ILM – information lifecycle management

Short for information lifecycle management, ILM is the creation and management of a storage infrastructure and the data that it maintains. All information, or data, in a storage network has a specific lifecycle, from the time the information enters an organization’s system to the time it is archived or removed from the system.

The information may have a finite lifecycle where the data are eventually removed from a storage network when the information becomes outdated or no longer needed-or an infinite lifecycle if the information remains valuable to the organization retaining it.

The Three Stages in the Information Lifecycle

In general, there are three stages in the information lifecycle:

  • The creation and/or acquisition of the data. Information comes into the organization either by being created by one or more individuals or by being acquired through emails, faxes, letters, phone calls, etc.
  • The publication of the data. Some information needs to be published, either in print form or on a company’s intranet or a public Web site.
  • The retention and/or removal of the data. Some information must be archived for later use, and some information has a finite purpose and can be discarded once it has served its purpose or is no longer valuable to the organization.

Managing the Information Lifecycle

The management of the information lifecycle involves keeping the data accessible to the users who need the information and determining how the information is stored based on how high of a priority the information has in the organization at any given moment. At each stage in the information’s lifecycle, the management infrastructure must determine the best software, hardware and storage medium required for the information at that stage, and how those factors differ as the data move through the lifecycle.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...