Glossary

8b/10b encoding

An algorithm that converts 8-bit data into 10-bit transmission characters to avoid long sequences of zeros and ones.

Access control

Services to regulate user access to resources.

Access Control List (ACL)

A list of permissions that specifies who can access a resource and with what privileges.

Access node

Provides connectivity to application servers through the network in CAS.

Accessibility

Capability to access required information at the right place by the authorized user.

Accountability services

A service that enables administrators to track activities performed on a system and link them back to individuals in such a way that there is little possibility for individuals to deny responsibility for their activities.

Active archive

Category of data that is not likely to change or cannot be changed—often referred to as "fixed content" data.

Active attack

Unauthorized alteration of information that may pose a threat to data integrity and availability.

Active changeable

Category of data that is subject to change and can be changed is referred to as "changeable" data.

Active Directory (AD)

Microsoft implementation used to provide central authentication and authorization services.

Actuator arm assembly

An assembly to which all R/W heads are attached.

Adaptive copy mode

A type of asynchronous replication that does not involve write ordering and data consistency while transferring the data.

Advanced Encryption Standard (AES)

A block cipher (cryptographic algorithm) designated by the National ...

Get Information Storage and Management: Storing, Managing, and Protecting Digital Information now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.