Re: Who is performing Client Based Encryption and Compression

2012-11-28 Thread Ehresman,David E.
:04 PM To: ADSM-L@VM.MARIST.EDU Subject: [ADSM-L] Who is performing Client Based Encryption and Compression Fellow TSM Admins, We are in the process of bringing VTLs into our TSM Environment. In order to take full advantage of deduplication features on the VTL we need to go after the clients

Re: Who is performing Client Based Encryption and Compression

2012-11-28 Thread Bill Boyer
, November 27, 2012 5:04 PM To: ADSM-L@VM.MARIST.EDU Subject: [ADSM-L] Who is performing Client Based Encryption and Compression Fellow TSM Admins, We are in the process of bringing VTLs into our TSM Environment. In order to take full advantage of deduplication features on the VTL we need to go after

Re: Who is performing Client Based Encryption and Compression

2012-11-28 Thread Harris, Chad
: [ADSM-L] Who is performing Client Based Encryption and Compression I think q actlog begindate=today-ndays msgno=4968 is more efficient. -Original Message- From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of Prather, Wanda Sent: Tuesday, November 27, 2012 5:18 PM

Re: Who is performing Client Based Encryption and Compression

2012-11-28 Thread Paul Zarnowski
Of Bill Boyer Sent: Wednesday, November 28, 2012 12:01 PM To: ADSM-L@vm.marist.edu Subject: Re: [ADSM-L] Who is performing Client Based Encryption and Compression You could start by getting a list of nodes that are set to either COMPRESSION=CLIENT or YES and those with DEDUPLICATION=CLIENTORSERVER

Re: Who is performing Client Based Encryption and Compression

2012-11-27 Thread Prather, Wanda
Subject: [ADSM-L] Who is performing Client Based Encryption and Compression Fellow TSM Admins, We are in the process of bringing VTLs into our TSM Environment. In order to take full advantage of deduplication features on the VTL we need to go after the clients that are performing client based

Who is performing Client Based Encryption and Compression

2012-11-27 Thread Harris, Chad
Fellow TSM Admins, We are in the process of bringing VTLs into our TSM Environment. In order to take full advantage of deduplication features on the VTL we need to go after the clients that are performing client based encryption and compression. With that in mind, does anyone know an easy