Content Table

How to Screen Suitable Files During Synchronous File Transfer?

File transfer is becoming increasingly important in our job due to the constant evolution of technology, as it is a vital component of data exchange and information sharing. But when it comes to synchronous file transfer, we frequently run into problems selecting appropriate files, which raises operational complexity and decreases transmission efficiency. Thankfully, raysync's synchronous transmission has a black and white list filtering capability that makes file transfer more intelligent and effective.

file synchronization transmission

The Black and White List Filtering Function of Raysync

1. The Function of Blacklist Filtering

The blacklist filtering function provides users with a convenient way to exclude unwanted files from transmission. For example, during file synchronization, we may wish to avoid transmitting temporary files, cache files, log files, and other types to prevent unnecessary bandwidth and storage space consumption. By setting up a blacklist, the system automatically filters out these files and only transmits the truly needed ones, thereby shortening transmission time and reducing resource consumption. This is especially beneficial for users who need to frequently transmit files, especially under poor network conditions, as the blacklist filtering function can significantly improve work efficiency.

For example, when selecting the blacklist for file transmission, you can input ".exe;.txt". The file synchronization transmission will exclude files of the exe and txt types from transmission.

file synchronization transmission

2. The Function of Whitelist Filtering

Contrary to blacklist filtering, the whitelist filtering function allows users to only transmit specific files. For instance, users may wish to transmit only certain file formats, such as images, documents, and videos, for easier archiving, backup, or sharing. By setting up a whitelist, users can ensure that only these specific types of files are transmitted, avoiding interference from unnecessary files. The whitelist filtering function not only ensures transmission quality but also better organizes and manages files, improving work efficiency.

For example, when selecting the whitelist for file transmission, you can input ".jpg;.png". The file synchronization transmission will only transmit files of the jpg and png types, excluding other files.

file synchronization transmission

3. Scenarios for Flexible Application of Black and White List Filtering Functions

There are various scenarios for the application of black and white list filtering functions. Here are a few common examples:

  • When collaborating remotely with a team, the blacklist filtering function can be used to exclude temporary and irrelevant files, only transmitting necessary project files, thereby improving team collaboration efficiency.

  • When backing up and storing files, users can use the whitelist filtering function to only transmit files related to the backup target, avoiding unnecessary waste of storage space.

  • When updating a website or application, the blacklist filtering function can be used to exclude files that do not need to be updated, speeding up the update process and reducing network pressure.

Conclusion

The introduction of the black and white list filtering function in raysync's file synchronization transmission makes it smarter and more efficient. Users can freely choose which files to transmit or exclude based on their needs, improving work efficiency and saving time and resources.

 

Enterprise High Speed Large File Transfer Solutions

You might also like

Everything You Need to Know about Data Transfer

Raysync News

September 28, 2022

The amount of data transferred between global business networks is very large. Through this article you can know everything about big data. Click here to learn more!

Read more
Product Update | Raysync v6.7.8.3 is released!

Raysync News

December 14, 2023

Raysync is back with a new feature update, check v6.7.8.3 out and see what’s new!

Read more
Enterprises should have risk awareness when facing data compliance

Raysync News

January 7, 2021

Login authentication has a built-in anti-violence cracking mechanism, and the user enters the wrong password five times in a row within 3 minutes, and the account will be automatically locked;

Read more

We use cookies and similar technologies to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Cookie Policy & Privacy.

If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.