Data Protection and Information Lifecycle Management

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Cabling

     for SAN     in FC     in parallel SCSI 2nd Capacity levels in HSM 2ndCAS (Content Addressed Storage)

     defined

     in ILM automation 2nd

     vs. ILM

Cascade failures

Case studies

     backups 2nd

     ILM 2nd

     replication

     storage systems

Catalogs for backups 2nd

CD-ROM/RW storage

CDBs (Command Descriptor Blocks)

Changing values in ILM 2nd 3rd

Characteristics of information CIFS (Common Internet File System)

     defined

     in file replication

     security

Cipher text Classes 2ndClassification

     in context 2nd 3rd     in ILM automation 2nd Client/server architecture in SCSI Clients

Command Descriptor Blocks (CDBs) Common Internet File System (CIFS)     defined     in file replication     security Compatibility of FC Complete backup sets

Complexity of data protection

Compliance for policiesCompression     defined

     for backups 2nd

Comptroller of the Currency 2nd

Conferences 2nd

Configuration holes in IP-based SANs 2nd Connections in IP-based SANs

Connectivity, risk from 2nd 3rd 4thContent Addressed Storage (CAS)

     defined     in ILM automation 2nd     vs. ILMContent of information     in context 2nd

     in information lifecycle

Context

     classification for 2nd 3rd

     content in 2nd

     defined

     e-mail anatomy 2nd

     state in

     tracking state and history in 2nd

     types of 2nd

Continuity, business

Controllers

     defined

     for arrays 2nd

     RAID 2nd     SCSI 2nd

Copied data in information lifecycle

Copper FC cable

Copying

     in ILM automation    remote [See Remote copy] Corruption, data 2nd

Costs     in remote copy     information creation     protection 2nd 3rd

     restoration CRM (customer relationship management) systems Current state in information

 < Day Day Up >   

Категории