Introduction to NonStop Operations Management
Overview of NonStop Operations Management
Introduction to NonStop Operations Management–125507
1-7
Performance Management
Performance Management
Performance management includes the tasks required to manage the performance of 
your computer system. For example, some of the tasks included in this discipline are:
•
Analyzing and optimizing the current environment by monitoring the performance 
of the operating system, subsystems, network, and applications
•
Isolating performance problems such as system availability and current hardware 
utilization
•
Forecasting the performance impact of changes within the system environment.
•
Planning for system and network growth
•
Collecting and analyzing data for usage accounting, as well as trending information
Tandem provides a number of tools for measuring and tuning system performance. For 
guidelines and suggestions on managing your system’s performance, refer to Section 8, 
“Performance Management.”
For comprehensive information about managing the performance of Tandem NonStop 
systems and networks, refer to the Availability Guide for Performance Management. For 
detailed information about products documented in this manual which are not supported 
in the G01.00 release, refer to the Himalaya S-Series Publications Note.
Security Management
Security management includes the security features necessary to implement a secure, 
audited operations environment. For example, some of the tasks included in this 
discipline are:
•
Managing the identification of users and their proper access to the system, including 
user IDs, password requirements, and access-control lists
•
Securing network access
•
Establishing and monitoring the physical security of the system
•
Defining security features contained within the Tandem NonStop Kernel operating 
system
The Tandem security system is an integrated group of software products that protect data 
existing on a system. Tandem software allows you to implement a variety of security 
policies. For guidelines and suggestions for managing your system’s security, refer to 
Section 9, “Security Management.” For comprehensive information about system 
security, refer to the Security Management Guide.










