Phoenix Software International z/OS

JES3plus Modernization Guide

BatchPrinting and Output

JES3plus is a batch product by Phoenix Software International. Explore technical details, modernization strategies, and migration paths below.

Product Overview

JES3plus is a replacement for IBM's JES3, designed for z/OS batch processing environments.

It uses SMF records and system logs for monitoring.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What is JES3plus?

JES3plus is a job entry subsystem designed to manage and control batch processing within z/OS environments. It provides advanced scheduling, resource management, and output management capabilities.

How does JES3plus improve batch processing?

JES3plus enhances batch processing by offering features such as dynamic resource allocation, improved job scheduling algorithms, and comprehensive output management. These capabilities lead to optimized resource utilization and faster job completion times.

What is the relationship between JES3plus and IBM's JES3?

JES3plus is designed as a replacement for IBM's JES3, offering continued support and enhancements to the original functionality. It ensures compatibility with existing z/OS environments while introducing modern features.

How do I interact with JES3plus to manage jobs?

JES3plus supports various job control language (JCL) statements and commands for job submission, execution, and management. It also provides interfaces for monitoring and controlling jobs through operator commands.

Technical

What are some common commands and configuration methods in JES3plus?

Common commands include *MODIFY*, *DISPLAY*, and *TRACE*. For example, to display the status of a job, use the command '*DISPLAY*,JOB=jobname'. Configuration is primarily managed through initialization parameters and control files.

What APIs and communication protocols does JES3plus use?

JES3plus can expose APIs for job submission and monitoring, potentially including RESTful interfaces. Communication protocols include TCP/IP for network communication between components.

What are the main architectural components of JES3plus?

Key components include the Global Processor, Local Processor, and I/O processors. These components communicate through a combination of shared memory and message passing. Data is stored in z/OS datasets.

How is JES3plus administered and monitored?

JES3plus provides a command-line interface (CLI) for administration. User management is typically integrated with z/OS security systems like RACF, ACF2, or Top Secret. Monitoring is facilitated through SMF records and system logs.

Business Value

How does JES3plus provide business value?

JES3plus optimizes resource utilization, leading to reduced operational costs. Its advanced scheduling capabilities ensure timely job completion, minimizing delays and improving overall efficiency.

How does JES3plus support scalability?

By streamlining batch processing and improving resource management, JES3plus enables organizations to handle larger workloads with existing infrastructure. This scalability supports business growth without requiring significant hardware investments.

How does JES3plus help meet SLAs?

JES3plus helps organizations meet service level agreements (SLAs) by ensuring that critical jobs are processed on time. Its advanced scheduling algorithms prioritize important workloads, minimizing the risk of SLA violations.

Security

What authentication methods are supported by JES3plus?

JES3plus integrates with z/OS security systems such as RACF, ACF2, and Top Secret for authentication and authorization. It supports role-based access control (RBAC) to manage user permissions.

What access control model is used in JES3plus?

JES3plus leverages the access control mechanisms provided by z/OS security systems. It supports role-based access control (RBAC), allowing administrators to define roles and assign permissions to users based on their responsibilities.

What encryption is used and where?

JES3plus uses encryption methods provided by z/OS for data at rest and in transit. Sensitive data, such as passwords and cryptographic keys, are protected using industry-standard encryption algorithms.

What audit/logging capabilities exist?

JES3plus provides comprehensive audit logging capabilities, recording security-related events such as user authentication, authorization attempts, and access to sensitive resources. These logs can be used for security monitoring and compliance auditing.

Operations

What administrative interfaces are available?

JES3plus provides a command-line interface (CLI) for administrative tasks. Key configuration parameters include initialization parameters for system behavior, resource allocation settings, and security configurations.

How is user management handled?

JES3plus integrates with z/OS security systems for user management. User accounts and permissions are managed through RACF, ACF2, or Top Secret, ensuring consistent security policies across the z/OS environment.

What monitoring/logging capabilities exist?

JES3plus offers extensive monitoring capabilities through SMF records and system logs. Administrators can use these logs to track system performance, identify potential issues, and ensure optimal operation.

Ready to Start Your Migration?

Download our comprehensive migration guide for JES3plus or calculate your ROI.

Calculate ROI