STEALTH Method
The STEALTH method differs from the other methods in that it is much faster and uses much less central memory for the defragmentation.
The STEALTH method has been designed with large fileservers in mind. It can, however, be used to great effect on workstations and other computers.
Algorithms
The STEALTH method is based on our unique STEALTH technology, allowing an unprecedented level of defragmentation on computers with a large number of files, little free space or available central memory.
This method defragments all fragmented files and tries to consolidate them in order to optimize available free space. Here, speed and resource usage are the main considerations and the method is therefore not quite as thorough as the SPACE and COMPLETE methods.
Recommended usage
The STEALTH method is particularly recommended for the following systems. STEALTH can also be used for regular defragmentation runs.
•
Initial defragmentation of your system
•
Computers with few available resources, as the method does not greatly increase the CPU usage and does not require much free hard disk space.
•
Servers with very large hard disks (e.g. more than 1 terabyte)
•
Computers with a very large number of files (more than 250,000 files)