ADC2 Modernization Guide
ADC2 is a batch product by CA Technologies. Explore technical details, modernization strategies, and migration paths below.
Product Overview
ADC2 was a batch job scheduling system for z/OS environments.
ADC2 did not offer standard APIs like REST or SOAP; integration relied on custom scripting or direct database access.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What was ADC2 primarily used for?
ADC2 was primarily used for automating and scheduling batch jobs on z/OS systems. It allowed users to define job dependencies, schedule execution times, and monitor job status. It also provided features for workload balancing and resource management.
How did users interact with ADC2?
ADC2 used a command-line interface (CLI) for most operations. Users interacted with the system through commands entered via a terminal or console. Configuration files defined job schedules, dependencies, and resource allocations.
What was the architecture of ADC2?
ADC2's architecture consisted of a central scheduler, agent processes on z/OS systems, and a database for storing job definitions and status. The scheduler communicated with agents to dispatch jobs and monitor their execution. The database stored job definitions, schedules, and historical data.
What monitoring and reporting capabilities did ADC2 offer?
ADC2 provided features for monitoring job status, tracking resource utilization, and generating reports. Users could view job logs, execution times, and error messages. The system also provided alerts for failed jobs or resource bottlenecks.
Technical
What were some common commands in ADC2?
Common commands included those for defining jobs (JOB), scheduling jobs (SCHD), monitoring job status (STAT), and managing resources (RES). For example, `JOB DEFINE JOB(jobname) ...` defined a new job, and `SCHD JOB(jobname) TIME(hhmm)` scheduled it to run at a specific time.
Did ADC2 expose any APIs?
ADC2 did not expose standard APIs like REST or SOAP. Integration was typically achieved through custom scripting or by directly accessing the underlying database. Communication between components relied on proprietary protocols.
What were the main system components of ADC2?
The main components included the Scheduler, Agents, and Database. The Scheduler dispatched jobs to Agents running on z/OS systems. Agents executed the jobs and reported status back to the Scheduler. The Database stored job definitions, schedules, and historical data.
What configuration files and interfaces were used?
ADC2 used a proprietary format for configuration files. These files defined job schedules, dependencies, and resource allocations. The administrative interface was primarily command-line based.
Business Value
What business value did ADC2 provide?
ADC2 automated batch job scheduling, reducing manual intervention and improving operational efficiency. It allowed for centralized control and monitoring of batch workloads, optimizing resource utilization and minimizing processing time.
How did ADC2 help organizations reduce costs and improve service levels?
By automating job scheduling and workload balancing, ADC2 helped organizations reduce operational costs and improve service levels. It enabled faster processing of batch jobs and better utilization of system resources.
How did ADC2 help organizations monitor and optimize performance?
ADC2 provided features for monitoring job status and tracking resource utilization, enabling organizations to identify and resolve performance bottlenecks. It also offered reporting capabilities for analyzing job execution times and resource consumption.
Security
What authentication methods were supported by ADC2?
ADC2 supported authentication through z/OS security systems like RACF, ACF2, and Top Secret. Access control was based on user IDs and groups defined in these security systems. It did not offer granular role-based access control (RBAC).
What access control model did ADC2 use?
ADC2 relied on z/OS security systems for access control. It did not implement its own access control model. User permissions were determined by their access rights within RACF, ACF2, or Top Secret.
Did ADC2 provide encryption capabilities?
ADC2 did not provide built-in encryption capabilities. Data was transmitted and stored without encryption. Organizations had to implement their own encryption solutions if required.
What audit and logging capabilities did ADC2 offer?
ADC2 provided audit logging capabilities, recording user actions and system events. These logs could be used for security monitoring and compliance purposes. The logs were stored in a proprietary format.
Operations
How was ADC2 administered?
ADC2 was administered through a command-line interface (CLI). User management was handled through z/OS security systems like RACF, ACF2, and Top Secret. Configuration parameters were defined in proprietary configuration files.
What monitoring and logging capabilities did ADC2 offer?
ADC2 provided monitoring capabilities for job status, resource utilization, and system performance. Logs were stored in a proprietary format and could be analyzed for troubleshooting and performance tuning.
What network requirements existed for ADC2?
ADC2 required specific ports for communication between the scheduler and agents. These ports had to be open in the firewall to allow job dispatching and status reporting. The exact ports varied depending on the configuration.
Ready to Start Your Migration?
Download our comprehensive migration guide for ADC2 or calculate your ROI.