IBM z/OS

Application Discovery and Delivery Intelligence Modernization Guide

Infrastructure and Computing AssetsData Discovery, Mining and ProcessiTestingTools and Utilities

Application Discovery and Delivery Intelligence is a infrastructure and computing assets product by IBM. Explore technical details, modernization strategies, and migration paths below.

Product Overview

Application Discovery and Delivery Intelligence (ADDI) provides insights into application structure and dependencies.

ADDI exposes REST APIs for accessing metadata and triggering analysis, using endpoints like `/metadata` and `/analysis`.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What is the primary purpose of Application Discovery and Delivery Intelligence?

Application Discovery and Delivery Intelligence helps users understand application structure, dependencies, and code quality. It supports impact analysis, modernization efforts, and testing optimization by providing a comprehensive view of application assets.

What types of application assets can be discovered?

The product discovers application assets such as programs, copybooks, databases, transactions, and their interrelationships. It identifies dependencies between components, data flow, and potential vulnerabilities.

How does Application Discovery and Delivery Intelligence aid in testing?

Application Discovery and Delivery Intelligence integrates with testing tools to prioritize test cases based on impact analysis. It helps identify which tests to run after a code change, reducing testing time and improving code quality.

Technical

What are the main system components?

The system components include the Discovery Service, Analysis Engine, and the User Interface. The Discovery Service collects metadata, the Analysis Engine processes it, and the User Interface provides visualization and reporting.

What type of APIs does Application Discovery and Delivery Intelligence expose?

Application Discovery and Delivery Intelligence exposes REST APIs for accessing metadata, triggering analysis, and integrating with other tools. Specific endpoints include `/metadata`, `/analysis`, and `/reports`.

What databases or storage mechanisms are used?

The product uses a repository, often a DB2 database, to store metadata and analysis results. Communication between components occurs via REST APIs and message queues.

Business Value

How does Application Discovery and Delivery Intelligence provide business value?

Application Discovery and Delivery Intelligence helps reduce the cost and risk of application modernization by providing a clear understanding of existing systems. It enables informed decisions about refactoring, re-platforming, or replacing applications.

How does the product save time and resources?

By automating the discovery and analysis of application assets, the product saves time and resources compared to manual methods. It provides a centralized view of application knowledge, reducing reliance on individual experts.

How does Application Discovery and Delivery Intelligence support compliance?

Application Discovery and Delivery Intelligence supports compliance efforts by providing detailed documentation of application dependencies and data flows. This helps organizations meet regulatory requirements and reduce audit risks.

Security

What authentication methods are supported?

Application Discovery and Delivery Intelligence supports authentication methods such as LDAP, SAML 2.0, and X.509 certificates. These methods ensure secure access to the product's features and data.

What access control model is used?

The product uses Role-Based Access Control (RBAC) to manage user permissions. Administrators can assign roles to users, granting them specific privileges to access and modify application metadata and analysis results.

What encryption is used and where?

Application Discovery and Delivery Intelligence uses encryption to protect sensitive data both in transit and at rest. Data is encrypted using TLS for communication and AES-256 for storage.

What audit/logging capabilities exist?

The product provides audit logging capabilities to track user activities and system events. Audit logs can be used to monitor access, detect security breaches, and ensure compliance with security policies.

Operations

What administrative interfaces are available?

The administrative interface is a web console that provides tools for managing users, configuring data sources, and monitoring system performance. It allows administrators to customize the product to meet their specific needs.

How is user management handled?

User management is handled through the web console, where administrators can create, modify, and delete user accounts. They can also assign roles and permissions to control access to different features and data.

What are the main configuration parameters?

The main configuration parameters include data source connections, analysis settings, and security configurations. These parameters can be adjusted through the web console or configuration files.

What monitoring/logging capabilities exist?

Application Discovery and Delivery Intelligence provides monitoring and logging capabilities to track system performance and detect issues. Logs can be accessed through the web console or exported for analysis with external tools.

Ready to Start Your Migration?

Download our comprehensive migration guide for Application Discovery and Delivery Intelligence or calculate your ROI.

Calculate ROI