Broadcom z/OS

CA PMO Modernization Guide

Program and Load LibrariesPerformance

CA PMO is a program and load libraries product by Broadcom. Explore technical details, modernization strategies, and migration paths below.

Product Overview

CA PMO dynamically loads the location of frequently used modules into memory, improving application performance on z/OS.

It relies on z/OS access control lists (ACLs) to control access to configuration data.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What is the primary function of CA PMO?

CA PMO dynamically monitors program loads to identify frequently used modules. It then keeps the location of these modules in memory, reducing I/O operations and improving application performance. This is similar to LLA but operates at the module level.

How does CA PMO work internally?

CA PMO works by intercepting program load requests, tracking module usage frequency, and managing a memory-resident table of module locations. When a module is requested, CA PMO checks its table first, potentially avoiding disk I/O.

What commands are used to interact with CA PMO?

While specific commands are not directly exposed to users, CA PMO's behavior is influenced by configuration parameters set during initialization. These parameters control memory allocation, monitoring scope, and other operational aspects.

How does CA PMO interact with other CA products?

CA PMO is often used in conjunction with CA Quickfetch to further optimize program loading. CA Quickfetch prefetches modules into memory, while CA PMO manages the in-memory location of frequently used modules.

Technical

How does CA PMO dynamically manage module locations?

CA PMO operates by dynamically monitoring program loads and maintaining a table of frequently used modules in memory. It intercepts program load requests and checks its internal table to locate modules, reducing disk I/O.

Does CA PMO expose any APIs?

CA PMO does not expose direct APIs. Its functionality is integrated into the z/OS program loading process. It intercepts load requests transparently.

What are the main system components of CA PMO?

The main system components include the monitoring component (intercepts program loads), the memory management component (manages the module table), and the configuration component (reads initialization parameters).

How do the components of CA PMO communicate?

CA PMO's components communicate internally through z/OS system services and shared memory. The monitoring component updates the memory management component when new modules are loaded or accessed.

Business Value

How does CA PMO improve business value?

CA PMO improves application performance by reducing the number of disk I/O operations required to load program modules. This results in faster response times and improved throughput.

How does CA PMO reduce operating costs?

By optimizing program loading, CA PMO can reduce CPU utilization and I/O contention, leading to lower operating costs. This is especially beneficial in environments with high transaction volumes.

How does CA PMO complement other performance tools?

CA PMO complements other performance optimization tools, such as CA Quickfetch, to provide a comprehensive solution for program loading and execution. It focuses on managing the location of frequently used modules.

Security

What authentication methods are supported by CA PMO?

CA PMO leverages z/OS security mechanisms for access control. It does not introduce its own authentication methods. It operates within the security context of the z/OS environment.

What access control model is used by CA PMO?

CA PMO relies on z/OS access control lists (ACLs) to control access to its configuration data and operational parameters. User access is governed by the z/OS security subsystem.

What encryption is used by CA PMO?

CA PMO does not directly encrypt data. It operates on program module locations in memory, which are not typically considered sensitive data requiring encryption.

What audit/logging capabilities exist in CA PMO?

CA PMO provides audit logging capabilities through z/OS system management facilities (SMF). Events related to module loading and memory management can be logged for auditing purposes.

Operations

What administrative interfaces are available for CA PMO?

CA PMO is administered through z/OS system programming interfaces and configuration files. There is no dedicated GUI or web console. Configuration parameters are set during initialization.

How is user management handled in CA PMO?

User management is handled by the z/OS security subsystem (e.g., RACF, ACF2, Top Secret). CA PMO does not have its own user management system.

What are the main configuration parameters for CA PMO?

Key configuration parameters include memory allocation size, monitoring scope (which modules to track), and thresholds for determining frequently used modules. These parameters are set in configuration files.

What monitoring/logging capabilities exist in CA PMO?

CA PMO provides monitoring and logging capabilities through z/OS SMF records. These records can be analyzed to track module loading activity and identify performance bottlenecks.

Ready to Start Your Migration?

Download our comprehensive migration guide for CA PMO or calculate your ROI.

Calculate ROI