Thanks to all, you have given me some good arguments. -----Original Message----- From: ADSM: Dist Stor Manager [mailto:ads...@vm.marist.edu]on Behalf Of Richard Sims Sent: Friday, September 18, 2009 1:43 PM To: ADSM-L@VM.MARIST.EDU Subject: Re: [ADSM-L] TSM architecture
We technicians tend to think about this issue in terms of processing capacity. Others in the organization may consider it in different terms, and indeed perhaps should be reviewed on that larger scale. If I were a technology-savvy expert in your Security Department and was made aware of this question of placement, I would immediately think that the corporation's data gravitates toward this central data preservation point, and that the application software or the administrators who log on to that system to manage their application could bend toward the dark side to gain control of one or more tape drives to gain surreptitious access to the data, in a physical manner or - even more conveniently - if there were a TSM client running co- resident with the TSM server, simply recall it. This is a traditionally compelling reason for isolating servers performing distinctly different tasks. One wonders how aware your new architect is of more global considerations. Richard Sims