EDBC Modernization Guide
EDBC is a legacy application/data access product by Actian Corporation. Explore technical details, modernization strategies, and migration paths below.
Product Overview
EDBC is middleware that provides SQL access to mainframe legacy data from Windows and UNIX systems.
It is particularly useful when modernizing applications while retaining mainframe data.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What does EDBC do?
EDBC provides SQL access to mainframe legacy data from Windows and UNIX systems. It allows applications on these platforms to interact with mainframe databases using standard SQL queries.
Is this a system, application, or tool?
EDBC is middleware. It acts as a bridge between client applications and mainframe databases, translating SQL requests and handling data transfer.
What types of organizations use this?
Organizations that rely on mainframe systems for core business functions and need to integrate that data with distributed applications on Windows or UNIX platforms use EDBC.
When should we consider EDBC?
A company should consider using EDBC when it needs to provide real-time or near-real-time access to mainframe data for applications running on other platforms, or when modernizing applications while retaining mainframe data.
What are the alternatives to EDBC?
Alternatives to EDBC include other data access middleware products, data replication solutions, and custom-built integration solutions. Specific products include IBM Data Server Client, and other vendor-specific mainframe data access tools.
Technical
What infrastructure is required?
EDBC requires a mainframe environment running z/OS and the target databases (CA Datacom/DB, DB2, VSAM, IMS, CA IDMS/DB). It also requires a Windows or UNIX system to host the client-side components.
For mainframe products: Does this run in an LPAR?
EDBC runs on z/OS within an LPAR. It is dependent on the z/OS operating system and requires the presence of the target database subsystems.
What APIs does EDBC expose?
EDBC exposes APIs that allow client applications to connect and execute SQL queries against mainframe data sources. The specific API types and protocols used depend on the client-side implementation.
What are the main system components?
The main components of EDBC include the server-side component on the mainframe, the client-side driver on Windows/UNIX, and configuration files that define the data source mappings.
Business Value
What business problem does it solve?
EDBC solves the business problem of providing access to valuable mainframe data for applications running on distributed platforms. Without it, organizations would face challenges integrating mainframe data with modern systems.
What would happen if an organization did NOT use this product?
If an organization did not use EDBC, they would need to find alternative ways to access mainframe data, such as custom-built integration solutions, which can be costly and complex.
How does EDBC provide business value?
EDBC allows organizations to leverage their existing mainframe investments while modernizing their application landscape. It reduces the need for costly data migration projects.
Security
What specific authentication methods are supported?
EDBC supports authentication methods such as user ID/password and potentially integrates with mainframe security systems like RACF, ACF2, or Top Secret.
What access control model is used?
EDBC uses an access control model based on user roles and permissions to control access to mainframe datasets. This model may integrate with existing mainframe security systems.
What encryption is used and where?
EDBC uses encryption to protect data in transit between the client and the mainframe server. The specific encryption algorithms used depend on the configuration and supported protocols.
What audit/logging capabilities exist?
EDBC provides audit logging capabilities to track user access and data modifications. These logs can be used for security monitoring and compliance purposes.
Operations
What are common implementation challenges?
Implementing EDBC requires expertise in mainframe systems, networking, and security. Common challenges include configuring data source mappings, troubleshooting connectivity issues, and ensuring data security.
What ongoing operational requirements exist?
Ongoing operational requirements for EDBC include monitoring system performance, maintaining data source connections, and applying security patches. Staffing requirements include mainframe systems administrators and database administrators.
What administrative interfaces are available?
Administrative interfaces for EDBC may include a command-line interface (CLI) and potentially a web-based console. User management is typically handled through the mainframe security system.
Ready to Start Your Migration?
Download our comprehensive migration guide for EDBC or calculate your ROI.