Glossary

Previous  Print this Topic

A

ACL - ACL stands for access control list. It is a table that tells a computer operating system the access rights that each user has to a system object, such as a file directory or an individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. The most common privileges include the ability to read files, to write files, and to execute the files.

Administrator - Administrators have complete and unrestricted access to a computer or domain.

Automatic fail-over - If there is more than one Vault available, clients can divide their use of the available Vaults. Clients fail-over from the current Vault in use to another Vault, should the current Vault fail.

B

C

Client - Clients provide interfaces for system administrators and end users. With Phoenix EXP's balanced, extended client/server architecture, clients often play roles normally supported by servers. This enables increased Information Repository flexibility, security, robustness and capacity.

Collapsing Data - When data is removed from the primary hard disk storage tier and replaced with a pointer file. A copy of the file exists in the Information Repository and a pointer to the file exists in the computer's file system. Data that is collapsed appears to the networked computer's file system as if it resides locally.

Communications Timeout - If the product is unable to connect with a computer on the network or communications are interrupted during a job, it waits a predefined period of time before completely dropping the connection. This period of time is called the "communications timeout."

Component - A component is a single application or utility that could interact with or have dependencies on other applications. Phoenix EXP software consists of several separate components that work together to protect your files.

CRC - Cyclic redundancy check is used to ensure data integrity by detecting accidental alterations of data during transmission or storage. A unique numeric value is assigned to captured or ingested files, and then an algorithm calculates this value based on data stream, file size, and other characteristics. The CRC value is compared on client and server, and validated.

D

Data Service Policies - These policies are sets of rules which define how the videos or files are duplicated, moved, or deleted across multiple storage devices.

Data Services Service - Data Services Service enforces or implements the Data Service Policies.

Default - A default value or setting used by a device or program when no other value or setting has been specified.

DHCP - A network configuration protocol used to assign addresses to computers on a network.

Dynamic resource allocation - The process used by Phoenix EXP to find and use storage resources that may be available across multiple storage devices.

E

F

G

H

Header - In data storage, a header is an area on media where the parameters assigned during preparation of the media are stored. The information contained in the header includes access control lists (ACL), storage pool information, media size, type, etc.

Host - The computer where files originate or where the policy resides.

I

Information Lifecycle Management (ILM) - The policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective IT infrastructure from the time information is conceived through its final disposition. When ILM is video aware, it is called Video Lifecycle Management (VLM).

Information Repository - The Information Repository is where data is stored. Since a Vault is a storage device used to store files, the Information Repository is made up of all the storage devices, clients and Vaults on your network.

Ingesting - The process of using Phoenix EXP clients to archive or move data, including metadata, from a networked computer into the Information Repository.

J

Job Control File - Job Control Files contains a list of files to be ingested and have a file extension of .jcf.

K

L

Label - A label (or media label) is a name assigned to a unit of media. Assigned manually to media, unless a barcode system is available, the labels are used for media identification. If a barcode system is in use, the label name is superseded by the barcode on the media. When media is loaded into a drive, the Information Repository's first task is to read the label to identify and ensure that the proper media unit is being used.

lic - File extension for a license file. To be seen by the Information Repository, the license file(s) must be in the <install-dir>/Config folder.

Load balancing - Load balancing is the distribution of jobs and data throughout the Information Repository. Phoenix EXP queries each Vault regarding the best match for processing requirements, storage resources, free space, and then establishes a connection to the Vault and copies files to the Vault. The network remains load balanced.

Locator Service - The Locator Service makes dynamic resource allocation possible which delivers unlimited storage resource accessibility within the network. It works as a virtual middle tier to provide information that enables clients and Vaults to work like a traditional client/server system, but without the need for hard-coded static links between clients and servers. In contrast, the Locator architecture is flexible to allow dynamic client access to any storage resource on your network. The Locator maintains a list of currently available product services, by using a multicast and beacon technology, and it provides this list to clients on the network as needed. To accomplish this, the Locator constantly "listens" for active registered vaults. The Locator list notes Vault status and location changes. Every Locator is self-propagating and shares information with other Locators within the Information Repository.

Log file - Error logs are created only when the program encounters a problem. Set the pathname in Vault Admin > Vault Properties > logs to define where error logs are written and stored. An activity log provides logistical information about jobs.

Log file rotation - When a new log file is created (error log or activity log), the older file is renamed and the newer log becomes the primary log file. This is log file rotation. You can specify the maximum file size, maximum number of files to keep, and the interval for how often to check if rotation is needed.

