21st Century Software z/OS

Ice-Pak Modernization Guide

DiskTools and UtilitiesAdministration

Ice-Pak is a disk product by 21st Century Software. Explore technical details, modernization strategies, and migration paths below.

Product Overview

Ice-Pak is a suite of disk and dataset administration tools designed for z/OS mainframe environments.

The implementation process involves installing the software, configuring parameters, and integrating it with existing security systems like RACF, ACF2, or Top Secret.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What does Ice-Pak do?

Ice-Pak is a suite of disk and dataset management tools for z/OS mainframe environments. It helps organizations manage storage space, administer VSAM datasets, and automate various disk-related tasks. It provides capabilities for space management, dataset manipulation, and disaster recovery.

Is this a system, application, or tool?

Ice-Pak is a toolset designed to enhance existing z/OS systems. It provides utilities and applications that work in conjunction with the operating system to provide advanced storage management capabilities. It is not a standalone application but rather a collection of tools.

What types of organizations use this?

Organizations that rely on z/OS mainframe systems for critical business applications and data storage are the primary users of Ice-Pak. This includes large enterprises in industries such as banking, finance, insurance, and government. Any organization needing to optimize and manage their mainframe storage environment can benefit.

When should we consider Ice-Pak?

A company should consider Ice-Pak when they are facing challenges related to disk space management, VSAM dataset administration, or disaster recovery in their z/OS environment. If they need to automate storage-related tasks, improve efficiency, and reduce the risk of data loss, Ice-Pak can be a valuable solution.

What are the alternatives to Ice-Pak?

Alternatives to Ice-Pak include BMC AMI Storage solutions (such as FDRPAS and COMPAKTOR), CA Disk, and Innovation Data Processing's DFDSS. These products offer similar capabilities for disk and dataset management in z/OS environments. The choice depends on specific requirements, existing infrastructure, and vendor preferences.

Technical

What infrastructure is required?

Ice-Pak runs on the z/OS operating system and requires a mainframe environment. It operates within LPARs (Logical Partitions) and interacts with various z/OS subsystems. It enhances the existing z/OS infrastructure by providing advanced storage management functions.

How is Ice-Pak deployed?

Ice-Pak is deployed on-premise within the z/OS environment. It requires technical expertise in z/OS systems programming and storage management to implement and configure. The implementation process involves installing the software, configuring parameters, and integrating it with existing systems.

Does this run in an LPAR?

Ice-Pak enhances the capabilities of z/OS by providing advanced disk and dataset management functions. It works in conjunction with z/OS to optimize storage utilization, automate tasks, and improve overall system efficiency. It does not replace z/OS but rather extends its functionality.

How does Ice-Pak integrate with security systems?

Ice-Pak integrates with z/OS security systems, such as RACF, ACF2, or Top Secret, to control access to datasets and resources. It leverages these security systems to authenticate users and authorize access based on defined rules and policies. This ensures that only authorized personnel can perform sensitive operations.

Business Value

How does Ice-Pak provide business value?

Ice-Pak helps organizations optimize their storage utilization, reduce costs associated with disk space, and improve the efficiency of storage-related tasks. By automating dataset management and providing advanced space management capabilities, it can free up valuable resources and improve overall system performance.

What happens if we do not use Ice-Pak?

Without Ice-Pak, organizations may face challenges related to inefficient storage utilization, manual dataset management, and increased risk of data loss. They may experience higher costs associated with disk space, reduced system performance, and difficulty in meeting service level agreements. Automation is key to efficiency.

When is Ice-Pak a good fit?

Ice-Pak can be a good fit for organizations that have a significant investment in z/OS mainframe systems and require advanced storage management capabilities. It is particularly beneficial for companies that are struggling with disk space constraints, complex dataset administration tasks, or disaster recovery planning.

When is Ice-Pak NOT a good fit?

Ice-Pak may not be a good fit for organizations that do not have a z/OS mainframe environment or that have very simple storage management requirements. If a company is primarily using distributed systems or cloud-based storage, Ice-Pak would not be applicable. It is designed specifically for the z/OS platform.

Security

How does Ice-Pak ensure security?

Ice-Pak integrates with z/OS security systems, such as RACF, ACF2, and Top Secret, to provide secure access to datasets and resources. It supports authentication and authorization based on defined rules and policies, ensuring that only authorized users can perform specific operations. It leverages the existing security infrastructure of z/OS.

What access control model is used?

Ice-Pak uses the access control mechanisms provided by z/OS security systems (RACF, ACF2, Top Secret) to control access to datasets and other resources. It typically employs a role-based access control (RBAC) model, where users are assigned roles with specific permissions. This allows administrators to manage access efficiently.

What audit/logging capabilities exist?

Ice-Pak provides audit logging capabilities to track user activity and system events. These logs can be used to monitor security, detect potential threats, and comply with regulatory requirements. The audit logs typically include information about user logins, dataset access, and administrative actions.

What authentication methods are supported?

Ice-Pak supports various authentication methods provided by z/OS security systems, including password-based authentication, multi-factor authentication (MFA), and integration with identity management systems. The specific authentication methods supported depend on the configuration of the z/OS environment.

Operations

What ongoing operational requirements exist?

Ongoing operational requirements for Ice-Pak include monitoring system performance, managing disk space, performing regular backups, and applying software updates. It is important to have skilled personnel who are familiar with z/OS storage management and can effectively use Ice-Pak to maintain the environment.

What are common implementation challenges?

Common implementation challenges for Ice-Pak include integrating it with existing z/OS security systems, configuring parameters to meet specific requirements, and ensuring compatibility with other software products. It is important to plan the implementation carefully and involve experienced z/OS professionals.

What administrative interfaces are available?

Administrative interfaces for Ice-Pak typically include a command-line interface (CLI) and potentially a GUI or web-based console. The CLI allows administrators to perform various tasks, such as managing datasets, monitoring disk space, and configuring parameters. The GUI or web console provides a more user-friendly interface for these tasks.

How is user management handled?

User management in Ice-Pak is typically handled through the z/OS security system (RACF, ACF2, Top Secret). User accounts and permissions are defined within the security system, and Ice-Pak leverages these definitions to control access to datasets and resources. This ensures consistent user management across the z/OS environment.

Ready to Start Your Migration?

Download our comprehensive migration guide for Ice-Pak or calculate your ROI.

Calculate ROI