UBS Hainer z/OS

BTO Modernization Guide

DatabasesTestingData ManagementDb2

BTO is a databases product by UBS Hainer. Explore technical details, modernization strategies, and migration paths below.

Product Overview

BTO is a workstation-based Java application designed to generate test DB2 data from production databases.

BTO helps avoid the risks associated with using live production data in testing, such as data breaches and compliance violations.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What does BTO do?

BTO is a workstation-based Java application designed to create test DB2 data from production databases. It supports any database with a JDBC interface, including IMS, making it versatile for various data environments.

Is this a system, application, or tool?

BTO is an application designed to streamline the creation of test data. It provides a user-friendly interface for extracting and transforming data from production databases into usable test datasets.

What types of organizations use this?

Organizations that rely on DB2 or other JDBC-compliant databases, particularly those in industries requiring rigorous testing and data management practices, such as banking, finance, and insurance, would benefit from BTO.

When should we consider BTO?

A company should consider using BTO when they need to create realistic test data sets from production databases efficiently and securely. This is especially useful during application development, testing, and database migration projects.

What are the alternatives to BTO?

Alternatives to BTO include data masking tools, data subsetting tools, and custom scripting solutions. Some competitors offer similar functionality for test data creation and management.

Technical

What infrastructure is required?

BTO requires a workstation with a Java Runtime Environment (JRE) and connectivity to the databases from which test data will be extracted. It uses JDBC to connect to these databases.

For mainframe products: Does this run in an LPAR?

BTO operates as a workstation-based application, so it does not directly run within a z/OS LPAR. However, it connects to DB2 databases that reside on z/OS systems.

How does BTO connect to databases?

BTO connects to databases using JDBC. The specific connection parameters are configured within the application, including the JDBC driver class, database URL, username, and password.

Is BTO a standalone product?

BTO is primarily a standalone application, but it can integrate with other data management and testing tools through its ability to generate and export test data in various formats.

Business Value

What is the business value of using BTO?

BTO provides business value by reducing the time and effort required to create realistic test data. This leads to faster development cycles, improved software quality, and reduced risk of data breaches by avoiding the use of sensitive production data in test environments.

How does BTO save time and resources?

By automating the test data creation process, BTO helps organizations save time and resources. It also ensures that test data is consistent and representative of production data, leading to more reliable test results.

How does BTO help with data privacy?

BTO helps ensure data privacy by allowing organizations to create test data without directly exposing sensitive production data. This reduces the risk of accidental data leaks or unauthorized access to confidential information.

Security

What authentication methods are supported?

BTO supports various authentication methods depending on the underlying database. This includes username/password authentication, Kerberos, and other database-specific authentication mechanisms.

What access control model is used?

BTO relies on the access control mechanisms of the underlying databases it connects to. It does not implement its own access control model but rather leverages the existing security infrastructure of DB2 and other supported databases.

What encryption is used and where?

BTO does not directly encrypt data but ensures that sensitive data is not exposed in test environments by creating test data from production databases. Encryption at rest and in transit should be handled by the underlying database systems.

Operations

What ongoing operational requirements exist?

BTO requires ongoing monitoring to ensure that database connections are stable and that test data creation processes are running smoothly. Regular maintenance includes updating the application and JDBC drivers.

How is BTO typically deployed?

BTO is typically deployed on workstations and requires a Java Runtime Environment. The implementation involves configuring database connections and defining the data extraction and transformation rules.

What are common implementation challenges?

Implementing BTO can be challenging if the database schemas are complex or if the data transformation requirements are intricate. Proper planning and testing are essential to ensure that the generated test data is accurate and representative.

Ready to Start Your Migration?

Download our comprehensive migration guide for BTO or calculate your ROI.

Calculate ROI