BCOM Modernization Guide
BCOM is a file transfer product by ETI-NET. Explore technical details, modernization strategies, and migration paths below.
Product Overview
BCOM facilitates file transfer between z/OS and HP NonStop (Tandem) environments, supporting both TCP/IP and SNA protocols.
Competing products include IBM Connect:Direct and CA XCOM.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What is the primary function of BCOM?
BCOM facilitates file transfer between z/OS systems and HP NonStop (Tandem) servers. It supports both TCP/IP and SNA protocols for communication.
What types of operations does BCOM support?
BCOM supports file transfers, remote job submission, and inter-system communication between z/OS and HP NonStop environments.
How is BCOM configured?
BCOM uses configuration files to define transfer parameters, communication settings, and security policies. These files are typically managed through a command-line interface or a dedicated configuration utility.
What are the main components of the BCOM architecture?
BCOM's architecture includes components such as the Transfer Agent, Communication Manager, and Security Manager. These components work together to ensure reliable and secure data transfer.
Technical
What protocols does BCOM use for file transfer, and what are some basic commands?
BCOM supports file transfer via TCP/IP and SNA. The specific commands and syntax depend on the configuration and transfer requirements. For example, a typical command might involve specifying the source file, destination file, and transfer protocol.
Does BCOM expose APIs for integration with other systems?
BCOM may expose APIs for integration with other systems. These APIs could be native interfaces or potentially RESTful services, depending on the specific implementation. Check the vendor documentation for details on available APIs and integration options.
What are the main system components of BCOM?
The main system components include the Transfer Agent, which handles the actual data transfer; the Communication Manager, which manages the communication protocols; and the Security Manager, which enforces security policies.
What configuration files are used by BCOM?
BCOM uses configuration files to store transfer parameters, communication settings, and security policies. These files are typically accessed and modified through a command-line interface or a dedicated configuration utility.
Business Value
What business value does BCOM provide?
BCOM enables efficient and reliable file transfer between z/OS and HP NonStop systems, reducing manual intervention and improving data availability. This can lead to faster processing times and better decision-making.
How does BCOM help reduce risks?
By automating file transfer processes, BCOM reduces the risk of human error and ensures data integrity. This can help organizations meet compliance requirements and avoid costly mistakes.
How does BCOM contribute to cost savings?
BCOM facilitates seamless integration between z/OS and HP NonStop environments, allowing organizations to leverage their existing infrastructure and avoid costly migrations. This can lead to significant cost savings and improved ROI.
Security
What authentication methods are supported by BCOM?
BCOM supports authentication methods such as LDAP, Kerberos, and potentially multi-factor authentication, depending on the specific configuration. It is important to consult the vendor documentation for a complete list of supported methods.
What access control model is used by BCOM?
BCOM uses an access control model based on roles and permissions. This allows administrators to define granular access controls and ensure that only authorized users can access sensitive data.
What encryption is used by BCOM?
BCOM uses encryption to protect data during transit and at rest. The specific encryption algorithms and protocols used depend on the configuration and security policies. Consult the vendor documentation for details on encryption capabilities.
What audit/logging capabilities exist in BCOM?
BCOM provides audit logging capabilities to track user activity and system events. These logs can be used to monitor security, detect anomalies, and investigate incidents.
Operations
What administrative interfaces are available in BCOM?
BCOM provides a command-line interface (CLI) for administrative tasks. User management is typically handled through the CLI or a dedicated administration utility. Configuration parameters are stored in configuration files.
What monitoring/logging capabilities exist in BCOM?
BCOM offers monitoring and logging capabilities to track system performance and identify potential issues. These logs can be analyzed to optimize performance and troubleshoot problems.
What are the main configuration parameters in BCOM?
Key configuration parameters include transfer protocols, communication settings, security policies, and user access controls. These parameters are typically defined in configuration files.
Ready to Start Your Migration?
Download our comprehensive migration guide for BCOM or calculate your ROI.