12.07.2015 Views

Installation and User's Guide

Installation and User's Guide

Installation and User's Guide

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

trusted communications agent (TCA)A program that h<strong>and</strong>les the sign-onpassword protocol when clients usepassword generation.UUCS-2 A 2-byte (16-bit) encoding scheme basedon ISO/IEC specification 10646-1. UCS-2defines three levels of implementation:Level 1-No combining of encodedelements allowed; Level 2-Combining ofencoded elements is allowed only forThai, Indic, Hebrew, <strong>and</strong> Arabic; Level3-Any combination of encoded elementsare allowed.UNC See Universal Naming Convention name.UnicodeA character encoding st<strong>and</strong>ard thatsupports the interchange, processing, <strong>and</strong>display of text that is written in thecommon languages around the world,plus some classical <strong>and</strong> historical texts.The Unicode st<strong>and</strong>ard has a 16-bitcharacter set defined by ISO 10646.Unicode-enabled file spaceUnicode file space names provide supportfor multilingual workstations withoutregard for the current locale.Unicode transformation format 8Unicode Transformation Format (UTF),8-bit encoding form, which is designedfor ease of use with existing ASCII-basedsystems. The CCSID value for data inUTF-8 format is 1208.Universal Naming Convention (UNC) nameA name that is used to access a drive ordirectory containing files shared across anetwork. The UNC name includes thesystem name <strong>and</strong> a SharePoint name thatrepresents the shared drive or directory.Universally Unique Identifier (UUID)The 128-bit numerical identifier that isused to ensure that two components donot have the same identifier.UTF-8 See Unicode transformation format 8.UUID See Universally Unique Identifier.VvalidateTo check a policy set for conditions thatcan cause problems if that policy setbecomes the active policy set. Forexample, the validation process checkswhether the policy set contains a defaultmanagement class.versionA backup copy of a file stored in serverstorage. The most recent backup copy of afile is the active version. Earlier copies ofthe same file are inactive versions. Thenumber of versions retained by the serveris determined by the copy groupattributes in the management class.virtual file spaceA representation of a directory on anetwork-attached storage (NAS) filesystem as a path to that directory.virtual volumeAn archive file on a target server thatrepresents a sequential media volume to asource server.volumeA discrete unit of storage on disk, tape orother data recording medium thatsupports some form of identifier <strong>and</strong>parameter list, such as a volume label orinput/output control. See also scratchvolume, <strong>and</strong> storage pool volume.volume history fileA file that contains information aboutvolumes that have been used by theserver for database backups <strong>and</strong> forexport of administrator, node, policy, orserver data. The file also has informationabout sequential-access storage poolvolumes that have been added, reused, ordeleted. The information is a copy ofvolume information that is recorded inthe server database.Volume Shadow Copy ServiceA set of Microsoft applicationprogramminginterfaces (APIs) that youcan use to create shadow copy backups ofvolumes, exact copies of files, includingall open files, <strong>and</strong> so on.VSS See Volume Shadow Copy Service.VSS BackupA backup operation that uses MicrosoftVolume Shadow Copy Service (VSS)technology. The backup operationproduces an online snapshot(point-in-time consistent copy) ofExchange data. This copy can be stored692 IBM Tivoli Storage Manager for Windows Backup-Archive Clients: <strong>Installation</strong> <strong>and</strong> <strong>User's</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!