Data Protection and Information Lifecycle Management

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

DAS (Direct Attach Storage) 2nd

     ATA 2nd 3rd    backups         external 2nd         internal     defined

     SCSI 2nd 3rd 4th 5th 6th 7th

     security for 2nd

DASD (Direct Access Storage Devices) 2nd

Data

     defined

     models for 2nd

Data at rest

Data corruption

     defined

     in restore operations 2nd

Data in motion

Data Lifecycle Management (DLM) 2nd 3rd 4th

     automation 2nd

     defined     multi-tier storage architectures in 2nd 3rd

     policies in 2nd

Data loss 2nd

     accidental

     effect of 2nd 3rd 4th     from disasters 2nd     from security breaches 2nd

     from system failure 2nd Data management layerData migration     defined

     DLMData movers     defined     in server-less backup Data path width in parallel SCSI Data protection 2nd     changes in 2nd

     defined

     importance of 2nd     key points 2nd     practices and techniques 2nd

Data Protection Act of 1998 2nd

Data retention

     defined

     requirementsDatabases

     context of     replicating 2nd

Death of information in ILM 2nd Decision making in ILM automation Default ALLOW posture 2nd 3rd Default DENY posture 2nd 3rd Defense in depth

     authentication and access control 2nd

     defined

     host and application defense

     perimeter defense 2nd

Delays in remote copy 2nd 3rd 4th

Denial of service (DoS) attacks

     defined

     from security breaches

     in IP-based SANs 2nd

Dense Wave Division Multiplexing (DWDM)

Designing Storage Networks

Destruction policies in DLM

Detail in policies

Detecting intruders Determinable values

Deterministic fabrics

Device layer in storage model 2nd

Device names in policies

Devices in SCSI 2nd 3rd Differential SCSI Direct Access Storage Devices (DASD) 2nd

Direct Attach Storage (DAS) 2nd     ATA 2nd 3rd    backups         external 2nd

         internal     defined     SCSI 2nd 3rd 4th 5th 6th 7th     security for 2nd Directive 2002/58/ECDirectors     defined

     in FC topology

Disasters     data loss from 2nd     restoring data in 2nd

Discovery services in IP-based SANs 2nd

Disk drives

     arrays 2nd

     crashes     defined

     in RAID 2nd 3rd 4th Disk system remote copy 2nd 3rd

Disk-based backupsDisk-to-disk backups     defined     process 2nd 3rd 4thDisk-to-disk-to-tape backups

     defined

     process 2nd

Distances in remote copy latency 2nd

Diversity of defense

     characteristics 2nd

     defined

DLM (Data Lifecycle Management) 2nd 3rd 4th

     automation 2nd

     defined

     multi-tier storage architectures in 2nd 3rd

     policies in 2nd

DNS (Domain Naming Service)

Document management vs. ILM 2nd

Document type definitions (DTDs) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Dongles

DoS (denial of service) attacks

     defined

     from security breaches

     in IP-based SANs 2nd Double homed hosts Drive controllers for arrays 2nd

DTDs (document type definitions) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Duplication in information protection costs DVD-ROM/RW storage DWDM (Dense Wave Division Multiplexing)

 < Day Day Up >   

Категории