Applied Software z/OS

Almost TSO Modernization Guide

TSO/ISPFApplication/Application Enviroment

Almost TSO is a tso/ispf product by Applied Software. Explore technical details, modernization strategies, and migration paths below.

Product Overview

Almost TSO is a replacement for the standard TSO/ISPF environment on z/OS systems.

Organizations that rely on TSO/ISPF for application development, system administration, and general user interaction on the mainframe are potential users. Consider adopting Almost TSO if your organization is experiencing high CPU utilization from TSO/ISPF, faces increasing mainframe costs, or wants to enhance the performance of interactive applications.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What does Almost TSO do?

Almost TSO is a replacement for the traditional TSO/ISPF environment on z/OS. It aims to provide similar functionality while consuming fewer CPU resources, potentially leading to cost savings and improved system performance. It allows users to interact with the mainframe in a familiar interactive environment.

Is this a system, application, or tool?

Almost TSO is best described as an application environment that replaces a system component. It provides an interactive environment for users and applications, similar to TSO/ISPF, but with a focus on reduced resource consumption. It is not a standalone application but rather a comprehensive environment.

What types of organizations use this?

Organizations that rely heavily on TSO/ISPF for mainframe application development, system administration, and user interaction are prime candidates. This includes enterprises in industries like banking, finance, insurance, and government, where mainframe systems are critical. Any organization looking to optimize CPU usage and reduce costs associated with TSO/ISPF sessions could benefit.

When should we consider Almost TSO?

A company should consider Almost TSO when they are experiencing high CPU utilization related to TSO/ISPF sessions, facing increasing costs for mainframe resources, or seeking to improve the performance of interactive mainframe applications. It is also a good option when planning a technology refresh or looking for ways to modernize the mainframe environment without extensive application changes.

What are the alternatives to Almost TSO?

Alternatives to Almost TSO include the standard TSO/ISPF provided by IBM, as well as other third-party TSO/ISPF replacement products. Some organizations might also consider migrating applications to web-based interfaces or other platforms to reduce reliance on TSO/ISPF. Another alternative is TSO FSE+.

Technical

For mainframe products: Does this run in an LPAR?

Almost TSO runs on the z/OS platform and is dependent on the underlying z/OS operating system. It typically runs within an LPAR (Logical Partition) on the mainframe. It likely requires standard z/OS subsystems to be active, such as JES (Job Entry Subsystem) and VTAM (Virtual Telecommunications Access Method).

How is Almost TSO typically deployed?

Almost TSO is deployed on-premise within the z/OS environment. It requires installation and configuration on the mainframe system. It is not a cloud-based or SaaS solution. The implementation involves configuring the software, defining user access, and integrating it with existing security systems.

Is this a standalone product or does it extend/enhance another product?

Almost TSO likely extends or enhances the standard TSO/ISPF functionality. It provides a replacement environment that aims to be compatible with existing TSO/ISPF applications and procedures. It is not a standalone product but rather a substitute for the IBM-supplied TSO/ISPF.

What are the main system components?

The specific architecture components of Almost TSO are not publicly available. However, it likely includes components for terminal emulation, command processing, screen management, and security. These components work together to provide the interactive user environment.

Business Value

What is the primary business value of Almost TSO?

The primary business value of Almost TSO is the potential reduction in CPU consumption compared to traditional TSO/ISPF. This can lead to lower mainframe operating costs, improved system performance, and increased capacity for other workloads. It can also extend the life of existing mainframe hardware by optimizing resource utilization.

How can organizations benefit from using Almost TSO?

Organizations can achieve cost savings by reducing CPU consumption, potentially lowering their monthly mainframe bills. Improved system performance can lead to faster response times for users and applications, increasing productivity. It can also free up mainframe capacity for new initiatives and growth.

What is the typical total cost of ownership?

The total cost of ownership includes the initial licensing fees, implementation costs, ongoing maintenance and support fees, and the cost of training staff. It is important to consider the potential savings in CPU consumption when evaluating the overall cost. Vendor lock-in should also be considered, as migrating away from Almost TSO might require changes to user procedures and automation.

Security

How does Almost TSO handle security?

Almost TSO likely integrates with existing z/OS security systems such as RACF, ACF2, or Top Secret for authentication and authorization. It should support standard authentication methods used on the mainframe, such as user IDs and passwords. The access control model is likely based on assigning users to groups and granting permissions to resources based on group membership.

What encryption is used and where?

The specific encryption methods used by Almost TSO are not publicly available. However, it should support encryption for sensitive data transmitted between the terminal and the mainframe. It should also provide audit logging capabilities to track user activity and security events.

What audit/logging capabilities exist?

Almost TSO should provide audit logging capabilities to track user activity, security events, and system changes. These logs can be used for security monitoring, compliance reporting, and troubleshooting. The logs should include information such as user IDs, timestamps, commands executed, and resources accessed.

Operations

What ongoing operational requirements exist?

Ongoing operational requirements include monitoring system performance, managing user access, applying software updates, and troubleshooting issues. It requires staff with expertise in z/OS systems administration and security. Common implementation challenges include ensuring compatibility with existing TSO/ISPF applications and procedures, and integrating with existing security systems.

What administrative interfaces are available?

Administrative interfaces likely include a combination of ISPF panels, command-line interfaces (CLIs), and potentially a web-based console. User management is typically handled through integration with z/OS security systems such as RACF, ACF2, or Top Secret. Configuration parameters are likely stored in configuration files or datasets.

What monitoring/logging capabilities exist?

Monitoring capabilities should include tracking CPU utilization, memory usage, and response times. Logging capabilities should capture user activity, security events, and system errors. These metrics can be used to identify performance bottlenecks, detect security threats, and troubleshoot issues.

Ready to Start Your Migration?

Download our comprehensive migration guide for Almost TSO or calculate your ROI.

Calculate ROI