M

Media - Recording media is a device used to store data or information. Examples of media are hard disk, optical disc, and data tapes.

Metadata - Data describing digital content.

Migrate - The process of moving video and files from one storage area to another. This process is managed by the Data Services Service.

N

NAS - Network Attached Storage. Networked computer that provides file-based data storage.

Network Activity - Application used to monitor all data, media, and Vault operations within the Information Repository in real-time.

O

On-Media Catalog - The metadata catalog, stored on every media unit, that contains metadata for all the files. The on-media catalog is an Information Repository safeguard. Should a Vault catalog become lost or corrupted, the on-media catalogs are used to rebuild it.

P

Physical Media - A physical unit of media, such as a tape, that is independent of its drive. An individual unit of physical media can be used in a single stand-alone drive, or can be one of several units of media within an automated library system. In automated libraries, storage units use robotics to move units of media. With systems based on physical media, there can be one or more drives and several units of media per drive.

POE - Power Over Ethernet is a technology used to power network-connected devices through the network.

Policies - Phoenix EXP employs the use of "policies". They are the method outlined by parameters and options for managing all your digital assets effectively. In Target and Process policies, policies control what files are ingested, where the files are stored in the Information Repository, when jobs run, how often jobs run, when jobs stop, and all other aspects of jobs. In Data Service policies, policies control when files are moved, copied, and purged in the Information Repository.

Purge - The process of deleting video and files from the storage. This process is managed by the Data Services Service.

Q

R

Replicate - The process of copying video and files from one storage area to another. This process is managed by the Data Services Service.

S

Server - Unlike servers that require dedicated computers, product servers can run on any of the computers on your network. The server is composed of various components that manage several operations: registration of location with service modules, responding to client queries about resource availability, negotiating connections with client components, receiving data from clients and storing it properly, receiving metadata from clients and updating the Vault, receiving CRC data from clients and using it for media write validation, informing clients of success and failure during processing, informing client components of matches and mismatches of the CRC, on-media data formatting, receiving data lookup requests from clients, locating restore data within the Vault, responding to client requests for data retrieval, and supplying data to clients as required. During installation, the "Server" version refers to the full suite of Phoenix EXP applications, including Vaults. In contrast, the "Client" version does not include Vaults.

Service - A process that runs in the background and performs a specific operation at predefined times or in response to certain events.

Shadow hard disk Vault - Refers to primary hard disk storage that has been incorporated into the Phoenix EXP Information Repository while remaining primary hard disk storage. This enables you to carry out powerful search and eDiscovery jobs on primary hard disk storage. Creating a shadow hard disk Vault over primary hard disk storage does not affect primary hard disk storage. Primary hard disk storage remains fully accessible. From the perspective of the Information Repository, shadow hard disk Vaults are fully readable but not editable, so you can search for and retrieve data from a shadow hard disk Vault, but you cannot ingest, migrate, or copy policies to move data onto a shadow hard disk Vault.

Source - Refers to the location where data is captured, ingested, or extracted.

Static IP - A network address which does not change. Normally used to refer to the process of manually setting the IP address of network devices.

Storage Pool - One or more pieces of media grouped for a common use. Additional media can be added to storage pools at any time, and searches can be limited to single storage pools with countless units of media, regardless of which Vaults the media resides on.

T

Tab Delimited - A text format that separates between fields using tab characters.

Target and Process Service - This service is responsible for all data ingest or capture.

U

V

Vault - A Vault is comprised of a central processing unit (CPU), Phoenix EXP (software), and storage. Each Vault requires its own capacity license because of its scalable possibilities. The Vaults on the network make up the Information Repository to manage all your data storage needs. The Vaults have attributes associated to them like licensing, media, and files, and are easy to upgrade. They are decentralized, making the Information Repository a distributed solution across your network.

Vault Admin - Optional desktop client application used to prepare media and manage media in the Information Repository Vaults.

Vault Service - The Vault service manages the video and storage devices.

Virtual Media - Space set aside for use by a Vault on a storage device also used for other purposes. A hard disk is an example of virtual media. Media units on a hard disk are actually file system directories set up by the Vault. Mapping a Vault to an entire hard disk, Virtual hard disk media units enable you to remove removable disks from Vaults just as you would physical media (such as tapes). Virtual media units can span multiple disk drives or be set so that several virtual media units reside on a single disk drive.

W

Watch Folder - A Watch Folder holds any Job Control Files.

X

Y

Z

2015, 6.5