Introduction to NonStop Operations Management
Overview of NonStop Operations Management
Introduction to NonStop Operations Management–125507
1-7
Performance Management
Performance Management
Performance management includes the tasks required to manage the performance of
your computer system. For example, some of the tasks included in this discipline are:
•
Analyzing and optimizing the current environment by monitoring the performance
of the operating system, subsystems, network, and applications
•
Isolating performance problems such as system availability and current hardware
utilization
•
Forecasting the performance impact of changes within the system environment.
•
Planning for system and network growth
•
Collecting and analyzing data for usage accounting, as well as trending information
Tandem provides a number of tools for measuring and tuning system performance. For
guidelines and suggestions on managing your system’s performance, refer to Section 8,
“Performance Management.”
For comprehensive information about managing the performance of Tandem NonStop
systems and networks, refer to the Availability Guide for Performance Management. For
detailed information about products documented in this manual which are not supported
in the G01.00 release, refer to the Himalaya S-Series Publications Note.
Security Management
Security management includes the security features necessary to implement a secure,
audited operations environment. For example, some of the tasks included in this
discipline are:
•
Managing the identification of users and their proper access to the system, including
user IDs, password requirements, and access-control lists
•
Securing network access
•
Establishing and monitoring the physical security of the system
•
Defining security features contained within the Tandem NonStop Kernel operating
system
The Tandem security system is an integrated group of software products that protect data
existing on a system. Tandem software allows you to implement a variety of security
policies. For guidelines and suggestions for managing your system’s security, refer to
Section 9, “Security Management.” For comprehensive information about system
security, refer to the Security Management Guide.