DataMiner-Dash Modernization Guide
DataMiner-Dash is a report generation and management product by CSI International. Explore technical details, modernization strategies, and migration paths below.
Product Overview
DataMiner-Dash is a programming language designed for rapid report generation, drawing inspiration from CA Easytrieve.
Security features include password-based authentication and integration with RACF/ACF2.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What is DataMiner-Dash?
DataMiner-Dash is a programming language designed for report generation, similar to CA Easytrieve. It processes data from sequential datasets, VSAM, and Db2.
Is DataMiner-Dash compatible with CA Easytrieve?
DataMiner-Dash accepts CA-Easytrieve language input, allowing users familiar with Easytrieve to transition easily. It also includes extensions and enhancements.
Can DataMiner-Dash sort and process data?
DataMiner-Dash can sort and process input data, enabling users to generate reports based on specific criteria. It supports various data types and formats.
What is the online feature in DataMiner-Dash?
The online feature allows users to view and process CICS VSAM and temporary storage data directly. This provides real-time access to critical information.
Technical
What are some common commands in DataMiner-Dash?
Common commands include DEFINE (to define variables), INPUT (to read data), PRINT (to output data), SORT (to sort data), and IF/THEN/ELSE (for conditional logic).
What is the syntax for a basic operation?
A basic operation involves defining a variable, reading data into it, and then printing it. For example: DEFINE MYVAR CHAR(20) INPUT MYVAR PRINT MYVAR
What configuration files are used?
DataMiner-Dash uses configuration files to define data sources and processing parameters. These files specify dataset names, record layouts, and processing options.
What data sources can DataMiner-Dash access?
DataMiner-Dash can directly access sequential datasets, VSAM, and Db2 data sources. The configuration files specify the connection details for each data source.
Business Value
What is the business value of DataMiner-Dash?
DataMiner-Dash allows for rapid report generation, reducing the time and effort required to create reports. Its compatibility with CA Easytrieve minimizes the learning curve.
How does the online feature add business value?
By providing an online feature to view and process CICS VSAM data, DataMiner-Dash enables real-time decision-making based on up-to-date information.
How does DataMiner-Dash reduce development costs?
DataMiner-Dash reduces development costs by leveraging existing CA Easytrieve skills and code. This minimizes the need for extensive retraining or rewriting of applications.
Security
What authentication methods are supported?
DataMiner-Dash supports authentication methods such as password-based authentication and integration with external security systems like RACF or ACF2.
What access control model is used?
DataMiner-Dash utilizes an access control model based on user roles and permissions. Specific roles are assigned to users, granting them access to certain data and functions.
What encryption is used and where?
DataMiner-Dash encrypts sensitive data both in transit and at rest. Encryption algorithms include AES-256 for data at rest and TLS for data in transit.
What audit/logging capabilities exist?
DataMiner-Dash provides audit logging capabilities, recording user access, data modifications, and system events. These logs can be used for security monitoring and compliance.
Operations
What administrative interfaces are available?
DataMiner-Dash provides administrative interfaces through a command-line interface (CLI) and potentially a web-based console for configuration and monitoring.
How is user management handled?
User management is handled through the administrative interface, allowing administrators to create, modify, and delete user accounts and assign roles.
What are the main configuration parameters?
Key configuration parameters include data source connection details, security settings, logging levels, and performance tuning options. These parameters are typically stored in configuration files.
What monitoring/logging capabilities exist?
DataMiner-Dash offers monitoring and logging capabilities, providing insights into system performance, resource utilization, and error conditions. Logs can be analyzed to identify and resolve issues.
Ready to Start Your Migration?
Download our comprehensive migration guide for DataMiner-Dash or calculate your ROI.