:04 PM
To: ADSM-L@VM.MARIST.EDU
Subject: [ADSM-L] Who is performing Client Based Encryption and Compression
Fellow TSM Admins,
We are in the process of bringing VTLs into our TSM Environment. In order to
take full advantage of deduplication features on the VTL we need to go after
the clients
, November 27, 2012 5:04 PM
To: ADSM-L@VM.MARIST.EDU
Subject: [ADSM-L] Who is performing Client Based Encryption and Compression
Fellow TSM Admins,
We are in the process of bringing VTLs into our TSM Environment. In order
to take full advantage of deduplication features on the VTL we need to go
after
: [ADSM-L] Who is performing Client Based Encryption and Compression
I think q actlog begindate=today-ndays msgno=4968 is more efficient.
-Original Message-
From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of
Prather, Wanda
Sent: Tuesday, November 27, 2012 5:18 PM
Of Bill
Boyer
Sent: Wednesday, November 28, 2012 12:01 PM
To: ADSM-L@vm.marist.edu
Subject: Re: [ADSM-L] Who is performing Client Based Encryption and Compression
You could start by getting a list of nodes that are set to either
COMPRESSION=CLIENT or YES and those with DEDUPLICATION=CLIENTORSERVER
Subject: [ADSM-L] Who is performing Client Based Encryption and Compression
Fellow TSM Admins,
We are in the process of bringing VTLs into our TSM Environment. In order to
take full advantage of deduplication features on the VTL we need to go after
the clients that are performing client based
Fellow TSM Admins,
We are in the process of bringing VTLs into our TSM Environment. In order to
take full advantage of deduplication features on the VTL we need to go after
the clients that are performing client based encryption and compression. With
that in mind, does anyone know an easy