FileMarvel Modernization Guide
FileMarvel is a db2 product by CSI International. Explore technical details, modernization strategies, and migration paths below.
Product Overview
FileMarvel provides ISPF online browse and edit capabilities for z/OS datasets and Db2 databases.
To browse a dataset, users might enter 'B dataset.name' in the ISPF command line.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What are the main functions of FileMarvel?
FileMarvel allows users to browse and edit sequential, PDS, and VSAM datasets directly through ISPF. It also provides access to Db2 databases for querying and data manipulation. Common operations include browsing datasets, editing members, executing SQL queries, and managing Db2 tables.
How do I perform basic operations in FileMarvel?
Basic operations involve using ISPF panels to navigate datasets and Db2 objects. For example, to browse a dataset, you would typically enter a command like 'B dataset.name' in the ISPF command line. Editing a member involves selecting the member from a PDS directory and using the ISPF editor.
What configuration files are used by FileMarvel?
FileMarvel likely uses ISPF configuration files for customizing the user interface and session parameters. These files may include ISPF profile datasets and CLIST procedures. The product might also have its own configuration files for defining Db2 connection parameters and security settings.
Technical
What is the architecture of FileMarvel?
FileMarvel's architecture likely includes ISPF panels for user interaction, a data access component for reading and writing datasets, and a Db2 interface for database connectivity. These components communicate through standard z/OS system services and ISPF APIs. Datasets are stored on z/OS DASD, and Db2 data resides in Db2 tablespaces.
How does FileMarvel handle security?
FileMarvel likely uses standard z/OS security mechanisms, such as RACF, ACF2, or Top Secret, for authentication and authorization. Access control is typically managed through dataset profiles and Db2 grants. Encryption might be used for sensitive data in transit or at rest, depending on the configuration.
What monitoring and logging capabilities exist?
FileMarvel probably provides logging capabilities through z/OS system logs or its own log datasets. Monitoring can be performed using standard z/OS monitoring tools or through custom ISPF panels. User management is typically handled through z/OS security administration tools.
Business Value
What is the business value of FileMarvel?
FileMarvel provides value by enabling users to directly browse and edit z/OS datasets and Db2 databases through a familiar ISPF interface. This can improve productivity and reduce the need for specialized tools or skills. It streamlines data access and manipulation for developers and administrators.
How does FileMarvel simplify data management?
By providing a single interface for both datasets and Db2, FileMarvel simplifies data management tasks. Users can easily switch between browsing datasets and querying Db2 tables without having to use different tools or interfaces. This can save time and reduce errors.
Security
What authentication methods are supported?
FileMarvel likely supports authentication methods provided by z/OS security systems, such as RACF, ACF2, and Top Secret. It integrates with these systems to verify user identities and enforce access controls. Specific authentication protocols may include Kerberos or LDAP, depending on the z/OS configuration.
What access control model is used?
FileMarvel probably uses an access control model based on z/OS security profiles and Db2 grants. This model allows administrators to define granular permissions for datasets and Db2 objects, controlling which users can access and modify data. Role-Based Access Control (RBAC) may be implemented through RACF roles.
What audit/logging capabilities exist?
FileMarvel's audit and logging capabilities likely include recording user activities, such as dataset accesses, edits, and Db2 queries. These logs can be used to track user behavior, identify security breaches, and comply with auditing requirements. The logs may be stored in z/OS system logs or dedicated log datasets.
Operations
What administrative interfaces are available?
FileMarvel's administrative interfaces likely include ISPF panels for configuring the product and managing user access. It may also provide command-line interfaces (CLIs) for performing administrative tasks. User management is typically handled through z/OS security administration tools, such as RACF.
What are the main configuration parameters?
Key configuration parameters for FileMarvel may include Db2 connection settings, dataset access permissions, and logging options. These parameters can be configured through ISPF panels or configuration files. Monitoring can be performed using standard z/OS monitoring tools or through custom ISPF panels.
Ready to Start Your Migration?
Download our comprehensive migration guide for FileMarvel or calculate your ROI.