< Day Day Up > |
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] DAS (Direct Attach Storage) 2nd ATA 2nd 3rd backups external 2nd internal defined SCSI 2nd 3rd 4th 5th 6th 7th security for 2nd DASD (Direct Access Storage Devices) 2nd Data defined models for 2nd Data at rest Data corruption defined in restore operations 2nd Data in motion Data Lifecycle Management (DLM) 2nd 3rd 4th automation 2nd defined multi-tier storage architectures in 2nd 3rd policies in 2nd Data loss 2nd accidental effect of 2nd 3rd 4th from disasters 2nd from security breaches 2nd from system failure 2nd Data management layer Data migration defined DLM Data movers defined in server-less backup Data path width in parallel SCSI Data protection 2nd changes in 2nd defined importance of 2nd key points 2nd practices and techniques 2nd Data Protection Act of 1998 2nd Data retention defined requirements Databases context of replicating 2nd Death of information in ILM 2nd Decision making in ILM automation Default ALLOW posture 2nd 3rd Default DENY posture 2nd 3rd Defense in depth authentication and access control 2nd defined host and application defense perimeter defense 2nd Delays in remote copy 2nd 3rd 4th Denial of service (DoS) attacks defined from security breaches in IP-based SANs 2nd Dense Wave Division Multiplexing (DWDM) Designing Storage Networks Destruction policies in DLM Detail in policies Detecting intruders Determinable values Deterministic fabrics Device layer in storage model 2nd Device names in policies Devices in SCSI 2nd 3rd Differential SCSI Direct Access Storage Devices (DASD) 2nd Direct Attach Storage (DAS) 2nd ATA 2nd 3rd backups external 2nd internal defined SCSI 2nd 3rd 4th 5th 6th 7th security for 2nd Directive 2002/58/EC Directors defined in FC topology Disasters data loss from 2nd restoring data in 2nd Discovery services in IP-based SANs 2nd Disk drives arrays 2nd crashes defined in RAID 2nd 3rd 4th Disk system remote copy 2nd 3rd Disk-based backups Disk-to-disk backups defined process 2nd 3rd 4th Disk-to-disk-to-tape backups defined process 2nd Distances in remote copy latency 2nd Diversity of defense characteristics 2nd defined DLM (Data Lifecycle Management) 2nd 3rd 4th automation 2nd defined multi-tier storage architectures in 2nd 3rd policies in 2nd DNS (Domain Naming Service) Document management vs. ILM 2nd Document type definitions (DTDs) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Dongles DoS (denial of service) attacks defined from security breaches in IP-based SANs 2nd Double homed hosts Drive controllers for arrays 2nd DTDs (document type definitions) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Duplication in information protection costs DVD-ROM/RW storage DWDM (Dense Wave Division Multiplexing) |
< Day Day Up > |