IBM z/OS zVSE/VSEn

CIMS Mainframe Modernization Guide

Usage Accounting/SMF

CIMS Mainframe is a usage accounting/smf product by IBM. Explore technical details, modernization strategies, and migration paths below.

Product Overview

CIMS Mainframe provided usage accounting on z/OS and z/VSE, tracking CPU, batch, CICS, and IMS transactions.

Configuration involved setting parameters in configuration files.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What type of information did CIMS Mainframe provide?

CIMS Mainframe provided detailed information for chargeback, capacity planning, and invoicing based on resource consumption. It tracked CPU usage, batch jobs, CICS transactions, and IMS transactions.

How did CIMS Mainframe collect its data?

CIMS Mainframe collected data from SMF records generated by the z/OS and z/VSE operating systems. It then processed and aggregated this data into reports and analyses.

How was CIMS Mainframe configured?

CIMS Mainframe used configuration files to define parameters such as SMF record types to process, reporting periods, and chargeback rates. These files were typically maintained by system administrators.

What kind of reports could CIMS Mainframe generate?

CIMS Mainframe could generate various reports, including CPU utilization reports, batch job accounting reports, CICS transaction reports, and IMS transaction reports. These reports could be customized based on specific criteria.

Technical

What data sources did CIMS Mainframe use?

CIMS Mainframe primarily relied on SMF (System Management Facilities) data for its accounting information. It processed SMF records generated by z/OS and z/VSE to track resource usage.

Did CIMS Mainframe expose any APIs?

CIMS Mainframe did not expose standard APIs like REST or SOAP. Integration typically involved direct access to the CIMS database or custom-developed interfaces.

What were the main system components of CIMS Mainframe?

The main components of CIMS Mainframe included the data collection module, the data processing module, the reporting module, and the database. These components communicated through internal interfaces and data stores.

What database did CIMS Mainframe use?

CIMS Mainframe stored its data in a relational database, such as DB2 on z/OS. The database schema included tables for storing resource usage data, chargeback rates, and reporting definitions.

Business Value

What was the business value of CIMS Mainframe?

CIMS Mainframe provided valuable insights into IT resource consumption, enabling organizations to implement chargeback mechanisms, optimize resource allocation, and improve capacity planning.

How did CIMS Mainframe help organizations save costs?

By accurately tracking resource usage, CIMS Mainframe helped organizations identify cost savings opportunities, such as optimizing batch processing schedules or consolidating underutilized resources.

How did CIMS Mainframe support invoicing?

CIMS Mainframe's reporting capabilities allowed organizations to generate invoices based on actual resource consumption, ensuring fair and transparent billing practices.

Security

What authentication methods did CIMS Mainframe support?

CIMS Mainframe leveraged the security features of the underlying z/OS and z/VSE operating systems. It supported authentication methods such as RACF, ACF2, and Top Secret.

What access control model did CIMS Mainframe use?

CIMS Mainframe employed an access control model based on user IDs and roles. Access to specific functions and data was controlled through security profiles defined in the security system.

Did CIMS Mainframe use encryption?

CIMS Mainframe did not provide built-in encryption capabilities. However, organizations could implement encryption at the database level or through network security protocols.

What audit logging capabilities did CIMS Mainframe have?

CIMS Mainframe provided audit logging capabilities, recording user access, configuration changes, and report generation activities. These logs could be used for security monitoring and compliance purposes.

Operations

How was CIMS Mainframe administered?

CIMS Mainframe was administered through a combination of ISPF panels and batch jobs. System administrators used ISPF panels to configure the system and submit batch jobs for data processing and reporting.

How was user management handled in CIMS Mainframe?

User management was handled through the underlying z/OS or z/VSE security system (e.g., RACF, ACF2, Top Secret). CIMS Mainframe relied on these systems for user authentication and authorization.

What monitoring capabilities did CIMS Mainframe have?

CIMS Mainframe provided monitoring capabilities through SMF data and system logs. Administrators could monitor system performance, resource utilization, and error conditions using these data sources.

Ready to Start Your Migration?

Download our comprehensive migration guide for CIMS Mainframe or calculate your ROI.

Calculate ROI