Users Guide

Encryption key manager (EKM)
A software program that assists encrypting tape drives in generating, protecting, storing, and
maintaining encryption keys that encrypt information that is written to and decrypt information that is
read from tape media.
Entitlement
Entitlement is the ofcial right to receive service and support for your tape library.
EPO
Emergency power off.
EPROM
Erasable programmable read only memory.
EQC
Equipment check.
Equipment check
An asynchronous indication of a malfunction.
Error log
A data set or le in a product or system where error information is stored for later access.
ESD
Electrostatic discharge.
ESP
Encapsulating Security Payload. An Internet Protocol that provides origin authenticity, integrity, and
condentiality protection of a packet. ESP also supports encryption-only and authentication-only
congurations, but encryption without authentication is discouraged because it is insecure.
F
FAT32
FAT stands for File Allocation Table. FAT32 is an extension which means that data is stored in chunks
of 32 bits. Any USB flash drive that is used for updating rmware or exporting logs for the Dell
EMC
ML3 library must be in this format.
Fault symptom code (FSC)
A hexadecimal code that is generated by the drive or the control unit microcode in response to a
detected subsystem error.
FC
Fibre Channel, Feature code.
FCC
Federal communications commission.
FH
Full Height.
Fibre Channel
A high-speed method to connect data storage to a server. The British spelling of "Fibre" is used
because the technology can be used with either ber optic or copper cables. Thus, the name does not
imply that it can be used only with a ber optic cable.
Fiducial
A target that is used for teaching a physical location to a robot.
Field replaceable unit (FRU)
An assembly that is replaced in its entirety when any one of its components fails.
File
A named set of records that are stored or processed as a unit. Also referred to as a data set.
File protection
The processes and procedures that are established in an information system that are designed to
inhibit unauthorized access to, contamination of, or deletion of a le.
Glossary
217