.0 Tim Federwitz Second Release (Added Dav id Richardson, John Windows XP and Vista) Dodge, Matt Coppinger, Matt Wood August 2010 V1.0 Tim Federwitz First Release (Windows 7 John Dodge, Matt only ) Coppinger, Matt Lesak, Ry an Miersma, Justin Venezia © 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html . VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc 3401 Hillview Ave Palo Alto, CA 94304 www.vmware.com © 2011 VMware, Inc. All rights reserved. Page 2 of 44 Optimizing Windows for VMware View 4.5 Contents 1. Introduction ......................................................................................... 4 1.1 Comparing Default and Optimized Windows 7 Installations ........................................ 4 1.2 How to use this Guide ............................................................................................... 4 2.
    [Show full text]
  • Tweakhound, Windows 7 Beta Default Services
    Sheet1 Name Startup Type Adaptive Brightness Manual AppID Service Manual Application Experience Manual Application Information Manual Application Layer Gateway Service Manual Application Management Manual Background Intelligent Transfer Service Automatic (Delayed Start) Base Filtering Engine Automatic BitLocker Drive Encryption Service Manual Block Level Backup Engine Service Manual Bluetooth Support Service Manual BranchCache Manual Certificate Propagation Manual CNG Key Isolation Manual COM+ Event System Automatic COM+ System Application Manual Computer Browser Automatic Credential Manager Service Manual Cryptographic Services Automatic DCOM Server Process Launcher Automatic Desktop Window Manager Session Manager Automatic DHCP Client Automatic Diagnostic Policy Service Automatic Diagnostic Service Host Manual Diagnostic System Host Manual Disk Defragmenter Manual Distributed Link Tracking Client Automatic Distributed Transaction Coordinator Manual DNS Client Automatic Encrypting File System (EFS) Manual Extensible Authentication Protocol Manual Fax Manual Function Discovery Provider Host Manual Function Discovery Resource Publication Automatic Group Policy Client Automatic Health Key and Certificate Management Manual HomeGroup Listener Manual HomeGroup Provider Manual Human Interface Device Access Manual IKE and AuthIP IPsec Keying Modules Automatic Interactive Services Detection Manual Internet Connection Sharing (ICS) Disabled IP Helper Automatic IPsec Policy Agent Manual KtmRm for Distributed Transaction Coordinator Manual Link-Layer
    [Show full text]
  • 3D Graphics for Virtual Desktops Smackdown
    3D Graphics for Virtual Desktops Smackdown 3D Graphics for Virtual Desktops Smackdown Author(s): Shawn Bass, Benny Tritsch and Ruben Spruijt Version: 1.11 Date: May 2014 Page i CONTENTS 1. Introduction ........................................................................ 1 1.1 Objectives .......................................................................... 1 1.2 Intended Audience .............................................................. 1 1.3 Vendor Involvement ............................................................ 2 1.4 Feedback ............................................................................ 2 1.5 Contact .............................................................................. 2 2. About ................................................................................. 4 2.1 About PQR .......................................................................... 4 2.2 Acknowledgements ............................................................. 4 3. Team Remoting Graphics Experts - TeamRGE ....................... 6 4. Quotes ............................................................................... 7 5. Tomorrow’s Workspace ....................................................... 9 5.1 Vendor Matrix, who delivers what ...................................... 18 6. Desktop Virtualization 101 ................................................. 24 6.1 Server Hosted Desktop Virtualization directions ................... 24 6.2 VDcry?! ...........................................................................
    [Show full text]
  • Release 343 Graphics Drivers for Windows, Version 344.48. RN
    Release 343 Graphics Drivers for Windows - Version 344.48 RN-W34448-01v02 | September 22, 2014 Windows Vista / Windows 7 / Windows 8 / Windows 8.1 Release Notes TABLE OF CONTENTS 1 Introduction to Release Notes ................................................... 1 Structure of the Document ........................................................ 1 Changes in this Edition ............................................................. 1 2 Release 343 Driver Changes ..................................................... 2 Version 344.48 Highlights .......................................................... 2 What’s New in Version 344.48 ................................................. 3 What’s New in Release 343..................................................... 5 Limitations in This Release ..................................................... 8 Advanced Driver Information ................................................. 10 Changes and Fixed Issues in Version 344.48.................................... 14 Open Issues in Version 344.48.................................................... 15 Windows Vista/Windows 7 32-bit Issues..................................... 15 Windows Vista/Windows 7 64-bit Issues..................................... 15 Windows 8 32-bit Issues........................................................ 17 Windows 8 64-bit Issues........................................................ 17 Windows 8.1 Issues ............................................................. 18 Not NVIDIA Issues..................................................................
