Inside Products z/OS

Inside the Stack Modernization Guide

Networks and CommunicationMonitor

Inside the Stack is a networks and communication product by Inside Products. Explore technical details, modernization strategies, and migration paths below.

Product Overview

Inside the Stack is a z/OS TCP/IP monitor designed to provide insights into network performance and potential issues.

This is particularly useful for troubleshooting performance bottlenecks or planning network upgrades.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What does Inside the Stack do?

Inside the Stack is a z/OS TCP/IP monitor. It observes and analyzes network traffic to provide insights into performance and potential issues. It helps organizations understand and manage their TCP/IP network activity on z/OS systems.

Is this a system, application, or tool?

Inside the Stack is a system-level tool. It operates within the z/OS environment to provide monitoring and analysis capabilities. It is not an application in the traditional sense, but rather a component that enhances the visibility and management of TCP/IP network activities.

What types of organizations use this?

Organizations that rely on z/OS for critical applications and require detailed monitoring of their TCP/IP network traffic benefit most from Inside the Stack. This includes enterprises in industries such as banking, finance, insurance, and government. Any organization that needs to ensure the performance and reliability of its z/OS-based network applications is a potential user.

When should we consider Inside the Stack?

A company should consider using Inside the Stack when it needs to gain better visibility into its z/OS TCP/IP network activity. This could be driven by performance issues, security concerns, or a desire to optimize network resource utilization. It is particularly useful when troubleshooting network problems or planning for capacity upgrades.

What are the alternatives to Inside the Stack?

Alternatives to Inside the Stack include ServicePilot NBA, Rocket TMON for VTAM, Netmaster Network Management for SNA, VitalSigns for VTAM, and Rocket TMON for TCP/IP. These products offer similar network monitoring and management capabilities, but may differ in their specific features, integration points, and ease of use.

Technical

For mainframe products: Does this run in an LPAR?

Inside the Stack runs on the z/OS platform. It is z/OS dependent and typically operates within an LPAR (Logical Partition). It requires the z/OS TCP/IP subsystem to be active and configured.

What configuration files or interfaces are used?

Inside the Stack likely uses configuration files to define monitoring parameters, thresholds, and reporting options. The exact format and location of these files would be detailed in the product documentation. It may also provide interfaces, such as a command-line interface (CLI) or web-based interface, for configuring and managing the monitor.

What types of APIs does this product expose?

The specific APIs exposed by Inside the Stack would be detailed in the product documentation. These APIs could allow integration with other systems management tools, such as SIEM platforms or performance monitoring dashboards. The APIs might support protocols such as REST or SOAP for communication.

What are the main system components?

The main system components of Inside the Stack likely include a data collection agent, a data processing engine, and a reporting interface. The data collection agent gathers TCP/IP network traffic data. The data processing engine analyzes the data and identifies potential issues. The reporting interface presents the data in a user-friendly format.

Business Value

How does Inside the Stack provide business value?

Inside the Stack provides business value by improving the performance and reliability of z/OS-based network applications. It helps organizations identify and resolve network problems quickly, optimize network resource utilization, and ensure the availability of critical services. This can lead to reduced downtime, improved customer satisfaction, and lower operating costs.

What would happen if an organization did NOT use this product?

Without Inside the Stack, organizations may lack the visibility needed to effectively manage their z/OS TCP/IP network. This can lead to delayed problem resolution, inefficient resource utilization, and increased risk of network outages. It can also make it difficult to plan for future network capacity needs.

How does this product integrate with enterprise ecosystems?

Inside the Stack integrates with enterprise ecosystems by providing APIs and interfaces that allow it to exchange data with other systems management tools. This enables organizations to create a unified view of their IT infrastructure and automate network management tasks. It can also integrate with security information and event management (SIEM) systems to provide security insights.

Security

What specific authentication methods are supported?

Inside the Stack likely supports authentication methods such as RACF (Resource Access Control Facility) or other z/OS security systems. The access control model used may be role-based access control (RBAC), where users are assigned roles with specific permissions. Encryption may be used to protect sensitive network traffic data.

What audit/logging capabilities exist?

Inside the Stack provides audit and logging capabilities to track user activity and system events. This information can be used to identify security breaches, troubleshoot problems, and comply with regulatory requirements. The logs may include details such as user logins, configuration changes, and network traffic patterns.

How does Inside the Stack improve security?

Inside the Stack helps organizations improve their security posture by providing visibility into network traffic patterns and identifying potential security threats. It can detect unusual activity, such as unauthorized access attempts or malware infections. This allows organizations to respond quickly to security incidents and prevent data breaches.

Operations

How is this product typically deployed?

Inside the Stack is typically deployed on-premise within the z/OS environment. Implementing it requires expertise in z/OS systems and TCP/IP networking. Ongoing operational requirements include monitoring the monitor itself, performing regular maintenance, and ensuring that the monitor is properly configured to meet the organization's needs.

What are common implementation challenges?

Common implementation challenges include configuring the monitor to collect the right data, integrating it with other systems management tools, and ensuring that it does not negatively impact system performance. It is important to carefully plan the implementation and test it thoroughly before deploying it to a production environment.

What administrative interfaces are available?

Administrative interfaces for Inside the Stack likely include a command-line interface (CLI) and possibly a web-based interface. User management is typically handled through z/OS security systems such as RACF. Main configuration parameters include monitoring thresholds, reporting options, and integration settings.

Ready to Start Your Migration?

Download our comprehensive migration guide for Inside the Stack or calculate your ROI.

Calculate ROI