CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Technical Conception of Ghosting Images for Windows Platforms

by Shadreck Mudziwepasi, Mfundo Shakes Scott, Nogwina Mnoneleli
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 10
Year of Publication: 2014
Authors: Shadreck Mudziwepasi, Mfundo Shakes Scott, Nogwina Mnoneleli
10.5120/15921-5182

Shadreck Mudziwepasi, Mfundo Shakes Scott, Nogwina Mnoneleli . Technical Conception of Ghosting Images for Windows Platforms. International Journal of Computer Applications. 91, 10 ( April 2014), 48-54. DOI=10.5120/15921-5182

@article{ 10.5120/15921-5182,
author = { Shadreck Mudziwepasi, Mfundo Shakes Scott, Nogwina Mnoneleli },
title = { Technical Conception of Ghosting Images for Windows Platforms },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 10 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 48-54 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number10/15921-5182/ },
doi = { 10.5120/15921-5182 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:25.751963+05:30
%A Shadreck Mudziwepasi
%A Mfundo Shakes Scott
%A Nogwina Mnoneleli
%T Technical Conception of Ghosting Images for Windows Platforms
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 10
%P 48-54
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Global advances in Information Technology (IT) have led to the adoption of computer systems in organizations and institutions alike all over the world. This trend has led to the introduction of many computer applications and softwares that are mearnt to perform specific tasks so long they are supported by the Operating Systems (OSs) installed in Personal Computers (PCs). It is however important to note that these applications and associated softwares are released in different versions and may also come with different add-ons as per different versions and upgrades. This requires that we continuously upgrade our computers and associated systems so that they become compatible with new versions of different softwares that are released almost each and every single day. Some computers might actually crash, thereby requiring re-installment of all applications there-on before we assume a system restore point. Continuous upgrade and maintenance of such computers and their systems is imminent. However, for a large institution that may possess thousands of PCs in their system, it might be difficult to perform PC by PC upgrade and maintenance. We can therefore create ghosting images for windows and open source platforms. Ghosting a computer basically involves making use of a Ghosting Server to copy all the contents of a computer's hard drive including the OS. These would be stored as ghosting images. Thus, for computers that will be sitting on the same sub network with the Ghosting Server as their domain controller, we can then perform an upgrade and maintenance routine on all of them at once. Therefore, the process of ghosting images deployment would provide convenience in performing installations and upgrades for organizations and large institutions in a cost and time effective manner.

References
  1. Bowman, M. , Debray, S. K. , and Peterson, L. L. 2012. Acronis True Image Home 2012 (2012). Top-ten-reviews. Accessed online from: http://disk-imaging-software-review. html
  2. Agarwal A. RichCopy: The Only File Copying Utility You'll Ever Need. Accessed online from: http://www. labnol. org/software/richcopy-file-copying/
  3. Agarwal A. RichCopy: The Only File Copying Utility You'll Ever Need. Accessed online from: http://www. labnol. org/software/richcopy-file-copying-tool-for-windows/8035/
  4. Ashraf (2009). 8 free software to image/backup/ghost your computer (free alternatives to Acronis True Image, Norton Ghost, etc. ). Accessed online from: http://dottech. org/6194/7-free-software-to-imagebackupghost-your-computer-free-
  5. Alternatives-to-acronis-true-image-norton-ghost-etc/ Anebeg (2008). Successfully Deploy a Ghost Image to Many Computers at the same Time. Accessed online from: http://anebg. net/2008/07/01/to-many-computers
  6. image-to-many-computers-at-the-lab http://anebg. net/2008/07/01/successfully-deploy-a-ghost-image-to-many-computers-at-the-lab
  7. Norton Ghost History. Accessed online from: http://www. softpanorama. org/Windows/Ghosting/ghost_history. shtml
  8. Flanerin B. and Platedf, R. 2011. Windows Ghosting input. In Proceedings of the Conference on Human Factors in Computing Systems, Seychelles, 2011
  9. Tedfin, P. 2012 Ghosting and Cloning Design. AK Peters Ltd.
  10. Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398. , University of Washington.
  11. Cnet Download (2010). Tera Copy. Accessed online from: http://download. cnet. com/TeraCopy/3000-2248_4-10671835. html
  12. DIY Computer Repairs (2007). Making a Symantec Ghost Image Using Symantec Ghost. Accessed online from: http://www. diy-computer-repair. com/symantec-ghost-image. html
  13. File Guru. (2010). PC Disk Clone X 11. 0. Accessed online from: http://www. fileguru. com/PC-Disk-Clone-X/info
  14. Future Systems (2012). Casper Complete PC Backup Protection. Accessed online from: http://www. fssdev. com/default. aspx?adc=1
  15. International Software Industry Association (2011). PC Disk Clone X 11. 0. Accessed online from: http://www. softwaredownloads. org/windows/system-utilities/backup-restore/pc-disk-clone-x/
  16. Kierkels D. (2007). How to Create an Image Using Symantec Ghost, GhostCast Server. Accessed online from: http://ezinearticles. com/?How-To-Create-An-Image-Using-Symantec-Ghost,-Ghostcast-
  17. MFSN (2007). [WWW]. Multiboot CD's/DVD's. Accessed online from: http://www. msfn. org/board/topic/107428-ghost-11-
  18. Microsoft (2012). How To Add a Boot Image to WDS Server (en-US). Accessed online from: http://social. technet. microsoft. com/wiki/contents/articles/11643. how-to-add-a-boot-image-
  19. Norton Ghost User's Guide (2003). Guide to Symantec Ghost 8. 0. Accessed online from: ftp://ftp. symantec. com/public/english_us_canada/products/ghost/manuals/symghost_8
  20. Navarana (2009). Create a Symantec Ghost Image for Hard Drive Cloning. Accessed online from: http://ulderi. com/my-itc-blog/2009/09/create-a-symantec-ghost-image-for-hard-drive-
  21. Nerdyloft (2011). WDS: Boot Image Changes Not Happening for You?
  22. Ozzu Webmaster Forum (2003). Creating a Ghost Image for Windows XP or the Like. Accessed online from: http://www. ozzu. com/mswindows-forum/creating-ghost-image-for-windows-the-like-
Index Terms

Computer Science
Information Sciences

Keywords

Ghosting images Windows and Open Source Platforms.