Introduction to NonStop Operations Management
Change and Configuration Management
Introduction to NonStop Operations Management–125507
7-6
Performing Subsystem Changes
•
SCF allows you to add and change configurations for many (not all) device 
types while the system is running. SCF also reduces the need to preconfigure 
software changes.
Performing Subsystem Changes
The Tandem environment consists of application and communications subsystems. The 
application subsystems enable you to develop and run high-performance, high-volume, 
and highly available OLTP applications. The application subsystems that make up the 
Tandem application environment include NonStop Transaction Services/MP (TS/MP), 
NonStop SQL/MP, and NonStop Transaction Manager/MP (TM/MP). The 
communications subsystems provides users with access to a set of communications 
services.
Follow these guidelines when changing or creating an application or communication 
subsystem: 
•
Before starting the change process, create a list of all parameters that will be 
changed. Keep this list in case questions arise in the future.
•
You might have to shut down the applications that are using the products before 
reconfiguring the products. Refer to the Availability Guide for Change Management 
for a description of application changes that can be performed online.
•
Use each product’s command interpreter to reconfigure the application. For 
example, use TMFCOM to reconfigure NonStop TM/MP.
•
To reconfigure data communications lines and devices, you can use DSM/SCM or 
the Subsystem Control Facility (SCF), depending on the device or line type.
Performing Software Changes
A software change can include installing software purchased from another vendor or 
installing software developed in-house. To protect system security, develop procedures 
to prevent the installation of any software except the legitimate software. The staff 
should answer the following questions before installing new software:
•
Has the software come through ordinary channels?
•
Is the software documented in the way that is standard for the organization?
•
If the software is an update, does it update the particular version of the software you 
already have?
•
Do the installation instructions require you to expose your system security?
Exercise similar care when dealing with software created by your system programmers 
or application programmers. Review their software carefully, especially if it performs 
actions on behalf of other users or uses special privileges. Consider including the 
following questions in staff check lists:
•
Has the software been subjected to standard quality-assurance and offline testing?
•
Has the software been reviewed and approved by management?
•
Does the software require privileges for an obscure or unnecessary function?










