Chapter 11 Data Migration Management

Adding a Storage Policy

5On the Modify Parameters screen, enter both the Standard Options and Advanced Options as desired.

File Copy 1, 2, 3, and 4: The copy number used when storing assigned media. The copy number assigned to the media determines which copy goes to the media. You must specify media for all copies used. You must use at least one copy (Copy 1), and can use up to four copies.

If you have created more than one drivepool, you can accomplish file steering by specifying which drivepool to use for each available file copy. For example, you could send data on File Copy 2 to “fs_drivepool_2,” and data on File Copy 3 to “fs_drivepool_3.” (Before you can assign a drive pool to a file copy, you must first create the drive pools by using the Configure Drive Pools function.) For more information about configuring drive pools, see Adding a Drive Pool on page 200.

File Age Before Migration: This value determines the minimum number of minutes a file must reside unmodified on disk before it is considered a candidate for storage on media.

File Age Before Truncation: This value determines the minimum number of days a file must reside on a disk unaccessed before it is considered a candidate for truncation from disk. Truncation removes the disk blocks of a stored file, but not the file itself.

Truncate Immediately After Store: Enable this option (check this box) to truncate files immediately after they are stored.

Max Inactive Versions: The maximum number of inactive versions of a file StorNext keeps track of for recovery purposes.

Drive Pool to Use: Associates the drive pool to use with the policy class. If you specify a drive pool, the drive pool name must be defined before any data operation can occur.

Checksum Generation: If this option is enabled, (the box is checked), checksums are generated and retained in the database for files stored by the corresponding policy class.

Checksum Validation: If this option is enabled (the box is checked), checksums are compared to retained values for the files retrieved by the corresponding policy class. The Checksum feature consumes additional space in the StorNext database whether it is enabled or not. When disabled, this feature consumes approximately 2 bytes per stored file; when enabled, this feature consumes approximately 18 bytes per stored file. The

StorNext User’s Guide

263

Page 285
Image 285
Quantum 6-01658-05 manual StorNext User’s Guide 263

6-01658-05 specifications

Quantum 6-01658-05 is an advanced technology system designed to optimize performance in various applications. This system is particularly notable for its innovative features that set it apart in the competitive tech landscape. One of its main characteristics is its robust processing capabilities, which are powered by a state-of-the-art quantum computing architecture. This enables rapid data processing and enhances the system’s problem-solving abilities, making it ideal for complex computations and large-scale data analysis.

One of the standout technologies integrated into Quantum 6-01658-05 is its adaptive algorithm framework. This feature allows the system to learn and evolve over time, optimizing its performance based on the tasks it encounters. Through machine learning techniques, the system can refine its processes and improve efficiency, ensuring that users benefit from continuous enhancements without requiring manual updates. This self-optimizing capability is a significant advancement for industries that demand versatility and rapid response to changing environments.

Another key aspect of Quantum 6-01658-05 is its enhanced connectivity options. With support for various communication protocols, including high-speed data transfer options, it ensures seamless integration with existing infrastructures. This feature is particularly valuable for organizations looking to enhance their data ecosystems while minimizing disruption to their current operations.

Additionally, the system boasts exceptional security measures, utilizing quantum encryption methods that safeguard sensitive data against potential breaches. This level of security is increasingly important in today's data-driven world, where cyber threats are prevalent and sophisticated.

In terms of scalability, Quantum 6-01658-05 is designed to accommodate growing demands effortlessly. Whether upgrading existing components or expanding the entire system, it can adapt to the evolving needs of businesses without compromising performance.

Overall, Quantum 6-01658-05 represents a leap forward in technology, combining advanced processing, adaptability, connectivity, security, and scalability. These features make it an attractive option for organizations seeking to leverage cutting-edge technology to gain a competitive edge in their respective fields. As industries continue to evolve, the Quantum 6-01658-05 is poised to play a pivotal role in driving innovation and efficiency.