Technical information

Getting started
O&O Defrag - 22
Methods optimized for Zone filing Standard methods
Run time of first
defragmentation**
Run time of recur-
ring defragmentation
Required RAM
CPU Load
Very Applicable (with runtime: quick)
Extremely Applicable (with runtime: very quick)
* Our understanding of high-level fragmentation is a poorly maintained drive containing a large number of heavily frag-
mented files with little free space available.
** The run time of the first defragmentation lasts longer than with the previous version as a result of data being divided
into zones.
STEALTH Method
The STEALTH method differs from other methods in that it is much faster and uses much less main memory for the
defragmentation.
Algorithm
The STEALTH method is based on our unique STEALTH technology and allows an unprecedented level of defrag-
mentation on computers having a large number of files, little free space or available main memory.
This method defragments all fragmented files and tries to consolidate them in order to optimize available free disk
space. Speed and resource usage are the main considerations here, and the method is therefore not quite as thorough
as the SPACE and COMPLETE methods.
Recommended Application
The STEALTH method is especially useful for defragmentation on a regular basis.
l Initial defragmentation of your system
l Computers with few available resources, as the method does not greatly increase the CPU usage and does not
require much free hard disk space
l Servers with very large hard disks (e.g. more than 4 terabytes)
l Computers with a very large number of files (more than 3,000,000 files)