Data Protection and Information Lifecycle Management

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Magneto-optical disks 2nd

Malformed SCSI commands Man-in-the-middle attacksManagement     in FC vulnerabilities 2nd     networks for 2nd

Management Information Systems (MIS)

Management layer in storage model

Management software for SANs 2nd

Manmade disasters

MANs (Metropolitan Area Networks)

     defined

     remote copy in

     SANs over 2nd

Manual encryption in SAN 2nd

Master devices in parallel ATA

Matching values in ILM 2nd

MD-5 hashes

Media

     access time     defined

     for backups 2nd

     in restore operations 2nd

     streaming 2nd

Megabits MegabytesMetadata

     defined     in ILM     purpose ofMetropolitan Area Networks (MANs)

     defined     remote copy in     SANs over 2nd MidAmerica Bank case study 2nd MIME typeMirroring     defined

     in RAID

     remote MIS (Management Information Systems) Monoculture with vendor lock-in

Monthly backup sets

Moved data in information lifecycle

Moving in ILM automation

MP3 (Moving Pictures Experts Group Layer-3) standard multi-tier storage architectures 2nd 3rd

Multifactor authentication Multimode fiber optic cable

Multiple TCP/IP connections

 < Day Day Up >   

Категории