Data Protection and Information Lifecycle Management

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

T10 and T11 committees

Tags in XMLTape drives     defined     for backups 2nd 3rd 4th     in restoring data

     streaming 2nd

Tape heads in restore operations 2nd

Tape libraries

Targets in SCSI 2nd

TCP/IP

     defined

     in IP-based SANs

Technology in policies 2nd

Theft of information 2nd

Third Party Copy

Throughput in data restoration

Timed replication

Top-down policy approach

Topologies     FC 2nd

     in remote copy

         disk system 2nd 3rd

         host-based 2nd

         network-based 2nd 3rd Totally trusting relationshipsTracking

     context state 2nd     in ILM automation 2nd Transend Services case study Transfer time

     defined     in parallel SCSI Transformations, information Transformed data in information lifecycle Transmission delayTriggers     in information lifecycle

     information value as

Trojan horses 2nd TrueCopy systemTrunking

     defined

     for remote copy

Two-factor authentication

Two-way database replication

 < Day Day Up >   

Категории