Tone Software z/OS

JES2FTP Modernization Guide

Data ConversionPrinting and Output

JES2FTP is a data conversion product by Tone Software. Explore technical details, modernization strategies, and migration paths below.

Product Overview

JES2FTP streamlines the process of transferring JES output from z/OS systems using FTP.

Key features include the ability to encrypt data during transfer using FTPS and to save converted output either to a file or back to the JES spool.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What is the primary function of JES2FTP?

JES2FTP automates the transfer of JES output to various destinations. It can operate as a batch job step, monitor z/OS UNIX directories, or monitor JES output. It supports output formats like PDF, HTML, XML, and TEXT.

How can JES2FTP be triggered to start a transfer?

JES2FTP can be triggered as a batch job step using JCL, by monitoring z/OS UNIX directories for new files, or by monitoring the JES spool for specific output.

What output formats does JES2FTP support?

JES2FTP supports output formats including PDF, HTML, XML, and TEXT. It can also encrypt or secure the content before transferring it.

Where can JES2FTP save the converted output?

JES2FTP can save converted output to a file or back to the JES spool. This allows for archiving or further processing of the output.

Technical

What configuration files are used by JES2FTP?

JES2FTP uses configuration files to define transfer parameters, output formats, and security settings. These files are typically stored as datasets on z/OS.

How is JES2FTP invoked in a batch environment?

JES2FTP can be invoked using JCL (Job Control Language) in a batch environment. The JCL specifies the program name, input parameters, and output datasets.

What protocols does JES2FTP use for communication?

JES2FTP uses standard FTP or FTPS protocols for transferring data. It supports both active and passive FTP modes.

What encryption methods are supported by JES2FTP?

JES2FTP can encrypt data using SSL/TLS during transfer when using FTPS. It can also encrypt the output files themselves using various encryption algorithms.

Business Value

What is the business value of using JES2FTP?

JES2FTP automates the distribution of mainframe output, reducing manual effort and improving efficiency. This can lead to faster delivery of reports and data to end-users.

How does JES2FTP improve accessibility to mainframe data?

By converting JES output to standard formats like PDF or HTML, JES2FTP makes mainframe data more accessible to users who may not have direct access to the mainframe environment.

How does JES2FTP integrate with existing systems?

JES2FTP can be integrated into existing workflows and applications, allowing for seamless transfer of data between the mainframe and other systems.

Security

What authentication methods are supported by JES2FTP?

JES2FTP supports authentication methods such as user IDs and passwords for FTP access. When using FTPS, it supports certificate-based authentication.

How does JES2FTP control access to files and directories?

JES2FTP uses access control lists (ACLs) to control access to files and directories on the FTP server. These ACLs can be configured to restrict access to specific users or groups.

How does JES2FTP protect data during transfer?

JES2FTP uses SSL/TLS encryption to protect data during transfer when using FTPS. This ensures that the data is not intercepted or modified during transit.

What audit logging capabilities are available in JES2FTP?

JES2FTP provides audit logging capabilities to track user access, file transfers, and other security-related events. These logs can be used to monitor for suspicious activity and to investigate security incidents.

Operations

How can JES2FTP be monitored?

JES2FTP can be monitored using standard z/OS monitoring tools and techniques. It also provides its own logging and tracing facilities.

What type of logging is provided by JES2FTP?

JES2FTP generates log files that record all transfer activity, including successful and failed transfers. These logs can be used to troubleshoot problems and to track performance.

How is JES2FTP configured?

JES2FTP is configured using configuration files that specify the transfer parameters, output formats, and security settings. These files can be updated using a text editor or other configuration management tools.

How is user management handled in JES2FTP?

User management for JES2FTP is typically handled through the z/OS security system, such as RACF, ACF2, or Top Secret. This allows for centralized management of user access and permissions.

Ready to Start Your Migration?

Download our comprehensive migration guide for JES2FTP or calculate your ROI.

Calculate ROI