t Stor Manager [mailto:ADSM-L@vm.marist.edu] On Behalf Of Bill
>Boyer
>Sent: Wednesday, November 28, 2012 12:01 PM
>To: ADSM-L@vm.marist.edu
>Subject: Re: [ADSM-L] Who is performing Client Based Encryption and Compression
>
>You could start by getting a list of nodes
EDU
Subject: Re: [ADSM-L] Who is performing Client Based Encryption and Compression
I think "q actlog begindate=today-ndays msgno=4968" is more efficient.
-Original Message-
From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of
Prather, Wanda
Sent: Tuesday,
arris, Chad
Sent: Tuesday, November 27, 2012 5:04 PM
To: ADSM-L@VM.MARIST.EDU
Subject: [ADSM-L] Who is performing Client Based Encryption and Compression
Fellow TSM Admins,
We are in the process of bringing VTLs into our TSM Environment. In order
to take full advantage of deduplication features on th
r 27, 2012 5:04 PM
To: ADSM-L@VM.MARIST.EDU
Subject: [ADSM-L] Who is performing Client Based Encryption and Compression
Fellow TSM Admins,
We are in the process of bringing VTLs into our TSM Environment. In order to
take full advantage of deduplication features on the VTL we need to go after
t
Fellow TSM Admins,
We are in the process of bringing VTLs into our TSM Environment. In order to
take full advantage of deduplication features on the VTL we need to go after
the clients that are performing client based encryption and compression. With
that in mind, does anyone know an easy way
Subject: [ADSM-L] Who is performing Client Based Encryption and Compression
Fellow TSM Admins,
We are in the process of bringing VTLs into our TSM Environment. In order to
take full advantage of deduplication features on the VTL we need to go after
the clients that are performing client based