index_T

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

T10 and T11 committees
Tags in XML
Tape drives
     defined
     for backups 2nd 3rd 4th
     in restoring data
     streaming 2nd
Tape heads in restore operations 2nd
Tape libraries
Targets in SCSI 2nd
TCP/IP
     defined
     in IP-based SANs
Technology in policies 2nd
Theft of information 2nd
Third Party Copy
Throughput in data restoration
Timed replication
Top-down policy approach
Topologies
     FC 2nd
     in remote copy
         disk system 2nd 3rd
         host-based 2nd
         network-based 2nd 3rd
Totally trusting relationships
Tracking
     context state 2nd
     in ILM automation 2nd
Transend Services case study
Transfer time
     defined
     in parallel SCSI
Transformations, information
Transformed data in information lifecycle
Transmission delay
Triggers
     in information lifecycle
     information value as
Trojan horses 2nd
TrueCopy system
Trunking
     defined
     for remote copy
Two-factor authentication
Two-way database replication

 < Day Day Up >   


Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net