Availability Guide for Change Management
About This Manual
Availability Guide for Change Management–125506
xiii
Where to Find More Information
Where to Find More Information
The following manuals contain information that may also be of interest to readers of this
manual:
•
The Introduction to NonStop Operations Management introduces managers to
NonStop system operations. It provides guidelines, suggestions, and ideas on the
following topics: staffing, operations and support areas, operations documentation,
production management, problem management, change management, configuration
management, performance management, security management, application
management, automating and centralizing operations, and improving operations
management processes. This manual is a prerequisite for reading other Tandem
operations manuals.
•
The Introduction to Tandem NonStop Systems introduces you to the computing
environment of Tandem NonStop systems. It describes the online transaction-
processing (OLTP) requirements that the NonStop system was designed to meet and
shows how the three layers of the NonStop system (the application environment,
architecture, and networking) provide a unique and comprehensive solution to the
challenges of OLTP.
•
The Introduction to Tandem Networking and Data Communications provides an
overview of Tandem networking and data communications concepts, tasks, products,
and manuals and discusses ways to connect Tandem systems to various devices and
networks.
•
The Availability Guide for Problem Management provides information to help you
implement a problem management process and use Tandem tools to eliminate or
reduce unplanned outages.
•
The Availability Guide for Performance Management explains how to measure
system performance, analyze system performance information, and optimize the
performance of Tandem NonStop systems.
•
The Availability Guide for Application Design provides an overview of application
availability options available to designers and developers.
•
The Security Management Guide provides information to help you manage system
security issues such as identification of users, proper access to data and system
resources, encryption of data, and administration of the security process.
Other related documents are referred to in various sections throughout this manual.