Re: Who is performing Client Based Encryption and Compression

2012-11-28 Thread Paul Zarnowski
t Stor Manager [mailto:ADSM-L@vm.marist.edu] On Behalf Of Bill >Boyer >Sent: Wednesday, November 28, 2012 12:01 PM >To: ADSM-L@vm.marist.edu >Subject: Re: [ADSM-L] Who is performing Client Based Encryption and Compression > >You could start by getting a list of nodes

Re: Who is performing Client Based Encryption and Compression

2012-11-28 Thread Harris, Chad
EDU Subject: Re: [ADSM-L] Who is performing Client Based Encryption and Compression I think "q actlog begindate=today-ndays msgno=4968" is more efficient. -Original Message- From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of Prather, Wanda Sent: Tuesday,

Re: Who is performing Client Based Encryption and Compression

2012-11-28 Thread Bill Boyer
arris, Chad Sent: Tuesday, November 27, 2012 5:04 PM To: ADSM-L@VM.MARIST.EDU Subject: [ADSM-L] Who is performing Client Based Encryption and Compression Fellow TSM Admins, We are in the process of bringing VTLs into our TSM Environment. In order to take full advantage of deduplication features on th

Re: Who is performing Client Based Encryption and Compression

2012-11-28 Thread Ehresman,David E.
r 27, 2012 5:04 PM To: ADSM-L@VM.MARIST.EDU Subject: [ADSM-L] Who is performing Client Based Encryption and Compression Fellow TSM Admins, We are in the process of bringing VTLs into our TSM Environment. In order to take full advantage of deduplication features on the VTL we need to go after t

Who is performing Client Based Encryption and Compression

2012-11-27 Thread Harris, Chad
Fellow TSM Admins, We are in the process of bringing VTLs into our TSM Environment. In order to take full advantage of deduplication features on the VTL we need to go after the clients that are performing client based encryption and compression. With that in mind, does anyone know an easy way

Re: Who is performing Client Based Encryption and Compression

2012-11-27 Thread Prather, Wanda
Subject: [ADSM-L] Who is performing Client Based Encryption and Compression Fellow TSM Admins, We are in the process of bringing VTLs into our TSM Environment. In order to take full advantage of deduplication features on the VTL we need to go after the clients that are performing client based