CA Technologies z/OS zVSE/VSEn

CA Datacom/DC Modernization Guide

Transactions

CA Datacom/DC is a transactions product by CA Technologies. Explore technical details, modernization strategies, and migration paths below.

Product Overview

CA Datacom/DC was a transaction processing system designed to work with the Datacom/DB DBMS on z/OS and zVSE/VSEn platforms.

Security was integrated with mainframe security systems like RACF, ACF2, or Top Secret, using role-based access control.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What is CA Datacom/DC?

CA Datacom/DC is a transaction management system that works in conjunction with the Datacom/DB DBMS. It manages transaction flow and data access within the z/OS and zVSE/VSEn environments.

What are some common operations performed with CA Datacom/DC?

While specific commands vary based on configuration, common operations include transaction initiation, data retrieval, updates, and commit/rollback. Configuration is typically managed through control cards and system parameters.

What types of APIs does CA Datacom/DC expose?

CA Datacom/DC primarily supports native APIs for integration with applications running on z/OS and zVSE/VSEn. Communication relies on protocols specific to the mainframe environment.

What are the main system components of CA Datacom/DC?

Key components include the Central Transaction Processor (CTP), the Message Control System (MCS), and the Recovery/Restart facility. These components communicate through internal system calls and shared memory.

How is security managed in CA Datacom/DC?

Security is managed through integration with mainframe security systems like RACF, ACF2, or Top Secret. Access control is typically role-based, with permissions defined for different transaction types and data resources.

Technical

What are some common commands and their syntax?

Common commands include `INITIATE TRANSACTION`, `GET DATA`, `UPDATE DATA`, `COMMIT TRANSACTION`, and `ROLLBACK TRANSACTION`. The exact syntax depends on the application programming language and the specific interface being used.

What programming languages are supported for integration?

CA Datacom/DC exposes native APIs for COBOL, Assembler, and PL/I. These APIs allow applications to interact directly with the transaction management system. Communication protocols are typically proprietary to the mainframe environment.

How do the main system components communicate?

The Central Transaction Processor (CTP) manages transaction execution. The Message Control System (MCS) handles message routing and queuing. The Recovery/Restart facility ensures data integrity in case of system failures. These components communicate via internal system calls and shared memory.

What administrative interfaces are available?

Administration is typically performed through a combination of console commands and batch jobs. User management is handled through integration with mainframe security systems. Configuration parameters are defined in system parameter files.

What authentication methods are supported?

CA Datacom/DC integrates with mainframe security systems such as RACF, ACF2, and Top Secret for authentication. Access control is typically role-based, with permissions assigned to different roles. Encryption is used for sensitive data in transit and at rest.

Business Value

What business value does CA Datacom/DC provide?

CA Datacom/DC provides a reliable and efficient transaction processing environment for mainframe applications. It ensures data integrity and consistency across multiple systems.

How does CA Datacom/DC improve application performance?

By managing transaction flow and data access, CA Datacom/DC helps to improve application performance and scalability. It optimizes resource utilization and reduces response times.

How does CA Datacom/DC reduce costs?

CA Datacom/DC integrates with existing mainframe infrastructure and security systems. This reduces the cost and complexity of implementation and maintenance.

What types of applications does CA Datacom/DC support?

CA Datacom/DC supports a wide range of applications, including online transaction processing (OLTP) and batch processing. This makes it a versatile solution for different business needs.

Security

How does CA Datacom/DC ensure security?

CA Datacom/DC integrates with mainframe security systems like RACF, ACF2, and Top Secret for authentication and authorization. This ensures that only authorized users can access sensitive data and resources.

What access control model is used?

Access control is typically role-based, with permissions assigned to different roles. This allows administrators to easily manage user access and enforce security policies.

What audit logging capabilities exist?

CA Datacom/DC provides audit logging capabilities to track user activity and system events. This helps to identify and prevent security breaches.

What encryption is used and where?

Encryption is used to protect sensitive data in transit and at rest. This ensures that data is not compromised even if it is intercepted or stolen.

Operations

What monitoring capabilities exist?

CA Datacom/DC provides monitoring tools to track system performance and identify potential problems. These tools help administrators to proactively manage the system and prevent downtime.

What logging capabilities exist?

Logging capabilities provide detailed information about system events and errors. This helps administrators to troubleshoot problems and identify the root cause of issues.

How does CA Datacom/DC handle system failures?

CA Datacom/DC supports automated restart and recovery procedures to minimize downtime in case of system failures. This ensures that the system can quickly recover from outages and resume normal operations.

How is administration performed?

Administration is typically performed through a combination of console commands and batch jobs. This provides administrators with a flexible and efficient way to manage the system.

Ready to Start Your Migration?

Download our comprehensive migration guide for CA Datacom/DC or calculate your ROI.

Calculate ROI