< Day Day Up > |
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Cabling for SAN in FC in parallel SCSI 2nd Capacity levels in HSM 2nd CAS (Content Addressed Storage) defined in ILM automation 2nd vs. ILM Cascade failures Case studies backups 2nd ILM 2nd replication storage systems Catalogs for backups 2nd CD-ROM/RW storage CDBs (Command Descriptor Blocks) Changing values in ILM 2nd 3rd Characteristics of information CIFS (Common Internet File System) defined in file replication security Cipher text Classes 2nd Classification in context 2nd 3rd in ILM automation 2nd Client/server architecture in SCSI Clients Command Descriptor Blocks (CDBs) Common Internet File System (CIFS) defined in file replication security Compatibility of FC Complete backup sets Complexity of data protection Compliance for policies Compression defined for backups 2nd Comptroller of the Currency 2nd Conferences 2nd Configuration holes in IP-based SANs 2nd Connections in IP-based SANs Connectivity, risk from 2nd 3rd 4th Content Addressed Storage (CAS) defined in ILM automation 2nd vs. ILM Content of information in context 2nd in information lifecycle Context classification for 2nd 3rd content in 2nd defined e-mail anatomy 2nd state in tracking state and history in 2nd types of 2nd Continuity, business Controllers defined for arrays 2nd RAID 2nd SCSI 2nd Copied data in information lifecycle Copper FC cable Copying in ILM automation remote [See Remote copy] Corruption, data 2nd Costs in remote copy information creation protection 2nd 3rd restoration CRM (customer relationship management) systems Current state in information |
< Day Day Up > |