HP Data Protector A.06.11 Recovery Manual page 195

Disaster recovery guide
Hide thumbs Also See for Data Protector A.06.11:
Table of Contents

Advertisement

shadow copy set
shared disks
SIBF
Site Replication
Service
slot
SMB
smart copy
smart copy pool
SMBF
snapshot
(Microsoft VSS specific term) A collection of shadow copies
created at the same point in time.
See also
shadow copy
A Windows disk on another system that has been made
available to other users on the network. Systems with shared
disks can be backed up without a Data Protector Disk Agent
installed.
The Serverless Integrations Binary Files (SIBF) is a part of the
IDB that stores raw NDMP meta data. This data is necessary to
perform restore of NDMP objects.
(Microsoft Exchange Server specific term) The Microsoft
Exchange Server 2000/2003 service that permits compatibility
with Microsoft Exchange Server 5.5 by emulating the Exchange
Server 5.5 directory service.
See also
Information Store
A mechanical position in a library. Each slot can hold a medium,
such as a DLT tape. Data Protector references each slot with a
number. To read a medium, a robotic mechanism moves the
medium from a slot into the drive.
See
split mirror
backup.
(VLS specific term) A copy of the backed up data created from
the virtual tape to the physical tape library. The smart copy
process allows Data Protector to distinguish between the source
and the target medium thus enabling media management.
See also
Virtual Library System
(VLS specific term) A pool that defines which destination library
slots are available as smart copy targets for a specified source
virtual library.
See also
Virtual Library System (VLS)
The Session Messages Binary Files (SMBF) part of the IDB stores
session messages generated during backup, restore, object
copy, object consolidation, object verification, and media
management sessions. One binary file is created per session.
The files are grouped by year and month.
(HP StorageWorks VA and HP StorageWorks EVA specific term)
A form of replica produced using snapshot creation techniques.
and
replica
set.
and
Key Management
(VLS).
and
smart
Disaster recovery guide
Service.
copy.
195

Advertisement

Table of Contents
loading

Table of Contents