BMC Application Accelerator for IMS Modernization Guide
BMC Application Accelerator for IMS is a tools and utilities product by BMC. Explore technical details, modernization strategies, and migration paths below.
Product Overview
BMC Application Accelerator for IMS dynamically monitors IMS batch performance and provides recommendations to reduce CPU usage.
Audit logging capabilities record user actions and system events.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What does BMC Application Accelerator for IMS do?
BMC Application Accelerator for IMS dynamically monitors IMS batch performance and recommends changes to reduce CPU usage. It also optimizes performance by dynamically altering JCL parameters to tune buffers and I/O settings.
How does the tool optimize IMS batch processing?
The tool optimizes IMS batch processing by dynamically tuning buffer sizes, I/O parameters, and other settings without requiring manual JCL or code modifications. This leads to reduced CPU consumption and faster processing times.
How does the tool provide recommendations for optimization?
The tool analyzes IMS batch job performance in real-time and provides recommendations for optimization. It can also automatically implement these recommendations by modifying JCL parameters.
What environments are supported by the tool?
The tool supports z/OS environments where IMS is running. It integrates with existing IMS configurations and requires appropriate security authorizations to monitor and modify JCL parameters.
Technical
What configuration files are used by the tool?
The tool uses configuration files to define monitoring parameters, optimization thresholds, and JCL modification rules. These files are typically maintained by system administrators.
How does the tool monitor IMS batch job performance?
The tool monitors IMS batch job execution in real-time, collecting performance metrics such as CPU usage, I/O wait times, and buffer utilization. This data is used to identify optimization opportunities.
What JCL parameters can be dynamically modified?
The tool can dynamically modify JCL parameters such as buffer sizes, I/O settings, and other resource allocations. These modifications are based on predefined rules and real-time performance analysis.
How does the tool communicate with IMS?
The tool typically communicates with IMS using standard z/OS system services and APIs. Specific communication protocols may include TCP/IP or SNA, depending on the IMS configuration.
Business Value
How does the tool provide business value?
By optimizing IMS batch processing, the tool reduces CPU consumption, leading to lower operational costs. Faster processing times also improve overall business efficiency.
How does the tool help meet service level agreements?
The tool helps organizations meet service level agreements (SLAs) by ensuring timely completion of IMS batch jobs. This improves customer satisfaction and reduces potential penalties.
How does the tool reduce the need for manual tuning?
The tool automates the optimization of IMS batch processing, reducing the need for manual tuning and intervention. This frees up IT staff to focus on other critical tasks.
Security
How does the tool handle security and access control?
The tool integrates with z/OS security systems such as RACF, ACF2, or Top Secret to control access to its functions and data. User authentication is typically handled through these security systems.
What access control model is used by the tool?
The tool supports role-based access control (RBAC), allowing administrators to assign specific permissions to users based on their roles. This ensures that users only have access to the functions and data they need.
What encryption is used by the tool?
The tool encrypts sensitive data such as passwords and configuration parameters using industry-standard encryption algorithms. Data in transit is typically protected using SSL/TLS encryption.
What audit logging capabilities exist?
The tool provides audit logging capabilities, recording all user actions and system events. These logs can be used to track changes, identify security breaches, and ensure compliance with regulatory requirements.
Operations
What administrative interfaces are available?
The tool provides a command-line interface (CLI) and a web-based GUI for administrative tasks. The CLI is typically used for batch processing and automation, while the GUI is used for interactive monitoring and configuration.
How is user management handled?
User management is handled through the z/OS security system (RACF, ACF2, or Top Secret). The tool integrates with these systems to authenticate users and authorize access to its functions.
What monitoring capabilities exist?
The tool provides monitoring dashboards and reports that display real-time performance metrics and historical trends. These tools help administrators identify performance bottlenecks and track the effectiveness of optimization efforts.
What logging capabilities exist?
The tool generates detailed logs of all system activity, including optimization recommendations, JCL modifications, and error messages. These logs can be used for troubleshooting and performance analysis.
Ready to Start Your Migration?
Download our comprehensive migration guide for BMC Application Accelerator for IMS or calculate your ROI.