    [Show full text]
  • Status Name Startup Type Log on As Started Acronis Nonstop Backup Service Automatic Local System Started Acronis Scheduler2
    Status Name Startup Type Log On As Started Acronis Nonstop Backup Service Automatic Local System Started Acronis Scheduler2 Service Automatic Local System Started Acronis Sync Agent Service Automatic (Delayed Start) Local System Started Application Experience Manual Local System Started Background Intelligent Transfer Service Automatic (Delayed Start) Local System Started Base Filtering Engine Automatic Local Service Started Bluetooth Device Monitor Automatic (Delayed Start) Local System Started Bluetooth Media Service Automatic (Delayed Start) Local System Started Bluetooth OBEX Service Automatic (Delayed Start) Local System Started Bluetooth Support Service Manual Local Service Started CNG Key Isolation Manual Local System Started COM+ Event System Automatic Local Service Started Computer Browser Manual Local System Started Cryptographic Services Automatic Network Service Started DCOM Server Process Launcher Automatic Local System Started Desktop Window Manager Session ManagerAutomatic Local System Started DHCP Client Automatic Local Service Started Distributed Link Tracking Client Automatic Local System Started DNS Client Automatic Network Service Started ExpressCache Automatic Local System Started Extensible Authentication Protocol Manual Local System Started Function Discovery Provider Host Manual Local Service Started Group Policy Client Automatic Local System Started IKE and AuthIP IPsec Keying Modules Automatic Local System Started Intel(R) Capability Licensing Service InterfaceAutomatic Local System Started Intel(R) Centrino(R)
    [Show full text]
  • Matrox Imaging Library (MIL) 9.0 Mildisplay.Txt October 6, 2009 © Copyright Matrox Electronic Systems Ltd., 1992-2009
    file:///C|/Work/mildisplay.txt -------------------------------------------------------------------------------- Matrox Imaging Library (MIL) 9.0 mildisplay.txt October 6, 2009 © Copyright Matrox Electronic Systems Ltd., 1992-2009. All rights reserved. -------------------------------------------------------------------------------- This document outlines what is new with MIL display module. It also presents last minute information that did not make it into the manual or on-line help. Note that this text file serves to complement your manual. The information found in this file overrides your formally documented material. -------------------------------------------------------------------------------- Main Table of Contents Section 1: What's new in MIL 9.0 Update 16 Section 2: What's new in MIL 9.0 -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- Section 1: What's new in MIL 9.0 Update 16 Table of Contents for Section 1 1. Exclusive Displays 1.1 Overview 1.2 Allocation of an exclusive display 1.2.1 Requirements 1.2.2 InitFlag 1.2.3 DispNum 1.2.4 DispFormat 1.3 Available MdispControl types -------------------------------------------------------------------------------- 1. Exclusive Displays file:///C|/Work/mildisplay.txt (1 of 7)10/30/2009 1:06:36 PM file:///C|/Work/mildisplay.txt 1.1 Overview ------------ Exclusive display is a new full-screen display type, designed to replace legacy auxiliary displays. One of Windows® extended desktop monitors is exclusively dedicated to display and MIL restricts mouse-cursor outside of the display limits. 1.2 Allocation of an exclusive display -------------------------------------- MIL_ID MdispAlloc(MIL_ID SystemId, MIL_INT DispNum, MIL_CONST_TEXT_PTR DispFormat, MIL_INT InitFlag, MIL_ID *DisplayIdPtr) 1.2.1 Requirements ------------------ It works on any graphic adapter and is compatible with all Video Hardware Acceleration Modes. We suggest having two or more outputs currently used on the desktop.
    [Show full text]