Glossary
- 8b/10b encoding
An algorithm that converts 8-bit data into 10-bit transmission characters to avoid long sequences of zeros and ones.
- Access control
Services to regulate user access to resources.
- Access Control List (ACL)
A list of permissions that specifies who can access a resource and with what privileges.
- Access node
Provides connectivity to application servers through the network in CAS.
- Accessibility
Capability to access required information at the right place by the authorized user.
- Accountability services
A service that enables administrators to track activities performed on a system and link them back to individuals in such a way that there is little possibility for individuals to deny responsibility for their activities.
- Active archive
Category of data that is not likely to change or cannot be changed—often referred to as "fixed content" data.
- Active attack
Unauthorized alteration of information that may pose a threat to data integrity and availability.
- Active changeable
Category of data that is subject to change and can be changed is referred to as "changeable" data.
- Active Directory (AD)
Microsoft implementation used to provide central authentication and authorization services.
- Actuator arm assembly
An assembly to which all R/W heads are attached.
- Adaptive copy mode
A type of asynchronous replication that does not involve write ordering and data consistency while transferring the data.
- Advanced Encryption Standard (AES)
A block cipher (cryptographic algorithm) designated by the National ...
Get Information Storage and Management: Storing, Managing, and Protecting Digital Information now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.