BUDDS Modernization Guide
BUDDS is a browse and edit product by MacKinney Systems. Explore technical details, modernization strategies, and migration paths below.
Product Overview
BUDDS (Bits User Data Display System) is designed for browsing and editing CICS files (VSAM, BDAM, ISAM) using a 3270 interface.
Configuration involves defining file layouts within CICS.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What is BUDDS?
BUDDS is a tool for browsing and editing CICS files (VSAM, BDAM, ISAM) from 3270-type devices. It allows users to find, display, and modify records within these files.
What types of databases does BUDDS interact with?
BUDDS primarily interacts with VSAM, BDAM, and ISAM files. It does not typically interface directly with relational databases.
How does BUDDS present data to users?
BUDDS uses a 3270 interface for user interaction. Configuration files are used to define file layouts and access parameters.
Technical
What are the most common commands in BUDDS?
Common commands include FIND (to locate specific records), DISPLAY (to view record content), and MODIFY (to alter record data).
What configuration files are used by BUDDS?
BUDDS uses configuration files to define file layouts and access parameters. These files specify record structures and data types.
Does BUDDS expose an API?
BUDDS does not expose standard APIs like REST or SOAP. Interaction is primarily through the 3270 interface.
Business Value
How does BUDDS provide business value?
BUDDS allows users to directly view and modify data in CICS files, which can be crucial for debugging and resolving data issues quickly.
How does BUDDS save time?
By providing direct access to file data, BUDDS can reduce the time required to diagnose and fix data-related problems in CICS environments.
Security
What authentication methods are supported by BUDDS?
BUDDS leverages CICS security features for authentication. Specific authentication methods depend on the CICS environment configuration.
How is access control managed in BUDDS?
Access control is typically managed through CICS security mechanisms, which may include RACF, ACF2, or Top Secret, depending on the installation.
What audit/logging capabilities exist in BUDDS?
BUDDS relies on CICS logging and auditing facilities. Specific audit trails depend on the CICS configuration.
Operations
How is BUDDS administered?
BUDDS is administered through CICS. User management is handled via CICS security administration tools like RACF, ACF2, or Top Secret.
What monitoring capabilities exist for BUDDS?
Monitoring is performed through CICS monitoring tools. BUDDS does not have its own dedicated monitoring interface.
What are the main configuration parameters for BUDDS?
Configuration parameters are primarily related to file layouts and access permissions, defined within CICS and related security systems.
Ready to Start Your Migration?
Download our comprehensive migration guide for BUDDS or calculate your ROI.